The Internet Security Alliance

Size: px
Start display at page:

Download "The Internet Security Alliance"

Transcription

1 The Internet Security Alliance The Internet Security Alliance is a collaborative effort with Carnegie Mellon University. It is a cross-sector, internationallybased trade association devoted to cyber security. ISA has individual corporate memberships and wholesale memberships with TIA, NAM, AIA & other associations

2 ISA Board of Directors Ty Sagalow, Esq. Chair President, Innovation Division, Zurich Tim McKnight Second V Chair, CSO, Northrop Grumman J. Michael Hickey, 1 st Vice Chair VP Government Affairs, Verizon Marc-Anthony Signorino, Treasurer National Association of Manufacturers Ken Silva, Immediate Past Chair, CSO VeriSign Joe Buonomo, President, DCR Jeff Brown, CISO/Director IT Infrastructure, Raytheon Lawrence Dobranski, Chief Strategic Security, Nortel Gen. Charlie Croom (Ret.), VP Cyber Security, Lockheed Martin Eric Guerrino, SVP/CIO, bank of New York/Mellon Financial Pradeep Khosla, Dean Carnegie Mellon School of Computer Sciences Bruno Mahlmann, VP Cyber Security, Dell-Perot Systems Linda Meeks, VP CISO, Boeing Corporation

3 Why? ISAlliance Mission Statement ISA seeks to integrate advancements in technology with pragmatic business needs and enlightened public policy to create a sustainable system of cyber security.

4

5 ISA Cyber Social Contract Similar to the agreement that led to public utility infrastructure dissemination in 20 th Century Infrastructure development -- market incentives Consumer protection through regulation Gov t. role is more creative harder motivate, not mandate, compliance Industry role is to develop practices and standards and implement them

6 President Obama s Report on Cyber Security The United States faces the dual challenge of maintaining an environment that promotes efficiency, innovation, economic prosperity, and free trade while also promoting safety, security, civil liberties, and privacy rights. (President s Cyber Space Policy Review page iii) Quoting from Internet Security Alliance Cyber Security Social Contract: Recommendations to the Obama Administration and the 111th Congress November 2008

7 ISA Obama CSPR Major Points of Agreement Cyber Security is a priority national issue White House needs to take leadership role Need an Enterprise Wide Risk Management approach to cyber security Cyber security is as much a strategic & economic issue as an operational & technology issue Private Sector is on the front lines of the cyber security defense, hence need partnership Market incentives, not regulation, must be deployed to enhance private sector cyber security

8 Social Contract II Implementing the Obama Cyber Security Strategy via the ISA Social Contract Model

9 Chapter 1: Economics of Cyber Security All the current incentives favor the bad guys Attacks are cheap, easy, very profitable & the perimeter to attack is virtually limitless Defense can be hard, expensive, a generation behind the attackers and ROI is hard to show Cost of cyber attacks are not transparent So long as the economic equation of cyber security is unbalanced we will have attacks

10 Cyber Space Policy Review is Pro-Economic The Cyber Coordinator will report to the National Economic Council as well as the National Security Council CSPR embraces a enterprise wide risk management philosophy (including Enterprise Education) For the first time the government proposes the use of economic incentives to promote better private sector security

11 Chapter 2: Partnership at the Business Plan Level Studies, CIA, NSA all say we know how to solve 80-90% of the problem---just not doing it Regulation doesn t fit the I-Net (slow, minimalist, US only, create economic & security problems) Obama personally rejected regulation of PS Gov role to evaluate & create incentives for adopting good cyber secure policies practices and technologies just as in other areas of economy Market incentives endorsed by Obama CSPR

12 Congressional Testimony October, 2007

13 1. R & D Grants 2. Tax incentives 3. Procurement Reform 4. Streamlined Regulations 5. Liability Protection 6. Public Education 7. Insurance 8. SBA loans 9. Awards programs 10. Cyber SAFETY Act ISA Testimony on Incentives (May 1, 2009)

14 Obama s Report on Cyber Security (May 30, 2009) The government, working with State and local partners, should identify procurement strategies that will incentivize the market to make more secure products and services available to the public. Additional incentive mechanisms that the government should explore include adjustments to liability considerations (reduced liability in exchange for improved security or increased liability for the consequences of poor security), indemnification, tax incentives, and new regulatory requirements and compliance mechanisms. President s Cyber Space Policy Review May 30, 2009 page vs.» Quoting Internet Security Alliance Cyber Security Social Contract: Recommendations to the Obama Administration and 111 th Congress

