Managing Risk in Global ICT Supply Chains
|
|
|
- Audrey Baldwin
- 10 years ago
- Views:
Transcription
1 Managing Risk in Global ICT Supply Chains Best Practices and Standards for Acquiring ICT Ready for what s next.
2
3 Managing Risk in Global ICT Supply Chains Emerging best practices and standards can significantly reduce cybersecurity risks by helping organizations work closely with suppliers to track hardware and software products throughout their supply chains and lifecycles. Information and communications technology (ICT) has become the lifeblood of modern civilization. People and organizations rely on ICT to support critical activities and missions. ICT is created, supported, and integrated into complex, globally distributed networks of ICT supply chains, as depicted in Exhibit 1. These supply chains are not visible to, or well understood by, those who acquire and use the technology. This lack of visibility and understanding creates ample opportunities for intentional compromise of the IT components while they are being created, assembled, and delivered throughout the supply chain. In addition, poor manufacturing, software development, and delivery practices can also open doors for compromising these components after they are installed and operational. As a result, many organizations face significant risk due to the high probability that the global IT infrastructure, including their own networks and systems, relies on tampered or tainted ICT components that could either stop working unexpectedly or compromise the data that is delivered, processed, and stored by the IT infrastructure. Exhibit 1 Modern ICT Supply Chains Buyer System Integration Support Reuse Subcontract Legacy Software Open Source Software Maintenance & Support Software Integration Trouble Ticket System Outsource Offshore COTS Application Framework Acquire Develop In-house Hardware Integration RAID Arrays IV&V Support Softwareas-a-Service COTS Application COTS Plug-in COTS Web App. Software Integration Outsourced SW COTS Operating System Develop In-house Crowd Source Reuse Outsourced Custom SW Open Source SW Crypto Devices Outsource Offshore Legacy SW Server Hardware Help Desk Support Custom Development Sources: Booz Allen Hamilton expanded diagram. DACS, Secure Software Engineering, Scope of Supplier Expansion and Foreign Involvement graphic in Software Development Security: A Risk Management Perspective, (July 2005) 1
4 Information and Communications Technology Encompasses all categories of technology used for gathering, storing, transmitting, retrieving, or processing of information Includes microelectronics, printed circuit boards, computing systems, software, signal processors, cell phones, satellite communications, and networks Can be a stand-alone component such as a software application or memory chip, a commodity (laptop), or part of a larger system (avionics in a jet airliner) Diversified ICT Supply Chains Create Benefits and Risks Diversifying the global ICT supply chains from design and acquisition to integration, operation, maintenance, and disposal provides numerous opportunities for cost-savings and flexibility. Unfortunately, it also introduces risks and creates opportunities for adversaries to compromise IT infrastructure. Within the last few years, the media has exposed examples of broken or infiltrated ICT supply chains, particularly with respect to counterfeit assets surfacing within US federal government networks, insertion of malicious code into critical infrastructure, and poor quality ICT design and development that resulted in disclosure of sensitive data and put US government missions and national critical infrastructure at risk. ICT supply chains incorporate multiple levels of suppliers spanning multiple continents and produce anything from conventional ICT products (for example, servers, routers, mobile devices) to specialized components, legacy systems, and spare parts. The actors in these supply chains range from system integrators to software developers, hardware manufacturers (for example, chips and other logic bearing components), and media storage disposal providers. Examples of ICT Supply Chain Risks Cost-driven Risks. Cost considerations often drive decisions to obtain inexpensive parts, motivating less trustworthy suppliers to provide lower-quality parts that have faster degradation rates. Some suppliers knowingly flood the market with counterfeit items that do not conform to required standards. Obsolescence. Vendors discontinue hardware and software production as technology advances or business priorities change. This often results in the lifetime of a system significantly outlasting the lifetime of its components. System owners need to find alternative sources, some of which, unknowingly, are unauthorized suppliers. The only alternative is to perform costly upgrades or replace the systems. The defense and aerospace sector calls this phenomenon Diminishing Manufacturing Sources and Material Shortages (DMSMS). Insertion of Malicious Content. The insertion of logic bombs, backdoors, and spyware in microchips and circuit logic, firmware, and software can sabotage or subvert the components they supply. Unintentional Supplier Activities. Unintentional actions, such as errors in software coding, or overlooking faults due to inadequate hardware testing, can result in significant risks to system operation and integrity when the erroneous components are installed. 2
