NIST Unveils Preliminary Cybersecurity Framework

Size: px
Start display at page:

Download "NIST Unveils Preliminary Cybersecurity Framework"

Transcription

1 November 25, 2013 Practice Group: Cyber Law and Cybersecurity NIST Unveils Preliminary Cybersecurity Framework By Roberta D. Anderson On October 22, the National Institute of Standards and Technology (NIST) released its longanticipated Preliminary Cybersecurity Framework 1 for public review and comment. The Cybersecurity Framework was issued in accordance with President Obama s February 19 Executive Order 13636, Improving Critical Infrastructure Cybersecurity, 2 which tasked NIST with developing a Cybersecurity Framework to reduce cyber risks to critical infrastructure. 3 The Executive Order states that the Cybersecurity Framework must provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. 4 Critical infrastructure organizations include those in the chemical, communications, critical manufacturing, defense, financial services, energy, healthcare, and information technology sectors, among others. 5 As stated in the Executive Order, [t]he cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. 6 NIST developed the Cybersecurity Framework based on information gathered over the past six months, including a Request for Information published in the Federal Register 7 and a series of four open public workshops held at various locations throughout the United States. A key objective of the Cybersecurity Framework is to encourage organizations to consider cybersecurity risk as a priority similar to financial, safety, and operational risk. 8 At a very high level, as its name indicates, the Cybersecurity Framework provides a framework for critical infrastructure organizations to achieve a grasp on their current cybersecurity risk profile and risk management practices, to identify gaps that should be addressed in order to progress towards a desired target state of cybersecurity risk management, and to internally and externally communicate efficiently about cybersecurity and risk management. In releasing the Cybersecurity Framework, NIST explained that it offers a common language and mechanism for organizations to determine and describe their current cybersecurity posture, as well as their target state for cybersecurity and will help them to identify and prioritize opportunities for improvement within the context of risk 1 The Cybersecurity Framework is available at FED. REG (2013). The Executive Order is available at 3 Executive Order, Section 7(a). 4 Id., Section 7(b). Critical infrastructure as used in the Executive Order means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. Id. Section 2. This is the meaning given to the term in the Critical Infrastructures Protection Act of 2001, 42 U.S.C. 5195c(e). 5 Presidential Policy Directive/PPD 21, Critical Infrastructure Security and Resilience, (Feb. 12, 2013), available at (reference PPD 21 ), identifies 16 critical infrastructure sectors. See id. at Executive Order, Section FED. REG (2013). The Request for Information is available at 26/pdf/ pdf. 8 Cybersecurity Framework, at 1.

2 management and to assess progress toward their goals. 9 Although applying to organizations in critical infrastructure, the Cybersecurity Framework may be used by any organization as part of its effort to assess cybersecurity practices and manage cybersecurity risk. Three-Part Approach The Cybersecurity Framework adopts a risk-based approach composed of three parts: the Framework Core, Framework Profile, and Framework Implementation Tiers. 10 The Framework Core The Framework Core is a set of cybersecurity activities that are common across critical infrastructure sectors. It consists of five high-level Functions, which, as stated by NIST, organize basic cybersecurity activities at their highest level. 11 The five Functions are: (1) Identify, 12 (2) Protect, 13 (3) Detect, 14 (4) Respond, 15 and (5) Recover. 16 NIST explains that these Functions will provide a concise way for senior executives and others to distill the fundamental concepts of cybersecurity risk so that they can assess how identified risks are managed, and how their organization stacks up at a high level against existing cybersecurity standards, guidelines, and practices. 17 For each of the five Functions, the Framework Core identifies underlying key Categories and Subcategories, and then matches them with Informative References, such as existing cybersecurity standards, guidelines, and practices. By way of example, Categories within the Protect Function include Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, and Protective Technology. 18 Subcategories under the Access Control Category within the Protect Function include (but are not limited to) [i]dentities and credentials are managed for authorized devices and users and [n]etwork integrity is protected. 19 Informative References for [i]dentities and credentials are managed for authorized devices and users include the following: ISA COBIT DSS05.04, DSS06.03 SO/IEC A.11 NIST SP Rev. 4 AC-2, AC-5, AC-6, IA Family 9 NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments (Oct. 22, 2013), available at 10 Cybersecurity Framework, at Id. at This is to [d]evelop the institutional understanding to manage cybersecurity risk to 243 organizational systems, assets, data, and capabilities. Id. at This is to [d]evelop and implement the appropriate safeguards, prioritized through the organization s risk management process, to ensure delivery of critical infrastructure services. Id. 14 This is to [d]evelop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Id. at This is to [d]evelop and implement the appropriate activities, prioritized through the organization s risk management process (including effective planning), to take action regarding a detected cybersecurity event. Id. 16 This is to [d]evelop and implement the appropriate activities, prioritized through the organization s risk management process, to restore the capabilities or critical infrastructure services that were impaired through a cybersecurity event. Id. 17 Id. at Cybersecurity Framework, at Id.at (Appendix A). 2

