CERT/CC Overview & CSIRT Development Team Activities
|
|
|
- Shawn Copeland
- 10 years ago
- Views:
Transcription
1 CERT/CC Overview & CSIRT Development Team Activities Georgia Killcrece CSIRT Development Team CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA October 2006 CERT, CERT Coordination Center, and Carnegie Mellon are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees Carnegie Mellon University
2 Topics CERT/CC background history and current work Practices, Development, and Training the Educational and Training activities we re undertaking CSIRT Development Team an overview of the activities related to developing CSIRTs and incident management best practices 2006 Carnegie Mellon University 2
3 CERT/CC 2006 Carnegie Mellon University 3
4 Organizational Hierarchy U.S. DoD Office of the Under Secretary (Research and Engineering) sponsor (FFRDC*) CERT Program Survivable Network Technology Survivable Enterprise Management Practices Development & Training *FFRDC Federally Funded Research and Development Center 2006 Carnegie Mellon University 4
5 CERT/CC Beginnings 2006 Carnegie Mellon University 5
6 CERT/CC Mission Provide a reliable, trusted, 24-hour, single point of contact for emergencies. Facilitate communication among experts working to solve security problems. Serve as a central point for identifying and correcting vulnerabilities in computer systems. Maintain close ties with research activities and conduct research to improve the security of existing systems. Initiate proactive measures to increase awareness and understanding of information security and computer security issues throughout the community of network users and service providers Carnegie Mellon University 6
7 CERT/CC Activities Vulnerability Analysis Artifact Analysis Analyze flaws in Internet Systems Information Operations Study intruder developed code that exploits flaws Monitor public sources, triage, current activities 2006 Carnegie Mellon University 7
8 CERT/CC Outreach and Collaboration Resident Affiliates Foster collaborative efforts and information sharing Regularly attend and present at conferences, including FIRST IETF InfraGard NANOG AUSCERT GOVCERT NSTAC NSIE USENIX LISA Security Symposium Technical Conference 2006 Carnegie Mellon University 8
9 Example: CERT/CC and US-CERT US-CERT was established in September 2003 as a public-private partnership charged with improving computer security preparedness and response to cyber attacks in the United States. As an institution, US-CERT is responsible for analyzing and reducing cyber threats and vulnerabilities disseminating cyber threat warning information coordinating incident response activities US-CERT also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States government about cyber security. US-CERT is a partnership of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS) the CERT Coordination Center 2006 Carnegie Mellon University 9
10 CERT/CC and US-CERT: Products and Resources Technical Cyber Security Alerts Cyber Security Alerts (Non-technical) Vulnerability Notes Cyber Security Bulletins Cyber Security Tips Current Activity 2006 Carnegie Mellon University 10
11 New Threats and Vulnerabilities Bring New Risks Threats Disgruntled Employees Hackers for hire Organized Crime Competitors Cyber Vandals Governments Vulnerabilities OS Network Applications Databases PCs, PDA, Phones Middleware E-x x Communities (e-government, e-commerce, etc) Risks Disclosure of Customer Records Sabotage of Operations/Service Extortion Theft of Trade Secrets EFT Fraud Loss of Client Confidence Legal Liability Impact: "Last year was the first year that proceeds from cybercrime were greater than proceeds from the sale of illegal drugs, and that was, I believe, over $105 billion." Valerie McNiven, a U.S. Treasury Department expert on cybercrime, interview with Reuters November 28, Carnegie Mellon University 11
12 Practices, Development, & Training 2006 Carnegie Mellon University 12
13 Organizational Hierarchy U.S. DoD Office of the Under Secretary (Research and Engineering) sponsor (FFRDC*) CERT Program Survivable Network Technology *FFRDC Federally Funded Research and Development Center Survivable Enterprise Management Practices Development & Training (PDT) 2006 Carnegie Mellon University 13
14 PDT Vision An Internet community that is Aware Knowledgeable Trained Educated in information science 2006 Carnegie Mellon University 14
15 Strategic Goals Anytime, anywhere learning Millions of users Leading edge technical content Knowledge in Depth for Defense in Depth 2006 Carnegie Mellon University 15
16 FY06 Key PDT Objectives Create a knowledgebase of network forensics practices, methodologies, tools, and catalog for use by law enforcement, incident response teams, first responder IT staff, and system and network operators Develop a proof of concept operational virtual forensics lab for strategic customers Develop the Virtual Training Environment as a comprehensive IA capability for meeting DoD certification requirements Pilot, refine and transition a methodology and set of metrics to assess computer security incident management capability for federal civilian agencies Transition the SIA curriculum to academic institutions 2006 Carnegie Mellon University 16
17 PDT Impact Metrics Q1-3 FY06 Publications Courses offered / students Conferences/workshops VTE users SIA curriculum users/countries Licensees Presentations/Keynotes Awards New technologies/technical products released 4 29 / , / Carnegie Mellon University 17