5 3
6 4
7 Incorporating ICT SCRM in Acquisition Decisions Organizations should address the risks associated with geographically dispersed global ICT supply chains by changing acquisition processes for ICT-enabled systems and components. By integrating ICT Supply Chain Risk Management (SCRM) considerations into the entire system lifecycle from initial planning and acquisition to disposal, they can increase efficiency and reliability of individual ICT acquisitions. Key Acquisition Considerations What do you need to know about supplier practices to ascertain that critical components will perform as intended What specific information can you request from suppliers to obtain appropriate visibility through the multiple tiers of supply chain How much visibility into supplier IT development processes do you need Does a supplier s physical location present additional risks (for example, is the region prone to unstable political environments or natural disasters) How are the risks of malicious, poor quality, or counterfeit IT components addressed in contracts and contracts oversight Do suppliers have robust delivery practices that ensure that components are not tampered or tainted en route How will the supplier be required to demonstrate compliance with your requirements How will the supplier validate product and service integrity Acquirers are often unaware of critical supplier processes and practices that could impact their ICT infrastructures. They also often lack the skills required to understand and manage potential risks. Acquirers can mitigate risk by establishing explicit expectations with suppliers regarding specific supplier practices, and monitoring and validating these practices. For example, due diligence in the source selection process should include not just how and where the supplier does business, but the implications concerning how its business culture and practices may affect its readiness or ability to deliver trustworthy products or services. Analyzing the global risks identified through better ICT supply chain visibility will allow organizations to take preventative measures to reduce risk exposure from malicious threats and intentional and unintentional non-malicious threats at all levels of the supply chain. Working with ICT Suppliers to Manage Supply Chain Risks Hardware and software used in ICT solutions have gone through a significant evolution over the last 20 years. Historically, one company could develop and provide a complete solution. The company would design, develop, and manufacture all of the hardware, or design and develop software, using proprietary models and dedicated employees. Today, ICT is assembled and integrated using components from a global web of suppliers. Companies acquire pieces from many providers and merge with or acquire business partners to create custom solutions to meet customer needs. An ICT supplier can simultaneously act as an acquirer and a supplier, depending on their placement in the supply chain. Cost, schedule, and performance tend to be the factors that drive the risk management decisions of ICT suppliers today. As acquirers demand increased visibility into how ICT is put together, including proof of authenticity and integrity, suppliers are challenged with incorporating appropriate practices into the manufacturing or development lifecycle. Acquirers are using industry standards and best practices as a way 5
8 to articulate their expectations to suppliers, most of whom have a proprietary approach that may or may not be aligned with these standards. This results in a gap between acquirer expectations and supplier understanding of those expectations, creating further uncertainties about potential liabilities assumed by suppliers. At the same time, suppliers are incurring additional costs to demonstrate compliance with one or more standards. Regardless of the development practices in use or the standards being required, suppliers must consider how they and their own suppliers are addressing basic acquirer expectations. The primary concern of most acquirers is that the resulting system remains operational within appropriate parameters under adverse conditions (such as an attack or service degradation), and that the information the system is intended to transmit, process, and store remains protected. According to the Software Assurance Forum for Excellence in Code (SAFECode), security and integrity controls are critical to suppliers ability to demonstrate that they have addressed acquirer concerns, including protection of intellectual property and the potential of counterfeit components in the supply chain. Managing ICT Supply Chain Risk During Operations and Maintenance According to multiple Department of Defense sources, operations and maintenance costs typically represent 60 to 80 percent of the total lifecycle cost of a system. At this level of investment, it is critical that ICT SCRM considerations are included in these sustainment activities to ensure that systems can be