3 CCS CSC The Cybersecurity Framework relies upon existing private sector and governmental cybersecurity standards, guidelines, and practices as a basis to build or augment an organization s cybersecurity risk management practices. The following Figure 1 from the Cybersecurity Framework depicts the Framework Core: NIST explains that [t]his structure ties the high level strategic view, outcomes and standards based actions together for a cross-organization view of cybersecurity activities. 21 The Framework Core is intended to facilitate cybersecurity and risk management communications within an organization, including among senior management, middle management and operational staff. In releasing the Cybersecurity Framework, NIST explained that it will foster communications among internal and external stakeholders and help organizations hold each other accountable for strong cyber protections. 22 The Framework Profile In essence, the Framework Profile describes an organization s current state of cybersecurity risk management and can be used to track progress towards a target state of cybersecurity risk management. As described by NIST, the Framework Profile can be used to describe both the current state and the desired target state of specific cybersecurity activities, thus revealing gaps that should be addressed to meet cybersecurity risk management 20 Id.at 16 (Appendix A). 21 Id. at NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments (Oct. 22, 2013), available at 3

4 objectives. 23 Framework Profiles are used to identify opportunities for improving cybersecurity by comparing a Current Profile with a Target Profile. 24 The Framework Implementation Tiers The Framework Implementation Tiers, which range from Partial (Tier 1) to Adaptive (Tier 4), describe the degree to which an organization s cybersecurity practices exhibit desirable characteristics. The Tiers consider cybersecurity risk management practices, the level of awareness of cybersecurity risk at the organizational level, and the processes, or lack thereof, in place to coordinate or collaborate with other entities. By way of example, considering the risk management aspect, at Tier 1 [o]rganizational cybersecurity risk management practices are not formalized and risk is managed in an ad hoc and sometimes reactive manner. 25 At Tier 2, [r]isk management practices are approved by management but may not be established as organizational-wide policy. 26 At Tier 3, [t]he organization s risk management practices are formally approved and expressed as policy. 27 At Tier 4, [t]hrough a process of continuous improvement, the organization actively adapts to a changing cybersecurity landscape and responds to emerging/evolving threats in a timely manner. 28 Implementation The Cybersecurity Framework is voluntary--at least for now. NIST has explained that the Framework complements, and does not replace, an organization s existing business or cybersecurity risk management process and cybersecurity program. 29 The Cybersecurity Framework can serve as the foundation for a new cybersecurity program or a mechanism for improving an existing program. 30 Although the Cybersecurity Framework is voluntary, organizations are advised to keep in mind that creative class action plaintiffs (and even some regulators) may nevertheless assert that the Cybersecurity Framework provides a de facto standard for cybersecurity and risk management. Importantly, the Cybersecurity Framework can be used as a means to communicate an organization s required cybersecurity standards to business partners. As stated by NIST, [t]he Framework provides a common language to communicate requirements among interdependent partners responsible for the delivery of essential critical infrastructure services, such as, for example, the utilization of a Target Profile to express requirements to an external service provider (e.g., a cloud provider) to which it is exporting data. 31 This is significant because the cybersecurity shortcomings of cloud and other providers can have a profound impact on supply chains. As explained by NIST: 23 Cybersecurity Framework, at 7. NIST further describes the Framework Profile as a tool to enable organizations to establish a roadmap for reducing cybersecurity risk that is well aligned with organization and sector goals, considers legal/regulatory requirements and industry best practices, and reflects risk management priorities. Id. 24 Id. at Id. at Id. at Id. 28 Id. 29 Id. at Id. at Id. at 12. 4