18 PDT Staff Q1-3 FY06 Full Time Staff hired Total full time staff Visiting Scientists Graduate Students Staff on INI faculty Carnegie Mellon University 18
19 PDT Teams Information Assurance Practices Cyber Forensics CSIRT Development Training Virtual Training Environment Outreach and Education 2006 Carnegie Mellon University 19
20 Today s Challenges Impact CSIRTs Less time to react Need for quick notification automation of incident handling tasks easy and efficient means to sort and analyze information effective mechanisms to collaborate and share information Requirement for well-defined policies and procedures streamlined business processes to effectively manage and respond to events and incidents personnel with the knowledge, skills, and abilities to perform the work 2006 Carnegie Mellon University 20
21 CSIRT Development Team 2006 Carnegie Mellon University 21
22 2006 Carnegie Mellon University 22
23 CSIRT Mission Foster the growth of global incident management capabilities. Assist national and international organizations in establishing effective CSIRTs. Help existing CSIRTs improve their services and operation through training, mentoring, and collaboration. Create Amplify Transition 2006 Carnegie Mellon University 23
24 Products and Publications 2006 Carnegie Mellon University 24
25 CSIRT Development Team Activities -1 Research into the current incident management environment synthesize existing information and best practices into guides, standards, and methodologies for performing incident handling processes and functions identify methods for measuring the effectiveness of CSIRT capabilities (teams and personnel) Initiatives with other stakeholders to develop strategies to plan and implement CSIRTs create best practices for operating CSIRTs implement CSIRT policies and standard operating procedures Creating products that promote CSIRT development by collaborating with other teams and experts to build a CSIRT Body of Knowledge 2006 Carnegie Mellon University 25
26 Strategic Initiatives Working with Department of Defense (DoD) DoD 8530 Computer Network Defense (CND) Service Provider evaluation metrics DoD 8570 Information Assurance Training, Certification, and Workforce Management (functional requirements for CND Service Providers) Federal Government (US-CERT) Adapting DoD metrics for use within US Federal civilian agencies 2006 Carnegie Mellon University 26
27 CSIRT Development Team Activities -2 Developing, teaching, and licensing CSIRT courses authorize trained instructors to deliver the suite of courses administer the CERT-Certified Computer Security Incident Handler certification license CSIRT courses to other external organizations license CERT courses to SEI Partners, e.g Carnegie Mellon University 27
28 CERT CSIRT Courses Creating a CSIRT [1 day] provides a high level overview of the key issues and decisions that must be addressed in establishing a CSIRT. Managing CSIRTs [3 days] provides prospective or current managers with an overview of the incident handling arena including the CSIRT environment, organizational interactions, and the nature of incident management activities. Fundamentals of Incident Handling for Technical Staff [5 days] provides basic introduction to the main incident handling tasks and critical thinking skills that incident handlers need to perform CSIRT functions Advanced Incident Handling for Technical Staff [5 days] provides guidance incident handlers can use in responding to system compromises at the privileged level; participants identify and analyze a set of events and then propose appropriate response strategies through interactive instruction, facilitated discussions, and group exercises 2006 Carnegie Mellon University 28
29 Community Projects A sample of current CSIRT projects include IETF Incident Handling Working Group (INCH WG) IETF Intrusion Detection Working Group (IDWG) Automated Incident Reporting (AirCERT) System for Internet Level Knowledge (SiLK) Clearing House for Incident Handling Tools (CHIHT) Common Advisory Interchange Format (CAIF) The European Computer Security Incident Response Team Network (ecsirt.net) Training of Network Security Incident Teams Staff (TRANSITS) Trusted Introducer for CSIRTs in Europe (commissioned by TERENA) 2006 Carnegie Mellon University 29
30 Approach for Developing a CSIRT Stage 1 Stage 2 Stage 3 Stage 4 Educating the organization Planning effort Initial implementation Operational phase Stage 5 Peer collaboration Mature teams now focus on Evaluation & Improvement x Evaluation & Improvement 2006 Carnegie Mellon University 30
31 Some CSIRT Lessons Learned Trustworthiness is paramount to success. All CSIRTs differ in their mission and goals. Most CSIRTs fail to plan for growth and are soon overwhelmed take 1-2 years to gain constituency recognition CSIRTs should share information and knowledge as openly as possible set expectations repeatedly train for a marathon, not a sprint be proactive 2006 Carnegie Mellon University 31
32 Contact Information CERT Coordination Center Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh PA USA Web: CERT CSIRT Development Team Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh PA USA Web: Hotline: CERT personnel answer 08:00 17:00 EST(UTC-5)/EDT(UTC-4) On call for emergencies during other hours 2006 Carnegie Mellon University 32
US-CERT Overview & Cyber Threats
US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace
Building CSIRT Capabilities