trusted to continue operating as intended throughout their life span. Planning for continuous operations and maintenance of the system should be initiated early in the acquisition cycle and include requirements determination, production, and fielding. One of the challenges of sustaining system operation over the course of a system s lifetime is replacing parts that break. In some cases, suppliers stop making Key Supplier Risk Considerations What security requirements do you impose on your suppliers and how do you communicate them to the acquirer How do you demonstrate compliance with security and supply chain requirements to the acquirer How effective is your organization at demonstrating that the ICT you produce does not contain unwanted functionality How do you and your suppliers obtain a common understanding of the future operating environment and its impact on deployment How do you ensure that the system will function as intended within its operational environment in adverse conditions What integrity and availability controls have your suppliers implemented to ensure the system remains operational in support of your mission How are deviations from secure design and coding standards identified and resolved How do you ensure your team members have the knowledge to deliver a product that meets the security requirements them or go out of business, making it difficult to find genuine replacement parts to maintain intended system functionality. As a result, organizations are left with unattractive options, such as acquiring replacement parts from unverified third-party suppliers, which can carry multiple risks. For example, an unverified vendor might provide a counterfeit part that does not perform up to specification, or a part with malicious functionality that breaks the system or exposes the data processed and stored by the system to a malicious actor. 6
9 Risk mitigation should consider how critical the system is to the organization s success, versus the costs and benefits associated with managing the supply chains that support sustainment of operational systems. For example, ICT used in-flight control systems or kidney dialysis machines should be more robust then ICT used in coffee makers. For systems that are critical to the mission, the first step in solving this problem is determining which components would negatively impact the mission if they fail. The criticality of these components dictates that some components must be managed more carefully than others. Consider the consequences to the entire system if a particular component fails: Will the entire system fail or will operations unacceptably degrade Will workarounds be possible until the problem can be corrected Supply chain threats to operational systems come from malicious and non-malicious sources, and through intentional and inadvertent actions. Managers must consider the combination of all of the threats and vulnerabilities when defining and implementing their strategy for mitigating supply chain-related risks to the health of operational systems. How Booz Allen Hamilton Can Help Booz Allen Hamilton, a management and technology consulting firm, has the technical expertise as well as the depth and breadth of ICT strategic planning experience to help clients manage supply chain risks associated with acquisition, operations, and maintenance of ICT systems and infrastructures. We have assisted US government agencies and the international community in defining and addressing ICT SCRM challenges. Our holistic approach integrates the complementary aspects of people, policy, operations, management, and technology, and is based on emerging national and international best practices. Our suite of service offerings can help a diverse range of clients, from policy and acquisition organizations to operators of complex systems with critical ICT components. As we help our clients establish ICT SCRM practices, we identify and integrate internal standards and processes in cybersecurity, acquisition, quality, or other relevant areas that have already proven to be effective. For example, rather than recommend development of separate ICT SCRM acquisition requirements, we work to integrate ICT SCRM concerns into existing security requirements. Our ICT SCRM service offerings include: ICT SCRM Policy Analysis and Development. Emerging laws, standards, and best practices are influencing how regulatory bodies, government agencies, and industry stakeholders expect acquirers and suppliers to handle ICT SCRM, even as these requirements evolve. Booz Allen analyzes emerging standards and compliance drivers and compares them to the client s current policies and processes. We identify existing internal standards that cover the new requirements, and make clientspecific recommendations on how to develop new content to address those that are not covered. Acquirer Self-Assessment. Acquirers need to protect their assets by asking the right questions and engaging in appropriate validation activities to ensure their suppliers have addressed ICT SCRM and will continue to do so throughout the lifecycle. Booz Allen works with acquisition stakeholders to conduct a gap analysis of existing acquirer practices against a relevant baseline (NIST, ISO, DoD, or a combination as appropriate) and provides a comprehensive prioritized roadmap for closing the gap based on client resources and priorities. During this assessment, we identify existing best practices that can be repurposed or expanded to address ICT SCRM. 7