5 All organizations are part of, and dependent upon, product and service supply chains. Supply chains consist of organizations that design, make, source, and deliver products and services. Disruptions in one part of the supply chain may have a cascading and adverse impact on organizations throughout the supply chain, both up and downstream, and across multiple sectors and subsectors. Although many organizations have robust internal risk management processes, there remain challenges related to criticality and dependency analysis, collaboration, information sharing, and trust mechanisms throughout the supply chain. As a result, organizations continue to struggle to identify their risks and prioritize their actions due to these operational dependencies and the weakest links are susceptible to penetration and disruption. Supply chain risk management, particularly in terms of product and service integrity, is an emerging discipline characterized by diverse perspectives, disparate bodies of knowledge, and fragmented standards and best practices. 32 Incentives -- And Insurance As of yet unspecified governmental incentives will be offered to organizations that adopt the framework. The Executive Order directs the Secretary of Homeland Security, in coordination with sector-specific agencies, to establish a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and any other interested entities, called the Program, and to coordinate establishment of a set of incentives designed to promote participation in the Program. 33 On August 6, the White House previewed a list of possible incentives, including Cybersecurity Insurance at the top of the list. 34 If Cybersecurity Insurance is adopted as an incentive, organizations that participate in the Program may, for example, enjoy more streamlined underwriting and reduced cyber insurance premiums. As stated by Michael Daniel, Special Assistant to the President and Cybersecurity Coordinator, agencies have suggested that the insurance industry be engaged when developing the standards, procedures, and other measures that comprise the Framework and the Program and that [t]he goal of this collaboration would be to build underwriting practices that promote the adoption of cyber risk-reducing measures and risk-based pricing and foster a competitive cyber insurance market. 35 Mr. Daniel states that NIST is taking steps to engage the insurance industry in further discussion on the Framework. 36 The placement of Cybersecurity Insurance at the top of a list of possible incentives underscores the important role that insurance can play in an organization s overall strategy to manage and mitigate cybersecurity risk, including supply chain disruption. 37 Adam Sedgewick, Senior Information Technology Policy Advisor at NIST, stated in a recent interview that NIST views the insurance industry as a major stakeholder [in] helping 32 Id. at Executive Order, Section 8(a, d). 34 Michael Daniel, Incentives to Support Adoption of the Cybersecurity Framework, The White House Blog (Aug. 6, 2013), available at 35 Id. Other potentially significant incentives include leveraging federal grant programs, limitations on liability, including reduced tort liability, limited indemnity, higher burdens of proof, or the creation of a Federal legal privilege that preempts State disclosure requirements, and optional public recognition for participants in the Program and their vendors. Id. 36 Id. 37 See Roberta D. Anderson, Insurance Coverage for Cyber Attacks, THE INSURANCE COVERAGE LAW BULLETIN, Vol. 12, Nos. 4 & 5 (May-June 2013). 5

6 organizations manage their cyber risk. 38 All of this is consistent with the SEC s guidance on cybersecurity disclosures under the federal securities laws, which advises that appropriate disclosures may include, among other things, a [d]escription of relevant insurance coverage for cybersecurity risks. 39 Request For Comment NIST is seeking comments on the Cybersecurity Framework 40 and organizations have a unique opportunity to potentially shape the final Cybersecurity Framework. Both written and electronic comments should be submitted using the comment template form available electronically from the NIST website 41 and are due by December 13, The final version of the Cybersecurity Framework is due to be released in February * * * * * Our Cybersecurity practice group is uniquely positioned to assist our clients in all aspects of addressing and mitigating cyber risks, including assisting our clients to understand the scope, impact, applicability, and implications of the President s Executive Order, Presidential Policy Directive 21, and the developing Cybersecurity Framework and Program incentives. Author: Roberta D. Anderson [email protected] Other Contacts: Bruce J. Heiman [email protected] David A. Bateman [email protected] Anchorage Austin Beijing Berlin Boston Brisbane Brussels Charleston Charlotte Chicago Dallas Doha Dubai Fort Worth Frankfurt Harrisburg Hong Kong Houston London Los Angeles Melbourne Miami Milan Moscow Newark New York Orange County Palo Alto Paris Perth Pittsburgh Portland Raleigh Research Triangle Park San Diego San Francisco São Paulo Seattle Seoul Shanghai Singapore Spokane Sydney Taipei Tokyo Warsaw Washington, D.C. Wilmington K&L Gates practices out of 48 fully integrated offices located in the United States, Asia, Australia, Europe, the Middle East and South America and represents leading global corporations, growth and middle-market companies, capital markets participants and 38 See Janet Aschkenasy, NIST to engage insurance as tool to manage cyber risk, Advisen (Oct 28, 2013 ) (quoting Mr. Sedgewick). 39 SEC Division of Corporation Finance, Cybersecurity, CF Disclosure Guidance: Topic No. 2 (Oct. 13, 2011), available at FED. REG (2013)

