Above My Pay Grade: Incident Response at the National Level
|
|
|
- Ann Robbins
- 10 years ago
- Views:
Transcription
1 Above My Pay Grade: Incident Response at the National Level Jason Healey Atlantic Council
2 Traditional Incident Response
3 But at the national level, incident response is a different game Implications for Misunderstandings between geeks and wonks Attribution Decision making Large-scale response (or miscalculations about response)
4 EXAMPLE: LARGE SCALE ATTACK ON FINANCE
5 Large-scale Attack on Finance Sector Who Is Their First External Call To?
6 First: Call a Law Firm!
7 Then Mandiant or CrowdStrike!
8 After That: Tell the Cops FBI USSS
9 Then Share within the Sector FS/ISAC Operational sharing and crisis management Shared with all financial institutions Sector-wide incident response via audioconfernce bridge line Typically heard: What s the vulnerability? Is there a patch? What IP addresses? What works to mitigate?
10 When More than Tech Discussions Are Needed FSSCC FS/ISAC FBIIC Other ISACs Water, Energy, Telecom Policy-Level Incident Response Senior company and government executives across all sector and regulators Management response via audio bridge Typically heard: How healthy is the sector? What do we do if it gets worse? Can markets open as normal tomorrow?
11 If Markets are Melting FSSCC Treasury FBIIC Within Treasury Escalate to the senior leadership, especially political appointees FS/ISAC Other ISACs Water, Energy, Telecom
12 If Markets are Melting President s Working Group on Financial Markets FSSCC Treasury FS/ISAC FBIIC Highest Level of Financial Decision-making No different than any other financial crisis! Secretary, Chairs of FRB, SEC, CFTC Other ISACs Water, Energy, Telecom
13 The Cyber Response President s Working Group on Financial Markets Treasury Department of Homeland Security But what does that actually mean? And what then? FSSCC FBIIC DHS FS/ISAC Other ISACs Water, Energy, Telecom
14 The Cyber Response President s Working Group on Financial Markets Treasury National Cybersecurity and Communications Integration Center 24/7 operations floor Includes US-CERT, ICS-CERT, NCC FSSCC FBIIC DHS FS/ISAC Operations NCICC Planning Analysis Other ISACs Water, Energy, Telecom Watch & Warning DHS Treasury FBI Assist & Assess CIA FS-ISAC Justice Liaison DoD State & Local NSA USSS Others State
15 If Incident Needs Escalation A Significant Cyber Incident requires increased national coordination as it affects National security Public health and public safety National economy, including any of the individual sectors that may affect the national economy or Public confidence Cyber Unified Coordination Group Cyber UCG IMT FS/ISAC DHS NCCIC NTOC USCC Other ISACs Water, Energy, Telecom Operational Response Telcos