15 Chapter 3: Information Sharing Current model doesn t work Modern business systems too open Limited participation in ISACs especially SMEs Gov wont give source material, industry won t give attack data or important internal information Can t keep out determined attackers Once in the systems we have more control over attackers

16 Information Sharing-- Incentives Large Orgs become designated reporters (gold, silver etc.) which can be used for marketing Rpt C2 sites, (URLs-web sites) not that they have been breached or internal data Gov reports---not source data AV community circulate the info for profit Small companies able to participate easy and cheap to block C-2

17 Securing The IT Supply Chain In The Age of Globalization November, 2007

18 Chapter 4 Supply Chain ISA & CMU launched its supply chain project in Conferences at CMU and DC w/more than 100 industry, govt. and academic experts CMU Report 2007/2008 Scott Borg US Cyber Consequences Center leading effort in 2009/2010 Focus on hardware/firmware

19 Securing the IT Supply Chain The challenge with supply chain attacks is that a sophisticated adversary might narrowly focus on particular systems and make manipulation virtually impossible to discover. Foreign manufacturing does present easier opportunities for nation-state adversaries to subvert products; however, the same goals could be achieved through the recruitment of key insiders or other espionage activities. For organizations that have not yet made cyber security a true priority there are other barriers, often primarily economic. President s Cyber Space Policy Review May 30, 2009 page 34

20 Supply Chain Economic Issues Secure Foundry unsustainable (think prisons) Govt. mandates unsustainable We are inherently a global economy US firms can t compete with heavy special burdens Mandating security for US firms will hurt economically, reduce quality and harm security by driving providers off-shore even more

21 ISA Supply Chain Framework 5 Phases, design, fabrication, assembly, distribution & maintenance Remedies to interuption of production, corruption of production, discrediting of production and loss of control of production Legal Support for : unambigious contracts w/ security measures, responsible corporation w/long term interests, motivation 4 workers and execs, verification & enforcement

22 2010 Supply Chain Agenda 5 Workshops in first 2 quarters of 2010 I. Securing the Design and Fabrication Phases. II. Securing the Assembly, Distribution, and Maintenance Phases. III. Establishing the Necessary Legal and Contractual Conditions.

23 Chapter 4: Enterprise Education focus on $ It is not enough for the information technology workforce to understand the importance of cyber security; leaders at all levels of government and industry need to be able to make business and investment decisions based on knowledge of risks and potential impacts. President s Cyber Space Policy Review May 30, 2009 page 15 ISA-ANSI Project on Financial Risk Management of Cyber Events: 50 Questions Every CFO should Ask ----including what they ought to be asking their General Counsel and outside counsel. Also, HR, Bus Ops, Public and Investor Communications & Compliance

24 Releasing the Cyber Security Social Contract November, 2008

25 Financial Management of Cyber Risk 2010 * Phase I 50 questions CFOs ask Complete Phase II responses to the 50 questions every CFO Should ask operations, HR, risk manager, communications, legal & compliance Phase III Separate Programs & best practice for each organizational section on cyber security CIO Net & European Commission request proposals for EU versions of ISA/ANSI program

26 Chapter 5 & 6 VOIP standards & Old Laws The history of electronic communications in the United States reflects steady, robust technological innovation punctuated by government efforts to regulate, manage, or otherwise respond to issues presented by these new media, including security concerns. The iterative nature of the statutory and policy developments over time has led to a mosaic of government laws and structures governing various parts of the landscape for information and communications security and resiliency. Effectively addressing the fragmentary and diverse nature of the technical, economic, legal, and policy challenges will require a leadership and coordination framework that can stitch this patchwork together into an integrated whole. President s Cyber Space Policy Review May 30, 2009 page C-12