7 entrepreneurs in every major industry group as well as public sector entities, educational institutions, philanthropic organizations and individuals. For more information about K&L Gates or its locations, practices and registrations, visit This publication is for informational purposes and does not contain or convey legal advice. The information herein should not be used or relied upon in regard to any particular facts or circumstances without first consulting a lawyer K&L Gates LLP. All Rights Reserved. 7

SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites

SEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites April 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Private Equity SEC Staff Addresses Third-Party Endorsements of By Michael W. McGrath and Sonia R. Gioseffi On

More information

Removal of Credit Ratings References

Removal of Credit Ratings References August 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Broker-Dealer Removal of Credit Ratings References By Michael S. Caccese, Clair E. Pagnano, Rita Rubin, and George

More information

DOE Announces Fundamental Shift in LNG Export Authorization Policy

DOE Announces Fundamental Shift in LNG Export Authorization Policy 5 June 2014 Practice Groups: Liquefied Natural Gas Oil & Gas Energy, Infrastructure and Resources Energy DOE Announces Fundamental Shift in LNG Export Authorization Policy By David L. Wochner, Sandra E.

More information

Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures

Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD

More information

Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong

Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong June 2015 Practice Group: Investment Management, Hedge Funds and Alternative Investments Launch of Mutual Recognition of Funds Between Mainland China and Hong Kong By Choo Lye Tan On 22 May 2015, the Securities

More information

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks?

How Can the Automotive Industry Strengthen Its Regulatory Compliance Process and Reduce Its Compliance Risks? September 29, 2015 Practice Groups: Regulatory Compliance Internal Investigations Government Investigations White Collar Crime/Criminal Defense Public Policy and Law Environmental, Land and Natural Resources

More information

Italian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction

Italian Tax Reform. New legislation on abuse of law and statute of limitations. Abuse of law and tax avoidance. Introduction 27 August 2015 Practice Group(s): Tax Italian Tax Reform New legislation on abuse of law and statute of limitations By Vittorio Salvadori di Wiesenhoff The Italian Government has recently approved a new

More information

Payday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending

Payday Loans Under Attack: The CFPB's New Rule Could Dramatically Affect High-Cost, Short-Term Lending 6 June 2016 Practice Groups: Financial Institutions and Services Litigation Consumer Financial Services Commercial Disputes Class Action Litigation Defense Payday Loans Under Attack: The CFPB's New Rule

More information

Regulatory Implications of New Products and Services in the Australian Electricity Market

Regulatory Implications of New Products and Services in the Australian Electricity Market 2 March 2015 Practice Group: Energy Regulatory Implications of New Products and Services in the Australian Australia Energy Alert By Jenny Mee and Larissa Hauser The Energy Market Reform Working Group

More information

Health Care Entities Get Clarity from FCC on Telephone Communications

Health Care Entities Get Clarity from FCC on Telephone Communications 10 August 2015 Practice Group(s): Health Care Telecom, Media and Technology Health Care Entities Get Clarity from FCC on Telephone Communications By Martin L. Stern, Samuel R. Castic, Ryan J. Severson

More information

Five Takeaways from the First Cyber Insurance Case

Five Takeaways from the First Cyber Insurance Case 21 May 2015 Practice Groups: Insurance Coverage Cyber Law and Cybersecurity This article was first published by Law360 on May 18, 2015. Five Takeaways from the First Cyber Insurance Case By Roberta D.