10 Cyber Supply Chain Vulnerability Analysis. ICT supply chains consist of multiple nodes and delivery routes, all of which are vulnerable. Booz Allen analyzes the supply chain end-to-end and reverseengineers it to find weaknesses through in-depth knowledge of adversarial tactics and methodology. We identify exploitable vulnerabilities that lead to cascading failures and anticipate what the adversary s remedial actions will likely be, so we can inform, advise, and help clients develop viable courses of action. Individual Component Assessment. ICT is composed of a multitude of components, each of which can be compromised while it is created or transported for integration into a more complex device. A compromise of a critical component may result in a failure of the entire system, which could be devastating especially if it is operating as a part of critical infrastructure. Booz Allen conducts a detailed assessment of an individual component s supply chain, identifies specific risks within that supply chain, and proposes a strategy to mitigate the identified risks. Software Supply Chain Assessment. Software presents special supply chain-related challenges because it is created and delivered virtually and does not lend itself to the same type of physical separation as hardware or other physical goods. Booz Allen analyzes acquirer and supplier software supply chain practices against emerging standards and guidelines and proposes a practical roadmap for remediation that includes governance and technical remediation. the organization. Our training helps clients integrate ICT SCRM considerations into acquisition and engineering efforts to ensure long-term risk management. A Leader in Defining and Implementing Best Practices for ICT SCRM Booz Allen has assisted numerous clients and served as a leader in promoting stronger ICT SCRM. Support of Department of Defense in defining and implementing ICT SCRM policies and practices Development of National Institute of Standards and Technology (NIST) Interagency Report 7622, Piloting Supply Chain Risk Management Practices for Federal Information Systems ICT SCRM study for a large microelectronics manufacturer ICT SCRM framework for leading US bank Support of DMSMS Working Group and Counterfeit Materiel Working Group Leaders in software supply chain through co-chairmanship of multiple working groups under DoD, DHS, and NIST co-sponsored software assurance efforts Project Editor for international standard (ISO/IEC) 27036, Information Security for Supplier Relationships ICT SCRM Training. Although ICT SCRM recently received significant attention in the press, the public is generally unaware of the problem or the specific mitigation techniques. Booz Allen has developed basic training materials to address ICT SCRM awareness and works with the clients to tailor it to their key stakeholders across 8
11 About Booz Allen Hamilton Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics which it combines with specialized expertise in clients mission and domain areas to help solve their toughest problems. The firm s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen helps clients achieve success in their most critical missions as evidenced by the firm s many client relationships that span decades. Booz Allen helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs more than 25,000 people, and had revenue of $5.59 billion for the 12 months ended March 31, Fortune has named Booz Allen one of its 100 Best Companies to Work For for seven consecutive years. Working Mother has ranked the firm among its 100 Best Companies for Working Mothers annually since More information is available at (NYSE: BAH) To see how Booz Allen can help your ICT supply chain risk mitigation efforts, please contact one of our consultants: Nadya Bartol Senior Associate [email protected] Michele Moss Lead Associate [email protected]
12 Principal Offices Huntsville, Alabama Sierra Vista, Arizona Los Angeles, California San Diego, California San Francisco, California Colorado Springs, Colorado Denver, Colorado District of Columbia Orlando, Florida Pensacola, Florida Sarasota, Florida Tampa, Florida Atlanta, Georgia Honolulu, Hawaii O Fallon, Illinois Indianapolis, Indiana Leavenworth, Kansas Aberdeen, Maryland Annapolis Junction, Maryland Hanover, Maryland Lexington Park, Maryland Linthicum, Maryland Rockville, Maryland Troy, Michigan Kansas City, Missouri Omaha, Nebraska Red Bank, New Jersey New York, New York Rome, New York Dayton, Ohio Philadelphia, Pennsylvania Charleston, South Carolina Houston, Texas San Antonio, Texas Abu Dhabi, United Arab Emirates Alexandria, Virginia Arlington, Virginia Chantilly, Virginia Charlottesville, Virginia Falls Church, Virginia Herndon, Virginia McLean, Virginia Norfolk, Virginia Stafford, Virginia Seattle, Washington The most complete, recent list of offices and their addresses and telephone numbers can be found on Booz Allen Hamilton Inc.