27 Developing SCAP Automated Security & Assurance for VoIP & Converged Networks September, 2008

28 ISA Partners

29 VoIP Participants Chair of the Applicability Group Paul Sand, Salare Security AJ West, Boeing Alex Fielding, Ripcord Networks Allie Larman, Oklahoma Office of State Finance Andrew Bove, Secure Acuity Networks, LLC Andriy Markov, VoIPshield Systems Inc. Barry Wasser, Department of Homeland Security Blake Frantz, Center For Internet Security Bob Moskowitz, ICSAlabs, an Independent Division of Verizon Business Systems Bogdan Materna, VoIPshield Systems Inc. Calvin Bowditch, Joint Task Force-Global Network Operations Carl Herberger, Evolve IP Cheri Sigmon, Department of Defense Cynthia Reese, Science Applications International Corporation (SAIC) David Lukasik, Department of Veterans Affairs Dawn Adams, EWA-Canada Denise Walker, DBA, Lone Star College System Ed Stull, Direct Computer Resources Ed White, McAfee Edward Cummins, Raytheon Gary Gapinski, National Aeronautics and Space Administration Imran Khan, Consultant James Mesta, Agilent Technologies, Inc. Jeffrey Ritter, Waters Edge Consulting Jim Meyer, Institute for Defense Analyses John Fulater, HSBC North America Joseph Dalessandro, Withheld Ken Fee, Firefly Communications Ken Stavinoha, Microsoft Kenneth Kousky, Salare Security, LLC Kevin Watkins, McAfee Laurie Hestor, Defense Information Systems Agency Linda Kostic, etrade Financial Lorelei Knight, ICSAlabs, an Independent Division of Verizon Business Systems Lynn Hitchcock, Raytheon Mark Humphrey, Boeing Matt Trainor, Nortel Networks Paul Salva, HSBC North America Pete Eisele, Northrop Grumman Peter Thermos, Palindrome Technologies Rick Mellendick, Food and Drug Administration Robert Smith, Global UniDocs Company Ronald Rice, Defense Information Systems Agency Scott Armstrong, Gideon Technologies Shawn Dickson, Raytheon Sheila Christman, National Security Agency Steve Carver, FAA (Retired) Steven Draper, National Security Agency Terry Rimmer, Oklahoma Office of State Finance Tom Grill, VeriSign

30 VOIP legal and technical products 1.Legal Compliance & Security Report describes Available Unified Communications (UC) Technologies Security Risks of Deployment Inventory of Laws to be considered pre deployment If ECPA creates a legal barrier to deployment Toolkit for lawyers and clients to assist in avoiding exposure from deployment 2. Technical w/nist Program addresses SCAP Suitability and baseline standards NSA/DHS Grant proposal

VoIP Security Project: SCAP Applicability Work Group. www.isalliance.org

VoIP Security Project: SCAP Applicability Work Group. www.isalliance.org VoIP Security Project: SCAP Applicability Work Group Outline Introductions The Challenge Working Group Process Applicability of the SCAP Standards Future Needs Q&A Applicability Participants Chair of the

More information

Application of SCAP to Secure Unified Communications. www.isalliance.org

Application of SCAP to Secure Unified Communications. www.isalliance.org Application of SCAP to Secure Unified Communications Participants Co-Chairs of the Baseline Standards Group Mark Humphrey, Boeing and Scott Armstrong, Gideon Technologies AJ West, Boeing Alex Fielding,

More information

Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0.9

Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0.9 1 1 1 1 1 Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0. 1 Page 1 of 1 1 1 1 1 1 1 1 0 1 This publication is for informational

More information

Social Contract 2.0: A 21st Century Program for Effective Cyber Security

Social Contract 2.0: A 21st Century Program for Effective Cyber Security Social Contract 2.0: A 21st Century Program for Effective Cyber Security Board of Directors Larry Clinton President, Internet Security Alliance Ty Sagalow ISAlliance Board Chair Executive Vice President

More information

Policy Recommendations

Policy Recommendations The Cyber Security Social Contract Policy Recommendations for the Obama Administration and 111 th Congress A Twenty-First Century Model for Protecting and Defending Critical Technology Systems and Information

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer

The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer Who We Are What we believe n The World has Changed n Globalization n

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology

Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology Commission Members Chairs Representative James R. Langevin Chairman of the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology Representative Michael T. McCaul

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA

More information

Supplier Vigilance: A Critical Layer of Defense

Supplier Vigilance: A Critical Layer of Defense Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1 Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2 Synopsis Lockheed

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse

More information

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS AN INFORMATION SECURITY BATTLEFIELD From Static to Dynamic Defense Cyber Security Strategies, LLC 1 2008-2010 Is The Cyber Tipping Point ESTONIA GEORGIA CABLE

More information

INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY

INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY A White Paper Author: Guy Huntington, President, Huntington Ventures Ltd. Date: February 20, 2009 1 Integrating the Two Worlds of Physical and Logical Security Guy Huntington, Huntington Ventures Ltd.