More information

2014 Amendments Affecting Delaware Alternative Entities and the Contractual Statute of Limitations

2014 Amendments Affecting Delaware Alternative Entities and the Contractual Statute of Limitations August 2014 Practice Groups: Corporate/M&A Private Equity 2014 Amendments Affecting Delaware Alternative Entities By Scott E. Waxman, Eric N. Feldman, Nicholas I. Froio, Andrew Skouvakis, Zachary L. Sager

More information

How To Allow Sports Wagering In New Jersey

How To Allow Sports Wagering In New Jersey November 2014 This article originally appeared in World Sports Law Report Volume 12 Issue 11, November 2014. Betting: New Jersey s Attempts to Allow Sports Betting By Linda J. Shorey, Anthony R. Holtzman

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

Ninth Circuit Opinion May Open Litigation Doors Most Thought Closed

Ninth Circuit Opinion May Open Litigation Doors Most Thought Closed March 2015 Practice Group: Investment Management Ninth Circuit Opinion May Open Litigation Doors Most By Jeffrey B. Maletta, Mark P. Goshko, Scott E. Waxman, Clair E. Pagnano, Nicholas G. Terris, and Joel

More information

ESTABLISHING A BUSINESS PRESENCE IN DUBAI

ESTABLISHING A BUSINESS PRESENCE IN DUBAI ESTABLISHING A BUSINESS PRESENCE IN DUBAI This guide, written by K&L Gates lawyers, includes a high level overview of the legal and regulatory environment for establishing a business presence in Dubai,

More information

The Limited Liability Company and the Bankruptcy Code

The Limited Liability Company and the Bankruptcy Code March 4, 2013 Practice Groups: Restructuring & Bankruptcy Corporate/M&A Finance The Limited Liability Company and the Bankruptcy Code By David A. Murdoch This K&L Gates Legal Insight highlights certain

More information

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards

More information

How To Understand And Manage Cybersecurity Risk

How To Understand And Manage Cybersecurity Risk White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the

More information

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework 1 Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

More information

Finance Alert. New Rules on Short Selling and Derivative Transactions in Germany. Introduction. Prohibition of Short Selling

Finance Alert. New Rules on Short Selling and Derivative Transactions in Germany. Introduction. Prohibition of Short Selling 30 July 2010 Authors: Dr. Christian Büche [email protected] T +49.69.94.51.96.365 Dr. Wilhelm Hartung [email protected] T +49.30.22.00.29.220 K&L Gates includes lawyers practicing

More information

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis Westlaw Journal Computer & Internet Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 14 / DECEMBER 12, 2013 Expert Analysis The Cybersecurity Framework: Risk Management

More information

Billing Code: 3510-EA

Billing Code: 3510-EA Billing Code: 3510-EA DEPARTMENT OF COMMERCE Office of the Secretary National Institute of Standards and Technology National Telecommunications and Information Administration [Docket Number: 130206115-3115-01]

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014 Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 NARUC Winter Committee Meeting Committee & Staff Committee on Critical Infrastructure February 15,

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

Insurance Coverage for Cyber Attacks

Insurance Coverage for Cyber Attacks May 2013 The text of this article first appeared in the May 2013 issue of The Insurance Coverage Law Bulletin, Vol. 12, No. 4 Insurance Coverage for Cyber Attacks Part One of a Two-Part Article By Roberta

More information

Assignee Liability Is Extended by Massachusetts: Will Others Follow Suit?

Assignee Liability Is Extended by Massachusetts: Will Others Follow Suit? Mortgage Banking & Consumer Financial Products Alert July 27, 2010 Authors: Philip M. Cedar [email protected] +1.212.536.4820 Jonathan D. Jaffe [email protected] +1.415.249.1023 Laurence

More information

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework

More information

K&L Gates Insurance Coverage Practice

K&L Gates Insurance Coverage Practice K&L Gates Insurance Coverage Practice For over 25 years, the lawyers of K&L Gates have been developing and implementing innovative legal strategies to assist businesses and individuals in obtaining insurance

More information

The Data Center of the Future: Creating New Jobs in Europe

The Data Center of the Future: Creating New Jobs in Europe The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.

