Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
|
|
|
- Sherman Flowers
- 10 years ago
- Views:
Transcription
1 Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, :00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It is a privilege to address WTA-Advocates for Rural Broadband and its members. We appreciate the leadership role you have taken on so many important issues for small and rural carriers, and the key contributions you have made in many of the Commissions proceedings. As you know, one of the major responsibilities the FCC has is ensuring that our country s communications networks function reliably and securely. Strong cybersecurity policies and protections are crucial to maintaining that reliability and security. Cybersecurity isn t just about having good anti-virus software and changing your passwords, that is what we call cyber hygiene. Cybersecurity is a long-term risk management approach that should be baked into all levels of strategic thinking. We have been working to ensure that all sectors of the communications arena are equipped to protect their networks and businesses from cyber attacks. This work needs the participation and cooperation of all parties: government and industry,
2 public and private, large and small, groups and individuals. Our cybersecurity efforts at the FCC have been aimed at including all stakeholders in this effort. We have taken a collaborative approach to cybersecurity, working in partnership with private-sector stakeholders through a federal advisory committee, the Communications Security, Reliability and Interoperability Council (otherwise known as CSRIC ). Through CSRIC we have worked closely with members of the communications industry because we know that a proactive industry posture that is measurable and accountable lies at the heart of the communications security and reliability strategies we need to maintain the integrity of our networks. We have to do it together, in a coordinated approach that draws on every stakeholder s particular strengths. At a public meeting in March, CSRIC IV unanimously voted to recommend to the FCC voluntary mechanisms to implement cyber risk management practices based on the 2014 NIST Cybersecurity Framework to the communications sector. The federal government and private industry in the U.S. have both identified the NIST Framework as the best mechanism for tackling cybersecurity. It can be utilized to update or develop cyber risk management programs and is adaptable to an entity s unique circumstances. 2
3 The CSRIC effort encompassed all five communications industry segments wireline, wireless, satellite, cable, and broadcast. These segments were able to prioritize the risk factors presented in the NIST Framework of the most important to them. Each industry segment further defined their core network and critical infrastructure and services and focused on providing a roadmap for their industry to align their specific operations to that of the NIST Cybersecurity Framework. In addition, a Small and Medium Business Group specifically focused on how to apply the NIST Cybersecurity Framework to small and medium sized operations, while respecting challenges related to their size and limited resources, also contributed to the effort. All of these groups worked together to create the foundation of a new paradigm, where industry implements measurable and accountable voluntary mechanisms that potentially can address fast-changing technology-based issues better than prescriptive regulation. There is no truer test of this new paradigm than cybersecurity. The FCC knows that smaller carriers often have fewer resources available to them and Section 9.9 of the CSRIC Report offers guidance designed specifically for smaller carriers. This section provides smaller carriers with a formalized and structured risk management approach to address cybersecurity, applying the NIST Framework based upon their unique needs and operational environment. The SMB 3
4 group evaluated the 98 subcategories in the NIST Framework and selected a highpriority subset of 37 for smaller carriers to use as a starting point in their assessment. The high priority subset can be found in Appendix II. It lays out three basic questions for smaller carriers: What do you need to protect? Who has the responsibility for a given task? and, How will you protect your core network and critical infrastructure and services (i.e. develop plans for identification, prevention, recovery, and continual improvement)? The day after CSRIC adopted the recommendations, the FCC put them out for public comment. We want to hear the opinion of folks in the sector and in related industries as to how they view the recommendations and whether the voluntary mechanisms proposed provide a sufficient basis for the FCC to conclude that all industry segments are effectively managing cyber risk. The comment period is open through May 29th (with replies requested by June 6), and we hope to hear from as broad a cross-section of the U.S. as possible, to help us as we look toward our next task: implementation and certification. As we shift our focus to implementation, I want to discuss what is necessary for the successful execution of the Commission s cyber strategy, notably our plans to assure accountability and enhance information sharing by private sector 4
5 stakeholders. CSRIC developed a range of activities intended to provide transparent assurances to the FCC, to DHS, to industry, and to consumers. These visible assurances should provide confidence that companies throughout the sector are actually taking effective steps to manage cyber risk. However, we still need to ensure that these commitments will lead to meaningful, long-term action and results. CSRIC s core proposal is that members of the communications sector volunteer to participate in individualized, face-to-face meetings with the FCC to discuss each company s cyber risk management priorities, methods to address them, and the effectiveness of these methods. These meetings would be guided by the NIST Framework and occur at periodic intervals. How will this assurance process work in practice? We are still working out the details, with input and ideas from industry, and we certainly need to hear more from small and medium sized carriers, but we have already identified a few fundamental points. First, these assurance meetings will not be depositions. We do not envision an adversarial process in which owners and officials are crossexamined in an attempt to draw out embarrassing admissions about security lapses. On the other hand, we need to hear more than prepared remarks read off a script 5