16 Who Coordinates Above DHS?
17 Who Coordinates Above DHS?
18 Who Coordinates Above DHS?
19 Policy Response If Incident Needs Escalation National Security Council Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency
20 Policy Response If Incident Needs Escalation National Security Council Deputies Committee Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency
21 Policy Response If Incident Needs Escalation President of the United States Principals Committee Deputies Committee Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency
22 Why This Works Since Worst-impact cyber conflicts generally caused by nations, not individuals and Cyber conflicts tend not to be network speed Process translates cyber crisis out of technical channels Into the time-tested traditional national security crisis management Countries with NSC equivalents have natural edge to those without like China
23 Why This is a Good Thing: Provides Process for Tough Decisions Enables national-level technical response options Commitment of additional resources to help private sector response Money, personnel, intelligence Determine what nation is responsible? Enables response using levers of national power: Diplomatic, economic and yes, military
24 Why the Process Might Not Work or It doesn t always work even for physical crises! When government wants to control the response The Katrina of something on the edges of the system The Six-Day War True Cyber War Otherwise Suck:
25 Financial Response Policy Response Why the Process Might Not Work: If We Are At Cyberwar! President s Working Group on Financial Markets FSSCC Treasury FBIIC Governors President Principals Committee Deputies Committee Cyber Directorate SECDEF, CJCS FS/ISAC Director FBI FEMA ICI-IPC UCG DHS NCCIC Operational Response Cyber Response Group Cyber Command Military Response Regional COCOM NTOC
26 Financial Response Policy Response Why the Process Might Not Work: If We Get Stupid President s Working Group on Financial Markets FSSCC Treasury FBIIC Governors Principals Committee UCG attack and in the private- FS/ISAC sector DHS networks NCCIC Operational Response President Director FBI Inside the Deputies Beltway, Committee they forget the real response, Cyber Directorate ICI-IPC Cyber Response Group the FEMA real battle isn t in DC but at the banks under Cyber Command Military Response SECDEF, CJCS Regional COCOM NTOC
27 QUESTIONS? Cyber Statecraft Initiative International conflict, competition and cooperation in cyberspace Publications (all at our website, acus.org) Public and Private Events
[This page intentionally left blank]
TH [This page intentionally left blank] PREFACE [This page intentionally left blank.] [Undergoing internal DHS preface coordination.] For more information please contact [email protected] SEPTEMBER 2010 i
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013
Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities October 21, 2013 Table of contents Background 2 Exercise objectives 3 QD2 cyber-attack scenario 4 QD2 yielded
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Department of Homeland Security
DHS' Efforts to Coordinate the Activities of Federal Cyber Operations Centers OIG-14-02 October 2013 Washington, DC 20528 / www.oig.dhs.gov October 24, 2013 MEMORANDUM FOR: The Honorable Suzanne Spaulding
United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security
United States Coast Guard Cyber Command Achieving Cyber Together Brett Rouzer Chief of MCIKR Protection U.S. Coast Guard Cyber Command DHS NCCIC Liaison Officer (202) 372-3113 [email protected] Vision
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
U.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
National Cybersecurity & Communications Integration Center (NCCIC)
National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division
Confrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
How To Make A National Security Agreement Between Dhs And Dod
MEMORANDUM OF AGREEMENT BETWEEN THE DEPARTMENT OF HOMELAND SECURITY AND THE DEPARTMENT OF DEFENSE REGARDING CYBERSECURITY 1. PARTIES. The parties to this Agreement are the Department of Homeland Security
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
National Communications System. December 6, 2007
1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate
Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach
Managing Cyber Risks to Transportation Systems Mike Slawski Cyber Security Awareness & Outreach The CIA Triad 2 SABSA Model 3 TSA Mission in Cyber Space Mission - Facilitate the measured improvement of
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
A Crisis Response, Information Sharing View of FFIEC Appendix J?
A Crisis Response, Information Sharing View of FFIEC Appendix J? Susan Rogers (MBCP, MBCI) Financial Services Information Sharing and Analysis Center FS-ISAC, Business Resiliency Director [email protected];
Cybersecurity Awareness. Part 2
Part 2 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
Testimony of John W. Carlson on behalf of the. The Financial Services Information Sharing & Analysis Center (FS-ISAC)
Testimony of John W. Carlson on behalf of the The Financial Services Information Sharing & Analysis Center (FS-ISAC) Before the U.S. House of Representatives Committee on Financial Services June 24, 2015
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the
For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,