Utilizing and Visualizing Geolocation Data for Powerful Analysis
Utilizing and Visualizing Geolocation Data for Powerful Analysis by Walton Smith [email protected] Timothy Ferro [email protected] Table of Contents Introduction... 1 Delivering Geolocation Data
Analytical Program Management
Analytical Program Management Integrating Cost, Schedule, and Risk MISSION Analytical Program Management Integrating Cost, Schedule, and Risk Analytical Program Management 1 One of the greatest challenges
The Social Financial Advisor: A Path Forward
The Social Financial Advisor: A Path Forward Take the Right Route to Using Social Media by Chris Estes [email protected] Todd Inskeep [email protected] Getting Social Is It Time for Advisors to Face
by Christopher P. Bell [email protected] Elizabeth Conjar [email protected]
Organizational Network Analysis Improving Intelligence and Information Sharing Capability among Homeland Security and Emergency Management Stakeholders by Christopher P. Bell [email protected]
Engaging Mobility in the Oil and Gas Sector
Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector To open a dialogue about the impact of rapid mobile adoption in the energy industry, Booz Allen Hamilton, Bitzer
Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber [email protected]
Ascent to the Cloud Four Focus Areas for a Successful Enterprise Migration by Michael Farber [email protected] Kevin Winter [email protected] Munjeet Singh [email protected] Ascent to the
Meeting the Challenges of the Modern CIO
Meeting the Challenges of the Modern CIO by Darrin London, PMP [email protected] Daniel E. Williams, PMP [email protected] Table of Contents Introduction...1 Challenges Faced by the Modern
How To Manage Security In A Federal System
Security Authorization An Approach for Community Cloud Computing Environments by Perry Bryden [email protected] Daniel C. Kirkpatrick [email protected] Farideh Moghadami [email protected]
Developing a Business Case for Cloud
Developing a Business Case for Cloud Analyzing Return on Investment for Cloud Alternatives May Yield Surprising Results by Paul Ingholt [email protected] Cynthia O Brien o [email protected] John
Integrating IT Service Management Practices into the Defense Acquisition Lifecycle
Integrating IT Service Management Practices into the Defense Acquisition Lifecycle by Francis Arambulo [email protected] Michael Thompson [email protected] Table of Contents Introduction...1
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Effectiveness and Efficiency
Effectiveness and Efficiency Lessons for Building and Managing a Culture of Performance by Dave Mader [email protected] Jay Dodd dodd_ [email protected] Tom Miller [email protected] Douglas Schlemmer [email protected]
The Cybersecurity Executive Order
The Cybersecurity Executive Order Exploiting Emerging Cyber Technologies and Practices for Collaborative Success by Mike McConnell [email protected] Sedar Labarre [email protected] David Sulek
Cyber Solutions Handbook
Cyber Solutions Handbook Making Sense of Standards and Frameworks by Matthew Doan [email protected] Ian Bramson [email protected] Laura Eise [email protected] Cyber Solutions Handbook Making Sense
Information Security Governance
Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller [email protected] Larry Candler [email protected] Hannah Wald [email protected] Table of Contents
Turning Big Data into Opportunity
Turning Big Data into Opportunity The Data Lake by Mark Herman [email protected] Michael Delurey [email protected] Table of Contents Introduction... 1 A New Mindset... 1 Ingesting Data into the Data
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Booz Allen Cloud Solutions. Our Capability-Based Approach
Booz Allen Cloud Solutions Our Capability-Based Approach Booz Allen Cloud Solutions Our Capability-Based Approach Booz Allen Cloud Solutions Our Capability-Based Approach In today s budget-conscious environment,
Data Lake-based Approaches to Regulatory- Driven Technology Challenges
Data Lake-based Approaches to Regulatory- Driven Technology Challenges How a Data Lake Approach Improves Accuracy and Cost Effectiveness in the Extract, Transform, and Load Process for Business and Regulatory
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
by Keith Catanzano [email protected]
Enhanced Training for a 21st-Century Military A convergence of new technologies and advanced learning techniques will help the military meet its growing training requirements, despite budget constraints
Enabling Cloud Analytics with Data-Level Security
Enabling Cloud Analytics with Data-Level Security Tapping the Full Value of Big Data and the Cloud by Jason Escaravage [email protected] Peter Guerra [email protected] Table of Contents Introduction...
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
Cyber Training. Developing the Next Generation of Cyber Analysts. Ready for what s next.
Cyber Training Developing the Next Generation of Cyber Analysts Ready for what s next. Table of Contents The Crisis Moment...1 The Cyber Skills Gap...1 Developing a World-Class Cyber Workforce...2 Emulating
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Job Market Intelligence:
March 2014 Job Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence Average #
Integrated Risk Management. Balancing Risk and Budget
Integrated Risk Management The Current Risk Landscape Organizations which depend upon information systems are challenged by serious threats that can exploit both known and unknown vulnerabilities in systems.