6 about general processes and procedures. The ideal that we envision is a process that is open, honest, and interactive, with the parties working as partners in addressing a matter of national concern. Both groups should benefit from the exchange, as the FCC staff gain better appreciation for the challenges and the range of approaches applied against these challenges. Of course, the frankness and candor of these exchanges will depend largely on whether companies feel that they can trust in the process. There must be adequate safeguards in place to ensure that any sensitive information shared during these meetings is protected from public disclosure. Companies must also be relieved of any suspicion that information shared in these meetings will be used to generate regulatory proposals. That is not their purpose. So just what is our expectation for these meetings? The answer is that we expect a thorough demonstration that a company s cyber risk management program is effective. Using the risk framework drives companies to consider their readiness not just in stopping attacks, but in each of the Identify, Protect, Detect, Respond, and Recover phases critical to minimizing the impact of a malicious attack. The risk framework doesn't stand alone, companies need to have threat intelligence, they need to address supply chain risk and insider threats among other areas, but 6
7 the Risk Management Framework provides a great foundation from which to see the gaps and organize effective mitigation. To be clear, the FCC s role is not to second-guess a company s business judgment or to micromanage its implementation of the NIST Framework. We simply care about one question: Does it work? Are companies regularly and systematically assessing threats and vulnerabilities, analyzing their capacity to address risk effectively, and mitigating risk through people, processes, and systems? Of course, the business of assessing and measuring the effectiveness of a company s practices is not that simple. There needs to be a common understanding of the indicators of success. What does a cyber-secure network look like? CSRIC s report emphasizes the importance of network availability that is, the ability of networks to continue delivering service in the face of an attack. Further work needs to be done to develop quantitative metrics around this concept, and related concepts such as confidentiality and integrity of network services and information flows. There is an old management axiom: if you can measure it, you can manage it. Never has that been more important than in cyber. 7
8 Without a doubt, CSRIC has outlined a process with real promise, and they deserve high marks for getting us to this point. But because there is a lot of material in their report to consider, and many parties outside the CSRIC process are likely to have their own ideas to contribute, as I stated earlier, we ve put CSRIC s report out for public comment. I encourage you all to read the report if you haven t already and give us your thoughts. We need to hear from small and medium sized businesses in particular, to figure out the most effective and efficient way to meet with all of you to ensure that your company s cyber risk management program is effective but not to place too great a burden on anyone as part of that process. When fully developed and properly implemented, I believe that CSRIC s assurance model will provide much-needed accountability for network security, while avoiding top-down prescriptive regulation of industry practices. A cooperative and collaborative approach is the FCC s preferred means of engagement. I have every reason to be confident the industry will live up to its commitments and deliver meaningful action. But the hard work has only begun and our review of these next steps will be guided by the fact that cybersecurity is a national imperative. As we move into the implementation phase of the cybersecurity roadmap, perhaps the biggest challenge we must tackle is improved information sharing. This is a 8
9 common challenge and there must be mechanisms in place to enable the flow of real-time information among relevant stakeholders, so that they can work together in real-time. The highest need for this collaboration is in the private sector, in particular among the operators of our nation s interdependent networks and their customers. Let s pause here to emphasize the word interdependent. The simple fact is that a network is a network because it connects with other networks. Now, concerns have been raised in the past about the logistics and the legality of communications networks sharing cyber threat information with their competitors. But in an interdependent world, such sharing is essential. My view is that there are no insurmountable barriers to making this work, and the public interest demands nothing less. Recent guidance from the Justice Department and Federal Trade Commission suggests that antitrust concerns should be minimal to non-existent if the sharing is framed correctly. If there are other lingering anxieties, let s get them out in the open and address them together. If there s a will, there s a way. In our effort to improve the flow of real-time cyber threat information, the FCC works in close partnership with the Department of Homeland Security, which takes 9
10 the lead in information sharing within government. Most recently, the FCC has established a partnership with DHS that provides the FCC access to the NCCIC (National Cybersecurity and Communications Integration Center), which is the single authoritative focal point for the sharing of cyber threat indicators. The FCC has a mature outage reporting mechanism in place with the communications sector, which we share with DHS and have proposed to share with the states, and it is our goal to avoid duplicative reporting requirements and to ensure that the interface with industry is clearly outlined. As the nation s network agency, the FCC has a unique role to play in any discussion about network security. It s part of our statutory charge to protect the safety of communications for the benefit of the public. Specifically, think about the reliability and resilience of networks to complete a 911 call. Traditionally, the FCC has ensured the overall reliability of communications networks through a twopronged approach: voluntary industry best practices, coupled with mandatory reporting of significant network outages. This approach has resulted in the world s best emergency call network, through continual improvements in the state of network reliability. The time has come to think about whether and how cybersecurity fits into this framework. Though cyber attacks may not cause network outages in the 10