Building CSIRT Capabilities CERT CSIRT Development Team CERT Training and Education Center CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2005 by Carnegie Mellon
Creating and Managing Computer Security Incident Response Teams (CSIRTs)
Creating and Managing Computer Security Incident Response Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Program Software Engineering Institute Carnegie Mellon University Pittsburgh,
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
Incident Management Capability Metrics Version 0.1
Incident Management Capability Metrics Version 0.1 Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek April 2007 TECHNICAL REPORT CMU/SEI-2007-TR-008 ESC-TR-2007-008 CERT Program Unlimited distribution
Organizational Models for Computer Security Incident Response Teams (CSIRTs)
Organizational Models for Computer Security Incident Response Teams (CSIRTs) Georgia Killcrece Klaus-Peter Kossakowski Robin Ruefle Mark Zajicek December 2003 HANDBOOK CMU/SEI-2003-HB-001 Pittsburgh,
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
The Key to Successful Monitoring for Detection of Insider Attacks
The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0
Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0 John Haller Samuel A. Merrell Matthew J. Butkovic Bradford J. Willke April
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
Creating and Managing Computer Security Incident Handling Teams (CSIRTs)
Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
The CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
New Zealand Security Incident Management Guide for Computer Security Incident Response Teams (CSIRTs)
New Zealand Security Incident Management Guide for Computer Security Incident Response Teams (CSIRTs) Robin Ruefle Ken van Wyk Lana Tosic May 2013 New Zealand National Cyber Security Centre Government
Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
CERT Cybersecurity Training & Education
CERT Cybersecurity Training & Education Course Catalog 2016 SOFTWARE ENGINEERING INSTITUTE Cvr1 Our security training helps you use your knowledge, skills, and experience to successfully and effectively
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Defining Incident Management Processes for CSIRTs: A Work in Progress
Defining Incident Management Processes for CSIRTs: A Work in Progress Chris Alberts Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek October 2004 TECHNICAL REPORT CMU/SEI-2004-TR-015 ESC-TR-2004-015
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
CERT 1 System and Network Security Practices i
CERT 1 System and Network Security Practices i Julia Allen Carnegie Mellon University Software Engineering Institute Networked Systems Survivability Program, CERT Coordination Center This paper was presented
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Dawn M. Cappelli Andrew P. Moore CERT Program Software Engineering Institute Carnegie Mellon University 04/09/08 Session Code:DEF-203
Five-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
Cybersecurity Resources
Assessment Resources Cybersecurity Resources Cyber Resiliency Review (CRR) is a DHS assessment tool that measures the implementation of key cybersecurity capacities and capabilities. The goal of the CRR
Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.
The Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content, in whole or in
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Local Government Cyber Security:
The Local Government Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content,
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
Introducing... FedVTE and FedCTE
Introducing... FedVTE and FedCTE Sponsored by: Cybersecurity Education and Workforce Development Program (CEWD) DHS National Cyber Security Division October, 2010 Agenda FedVTE and FedCTE overview & how
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
AT&T Cybersecurity Policy Overview
AT&T Cybersecurity Policy Overview Chris Boyer AVP Public Policy July 24, 2012 2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
State of the Practice of Computer Security Incident Response Teams (CSIRTs)
State of the Practice of Computer Security Incident Response Teams (CSIRTs) Georgia Killcrece Klaus-Peter Kossakowski Robin Ruefle Mark Zajicek October 2003 TECHNICAL REPORT CMU/SEI-2003-TR-001 ESC-TR-2003-001
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
The Software Engineering. Today and in the Future. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213
The Software Engineering Institute t (SEI): Today and in the Future Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Paul D. Nielsen 1 May 2008 Software Engineering Institute
US-CERT Year in Review. United States Computer Emergency Readiness Team
US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Homeland Open Security Technology HOST Program
Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research
Bradford J. Willke, CISSP
Engineering National Cybersecurity and Critical Information Infrastructure Protection Bradford J. Willke, CISSP 16 October 2007 ITU Regional Workshop Buenos Aires, Argentina Overview Purpose: This session
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
PCI Data Security Standard 3.0
SECURELY ENABLING BUSINESS PCI Data Security Standard 3.0 Training Strategies That Work Presented by Doug Hall May 20, 2014 AGENDA PCI DSS 3.0 Training Strategies That Work PCI DSS 3.0 Overview PCI Training
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Commercial Practices in IA Testing Panel
Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