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Harnessing Big Data to Solve Complex Problems: The Cloud Analytics Reference Architecture
Harnessing Big Data to Solve Complex Problems: The Cloud Analytics Reference Architecture Table of Contents Introduction... 1 Cloud Analytics Reference Architecture... 1 Using All the Data... 3 Better
Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
Management Spans and Layers. Streamlining the Out-of-Shape Organization
Management Spans and Layers Streamlining the Out-of-Shape Organization Originally published as: Management Spans and Layers: Streamlining the Out-of-Shape Organization, by Ian Buchanan, Jong Hyun Chang,
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
The Essential Engineering Partner. From Serendipitous Development to Strategic Growth. By Joseph Sifer, Executive Vice President sifer_joseph@bah.
The Essential Engineering Partner From Serendipitous Development to Strategic Growth By Joseph Sifer, Executive Vice President [email protected] The Essential Engineering Partner From Serendipitous
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
The Economics of Cloud Computing
The Economics of Cloud Computing Addressing the Benefits of Infrastructure in the Cloud by Ted Alford [email protected] Gwen Morton [email protected] The Economics of Cloud Computing Addressing
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Ideas for a More Proactive Role for Parts Management and DMSMS in Acquisition
Ideas for a More Proactive Role for Parts Management and DMSMS in Acquisition Presented to the Parts Standardization Management Committee April 28, 2015 Objective To identify ideas for how parts management
Supply Chain Risk Management Practices for Federal Information Systems and Organizations
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 (Second Draft) NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations Jon Boyens
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
ICT Supply Chain Risk Management
ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory Manager s Forum June 4, 2013 General Problem Definition Scope of Supplier Expansion and Foreign Involvement graphic
Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach
Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach April 2011 A white paper prepared by Booz Allen Hamilton: Center of Excellence for Strategic Technology
Booz Allen Hamilton Systems Delivery Group
Booz Allen Hamilton Systems Delivery Group Booz Allen Hamilton Systems Delivery Group Systems Delivery at Booz Allen In today s environment, large software projects routinely run significantly over budget
The Federal Government s Key Role in Healthcare Innovation
The Federal Government s Key Role in Healthcare Innovation by Lucy Stribley [email protected] Lisa Egbuonu-Davis, MD [email protected] Patrick Fritz [email protected] The Federal Government
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
Cyber Risk to Help Shape Industry Trends in 2014
Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s
IT Security Risk Mitigation Report
IT Security Risk Mitigation Report Virtualization Security by Wilson Leung [email protected] Nima Khamooshi [email protected] Theodore Winograd [email protected] IT Security Risk Mitigation
Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis
Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis by Michael Farber [email protected] Mike Cameron [email protected] Christopher Ellis [email protected] Josh Sullivan,
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT FireEye Supply Chain Risk Management INTERVIEWS Craig Martin SVP Hardware Development and Manufacturing Operations Kip Shepard Senior Manager of Global
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014
SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 EXECUTIVE SUMMARY In this digital age, social media has quickly become one of the most important communication channels. The shift to online conversation
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities
Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click
Logistics Engineering Perspective Enabling Logistics Transformation While Reducing Costs
Logistics Engineering Perspective Enabling Logistics Transformation While Reducing Costs by Mike Jones [email protected] Dick Lohrmann [email protected] Tim Surabian [email protected] Logistics
Information About Filing a Case in the United States Tax Court. Attached are the forms to use in filing your case in the United States Tax Court.
Information About Filing a Case in the United States Tax Court Attached are the forms to use in filing your case in the United States Tax Court. It is very important that you take time to carefully read
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Towards a standard approach to supply chain integrity. Claire Vishik September 2013
Towards a standard approach to supply chain integrity Claire Vishik September 2013 1 Draws from: ENISA s report on this topic Slawomir Gorniak, European Network and Information Security Agency Demosthenes
PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM
Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Supply Chain Attack Patterns: Framework and Catalog
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE FOR RESEARCH AND ENGINEERING OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING Supply Chain Attack Patterns: Framework and Catalog
Public School Teacher Experience Distribution. Public School Teacher Experience Distribution
Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile Mode Alabama Percent of Teachers FY Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile
Manned Information Security
Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Rebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Systems Engineering and Integration
Systems Engineering and Integration Conceiving, Specifying, and Acquiring Complex Systems Ready for what s next. Booz Allen Hamilton Offers Systems Engineering and Integration Services Designed to Help
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