11 traditional sense of the term, the most severe attacks can cripple service for vast swaths of users. When we talk about the security of our networks we must also think about public safety. Reporting on these events may helpfully complement other methods the FCC uses to gather information about the cyber health of our communications networks. We are also continuing to examine how the concept of cybersecurity intersects with other aspects of the FCC s statutory mission. For instance, the FCC has explicit responsibilities to protect the privacy of data that communications providers collect from their customers in the everyday course of business. Consumers have a right to expect that this information will be protected from disclosure. Failure to do so can have a chilling effect on free expression and the virtuous cycle of network investment and innovation. Let me close by touching briefly on a critical long-term key to combating online threats: the cybersecurity workforce. Simply put, the largest single investment in an effective cyber program is in its people. To assure we have a workforce capable of defending against cyber threats, it will take a shift in our thinking. Specifically, the people element of cyber has to 11
12 become a bigger part of our corporate thinking. We need to bridge the gaps between cyber IT and HR, and engage with the institutions that educate and train the next generation of cyber-capable workers. The Defense Department and the intelligence community recognized this several years ago and took proactive steps to jumpstart the pipeline of new cyber professionals for its own needs. We need a similar commitment to meeting the talent needs of private industry, as well as state and local government. As the cyber threat landscape changes, so too must the practice of cybersecurity and its relation to other disciplines. We need to make sure we are investing sufficiently in the next generation of cyber engineers, but also in cyber lawyers, auditors, and business leaders. Cyber risk managers may very well be the next interdisciplinary cyber specialty on everyone s to hire list. NIST has done great work in this area, and the FCC is committed to leveraging that work and promoting the development of qualified cyber professionals to meet the growing need for workers to secure our critical communications infrastructure in the public and private sectors. Soon we will be considering new assignments for CSRIC, and this a topic that I will expect them to tackle. I also expect that workforce issues will play a meaningful role in the work of an FCC task force that is examining the emerging challenges that face 911 call centers. 12
13 We need people who can interpret and translate the language of cyber risk at all levels of the business and government, up to the C-Suite, as well as communicate with investors and regulators. Cybersecurity cannot be imposed from above; it must be built into institutions and enterprises from the bottom up. A culture of cyber responsibility and professionalism cannot be developed overnight, nor can the FCC do this alone. Cybersecurity needs to become part of the lexicon, part of the way we do business. Today, I have discussed three of the highest priorities at the FCC: implementation of new risk-based cyber programs across the commercial sector; greatly enhanced information sharing about cyber threats between companies and the government, and an educated and trained cyber workforce ready to meet the demand inherent in the technology transitions occurring across the communications landscape. So, I ll conclude by talking directly to you as small and medium sized carriers, these plans will only succeed if there are real commitments to cybersecurity from those who own all parts of our communications networks. Our smaller carriers must become cybersecurity leaders by making it clear throughout the country, even in our most rural and remote areas, that cybersecurity is a national priority that affects us all. We are all in this together. And by we I don t just mean the 13
14 networks and the FCC I mean all Americans. We must get this right. Working together, sharing information, and taking well-coordinated measures to secure and restore critical communications capabilities will ensure the continued availability of these vital links for our society. I now look forward to your questions. 14
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Docket No. DHS-2015-0017, Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations
Submitted via [email protected] and www.regulations.gov July 10, 2015 Mr. Michael Echols Director, JPMO-ISAO Coordinator NPPD, Department of Homeland Security 245 Murray Lane, Mail Stop 0615 Arlington VA
Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA
8 th Annual Safeguarding Health Information: Building Assurance through HIPAA Security HHS Office of Civil Rights and National Institute of Standards & Technology Wednesday September 2, 2015 Suzanne B.
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Examining the Evolving Cyber Insurance Marketplace
Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,
Why you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
How To Understand And Manage Cybersecurity Risk
White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 8 April 2015 [email protected] Agenda Mission of NIST Cybersecurity at NIST Cybersecurity Framework
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
PROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT Cybersecurity Framework: Where Do We Go From Here? February 25, 2014 Just over a year ago, President Barack Obama signed an Executive Order (EO) calling for increased cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
Preparing for the Convergence of Risk Management & Business Continuity
Preparing for the Convergence of Risk Management & Business Continuity Disaster Recovery Journal Webinar Series September 5, 2012 2012 Strategic BCP, Inc. All rights reserved. strategicbcp.com 1 Today
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst
TRACESECURITY WHITE PAPER GRC Simplified... Finally. A Guide to Successfully Implementing the NIST Cybersecurity Framework Jerry Beasley CISM and TraceSecurity Information Security Analyst TRACESECURITY
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Navigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association
Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association EXECUTIVE SUMMARY: The increased integration of information
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
Applying Framework to Mobile & BYOD
Applying Framework to Mobile & BYOD Framework for Improving Critical Infrastructure Cybersecurity National Association of Attorneys General Southern Region Meeting 13 March 2015 [email protected]
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Strategic Plan. Valid as of January 1, 2015
Strategic Plan Valid as of January 1, 2015 SBP 00001(01/2015) 2015 City of Colorado Springs on behalf of Colorado Springs Page 1 of 14 INTRODUCTION Integrated and long-term strategic, operational and financial
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
The NIST Cybersecurity Framework
View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