FS-ISAC CHARLES BRETZ
FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector
Banking and Finance Sector-Specific Plan An Annex to the National Infrastructure Protection Plan
Banking and Finance Sector-Specific Plan An Annex to the National Infrastructure Protection Plan 2010 U.S. Department of the Treasury Preface November 5, 2012 We are writing to transmit the Banking and
Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
The Aviation Information Sharing and Analysis Center (A-ISAC)
The Aviation Information Sharing and Analysis Center (A-ISAC) Faye Francy Aviation ISAC March 2015 The Threat A National Security Issue Rapidly escalating cyber threats Executive action Executive Order
AT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC
National Health Information Sharing & Analysis Center The National Health ISAC (NH-ISAC) NH-ISAC Physical Threats Cyber Impacts 2 (NH-ISAC) National Healthcare & Public Health Cybersecurity Protection
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME
CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME CYBER CRISIS MANAGEMENT: ARE YOU PREPARED? Evan Wolff David Bodenheimer Kelly Currie Kate Growley Overview Cybersecurity
The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA
The DS Information Assurance and Cybersecurity Role-Based Training Program Diplomatic Security Training Center (DSTC) Dunn Loring, VA IAB Mission The Information Assurance Branch s (IAB s) mission is to
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Cybersecurity & the Department of Homeland Security
Cybersecurity & the Department of Homeland Security Recommendations of the Aspen Homeland Security Group s Cyber Working Group for the Department of Homeland Security The Aspen Institute Homeland Security
Water Security in New Jersey: Partnership and Services
GOV. CHRIS CHRISTIE LT. GOV. KIM GUADAGNO DIR. CHRIS RODRIGUEZ NJOHSP OFFICE OF HOMELAND SECURITY AND PREPAREDNESS Preparedness Act Water Security in New Jersey: Partnership and Services Created by the
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
US-CERT Year in Review. United States Computer Emergency Readiness Team
US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals
NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC
Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health NH-ISAC National Health Information Sharing & Analysis Center The National Health ISAC Update Briefing Agenda
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Data Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
All. Presidential Directive (HSPD) 7, Critical Infrastructure Identification, Prioritization, and Protection, and as they relate to the NRF.
Coordinating Agency: Department of Homeland Security Cooperating Agencies: All INTRODUCTION Purpose Scope This annex describes the policies, responsibilities, and concept of operations for Federal incident
Michael Yakushev PIR-Center, Moscow (Russia)
Michael Yakushev PIR-Center, Moscow (Russia) Terminological conflict: Cyber-Security, Internet Governance etc. Legal conflict (gap): lack of globally recognized legal instruments Organizational conflict:
Resources and Capabilities Guide
Resources and Capabilities Guide The National Cybersecurity and Communications Integration Center (NCCIC) October 21, 2013 1 Contents I. Purpose... 3 II. Introduction... 4 III. Information Sharing... 7
How To Write A Cybersecurity Defense Assessment Report
U.S. Cybersecurity Defense Assessment by Commander Darren C. Sherman United States Navy United States Army War College Class of 2013 DISTRIBUTION STATEMENT: A Approved for Public Release Distribution is
NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""
National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
NSA Surveillance, National Security and Privacy
NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES
WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the technology and telecommunications
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
https://usawc.blackboard.com/bbcswebdav/pid-82431-dt-content-rid-112988_1/institution/...
Unit 6 - Homeland Security, Homeland Defense, and Defense Support of Civil Authorities Page 1 of 5 The defense of the homeland is a significant contemporary security issue. Defending the homeland is a
Combating Spear-phishing:
Combating Spear-phishing: Convergence of Intel, Ops, Forensics, and Vulnerability Management Mr. Billy Rodriguez, GCIH Chief Intrusion Prevention Section Mr. Jacob Stauffer, GCFA, GREM Chief Intrusion
CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT
CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT Joeli R. Field INTL604 Interagency Operations American Military University September 18, 2010 2 INTRODUCTION The cyber threat is one of
SECURING CYBERSPACE THROUGH PUBLIC-PRIVATE PARTNERSHIP
SECURING CYBERSPACE THROUGH PUBLIC-PRIVATE PARTNERSHIP A COMPARATIVE ANALYSIS OF PARTNERSHIP MODELS Rachel Nyswander Thomas May 2012 (Updated August 2013) Table of Contents Executive Summary... 2 Acknowledgments...
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
BACHELOR OF SCIENCE DEGREE HOMELAND SECURITY (INCLUDES EMERGENCY MANAGEMENT)
BACHELOR OF SCIENCE DEGREE HOMELAND SECURITY (INCLUDES EMERGENCY MANAGEMENT) MAJOR REQUIREMENTS: (39 HOURS) HLS 101 Introduction to Homeland Security HLS 201 Emergency Management HLS 225 Legal & Ethical
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