More information

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information

More information

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon ([email protected]) EY Professor of Managerial Accounting and Information Assurance Affiliate

More information

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

Improving our Nation s Cybersecurity through the Public Private Partnership

Improving our Nation s Cybersecurity through the Public Private Partnership Improving our Nation s Cybersecurity through the Public Private Partnership A White Paper Presented by March 8, 2011 1 EXECUTIVE SUMMARY We live and work in, and are dependent on, a networked world. That

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET www.whitehouse.gov/omb

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET www.whitehouse.gov/omb EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET www.whitehouse.gov/omb Testimony of Beth Cobert Deputy Director for Management, Office of Management and Budget before the House Committee

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

AUDIT REPORT. Cloud Software as a Service (SaaS) Procurement and Governance Audit. June 9, 2016

AUDIT REPORT. Cloud Software as a Service (SaaS) Procurement and Governance Audit. June 9, 2016 AUDIT REPORT Cloud Software as a Service (SaaS) Procurement and Governance Audit June 9, 2016 Table of Contents: Page Executive Summary Background 1 Audit Objectives and Scope 1 Management s Assessment

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

U.S. Department of Transportation Intelligent Transportation Systems Program Advisory Committee. ITS Program Advisory Committee

U.S. Department of Transportation Intelligent Transportation Systems Program Advisory Committee. ITS Program Advisory Committee U.S. Department of Transportation Intelligent Transportation Systems Program Advisory Committee ITS Program Advisory Committee Minutes of November 18, 2013 Web Conference Subject CONTENTS Page 1. General...

More information

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT

More information

Using CMMI Effectively for Small Business Panel

Using CMMI Effectively for Small Business Panel Using CMMI Effectively for Small Business Panel (With interactive discussion from panel and audience recorded in slides) NDIA CMMI Working Group NDIA Systems Engineering Division 2010 CMMI Technology Conference

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented

More information

Delving Into FCC's 'Damn Important' Cybersecurity Report

Delving Into FCC's 'Damn Important' Cybersecurity Report Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Managing the Shadow Cloud

Managing the Shadow Cloud Managing the Shadow Cloud Integrating cloud governance into your existing compliance program August 2014 Shadow IT is not a new concept and organizations are well aware of the risks associated with unauthorized

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield,

More information

SSC Operations IT Transformation in Motion

SSC Operations IT Transformation in Motion SSC Operations IT Transformation in Motion Financial Management Institute (FMI PD Week 2013) November 28, 2013 Kevin Radford Senior Assistant Deputy Minister Operations Branch Outline SSC OPERATIONS IT

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

TRANSITIONING THE IMF TO CADE2

TRANSITIONING THE IMF TO CADE2 WRITTEN TESTIMONY OF TERENCE MILHOLLAND CHIEF TECHNOLOGY OFFICER INTERNAL REVENUE SERVICE BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE ON IRS LEGACY INFORMATION TECHNOLOGY SYSTEMS MAY 25,

More information

How To Manage Risk

How To Manage Risk Oracle Applications Day Zürich, 1. Juli 2009 Risk und Performance Management in Stürmischen Zeiten mit Oracle GRC Steven Hagner EMEA GRC Sales Organization 1 Safe Harbor Statement The following is intended

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

Texas Infrastructure Council Planning and building the future for Texas' infrastructure

Texas Infrastructure Council Planning and building the future for Texas' infrastructure TXIC Texas Infrastructure Council Planning and building the future for Texas' infrastructure Texas Infrastructure Council Mission To support state and local governments in the formation and implementation

More information

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009 National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in

More information

Sales and Marketing Optimization. Distribution Research Consortium

Sales and Marketing Optimization. Distribution Research Consortium Sales and Marketing Optimization Distribution Research Consortium Sales & Marketing Optimization Consortium Optimizing Sales Force Activities and Marketing Effectiveness The is establishing a research

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

SOFTWARE LICENSES. DOD s Plan to Collect Inventory Data Meets Statutory Requirements

SOFTWARE LICENSES. DOD s Plan to Collect Inventory Data Meets Statutory Requirements United States Government Accountability Office Report to Congressional July 2014 SOFTWARE LICENSES DOD s Plan to Collect Inventory Data Meets Statutory Requirements GAO-14-625 July 2014 SOFTWARE LICENSES

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

ASHRAE American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc.

ASHRAE American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. Shariq Ali Tom Phoenix, PE - ASHRAE Eric Baluch Tom Phoenix, PE - ASHRAE Douglas Barnes Tom Phoenix, PE - ASHRAE Lou Bentzen Tom Phoenix, PE - ASHRAE Shawn Beres Tom Phoenix, PE - ASHRAE Ken Borah Tom

More information