More information

Change Management Implementation

Change Management Implementation Change Management Implementation George Neiport October 13, 2011 Pittsburgh Local Interest Group LIG Name goes here History, Performance & Lessons Learned Agenda K&L Gates LLP review Change Management

More information

Financial services regulation in Australia

Financial services regulation in Australia Financial services regulation in Australia FEBRUARY What you need to know Financial services regulation in Australia February 2016 1 What you need to know Key points Do you do business in Australia or

More information

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview

More information

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 Overview The University of Pittsburgh NIST Cybersecurity Framework Pitt NIST Cybersecurity Framework Program Wrap Up Questions

More information

01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan

More information

Global Real Estate Outlook

Global Real Estate Outlook Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South

More information

NIST Cybersecurity Framework. ARC World Industry Forum 2014

NIST Cybersecurity Framework. ARC World Industry Forum 2014 NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy

More information

FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011

FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies. October 20, 2011 FSOC Proposes Rules for Board of Governors of the Federal Reserve s Supervision of Nonbank Financial Companies October 20, 2011 On October 11, the Financial Stability Oversight Council (the Council) released

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson [email protected] WASHINGTON, D.C. Satish M. Kini [email protected] Renee

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?

70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? SESSION ID: GRC-W04 70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Senior Security Engineer G2, Inc.

More information

Marketing and Branding in Recruitment. Robert Wegenek Squire Patton Boggs (UK) LLP

Marketing and Branding in Recruitment. Robert Wegenek Squire Patton Boggs (UK) LLP Marketing and Branding in Recruitment Robert Wegenek Squire Patton Boggs (UK) LLP MARKETING AND BRANDING IN RECRUITMENT B2B and B2C Branding, taglines, slogans Above the line : advertising in traditional

More information

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations

More information

DHL Global Energy Conference 2015 Outsourcing logistics Enhancing innovation or increasing risk?

DHL Global Energy Conference 2015 Outsourcing logistics Enhancing innovation or increasing risk? DHL Global Energy Conference 2015 Outsourcing logistics Enhancing innovation or increasing risk? Introduction to panel discussion Houston, October 13 th What has happened since the last DHL conference?

More information

Building Security In:

Building Security In: #CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Coaching Executives: Building Emotional Intelligence

Coaching Executives: Building Emotional Intelligence IMPACT STORY Coaching Executives: Building Emotional Intelligence How a Global Airline Developed Emotionally Intelligent Leaders via an Integrated Coaching Solution The Challenge The Columbia Leadership

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

IT Audit Services. Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies

IT Audit Services. Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies IT Audit Services Ensuring the Right Systems and Controls Are in Place to Manage Risks Created by New Technologies Why Data Matters Accurate and reliable data enables customers to place orders, companies

More information

CONCEPTS IN CYBER SECURITY

CONCEPTS IN CYBER SECURITY CONCEPTS IN CYBER SECURITY GARY KNEELAND, CISSP SENIOR CONSULTANT CRITICAL INFRASTRUCTURE & SECURITY PRACTICE 1 OBJECTIVES FRAMEWORK FOR CYBERSECURITY CYBERSECURITY FUNCTIONS CYBERSECURITY CONTROLS COMPARATIVE

More information

Defining and Managing Reputation Risk

Defining and Managing Reputation Risk BEIJING BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Defining and Managing Reputation

More information

Connecting to Remote Desktop Services on an ipad

Connecting to Remote Desktop Services on an ipad Connecting to Remote Desktop Services on an ipad Remote Access To connect to Remote Desktop Services (RDS) on an ipad: Download and install Cisco AnyConnect Secure Mobility Client and PocketCloud Configure

More information

Opportunities for Action. Shared Services in Operations and IT: Additional Complexity or Real Synergies?

Opportunities for Action. Shared Services in Operations and IT: Additional Complexity or Real Synergies? Opportunities for Action Shared Services in Operations and IT: Additional Complexity or Real Synergies? Shared Services in Operations and IT: Additional Complexity or Real Synergies? In recent years, many

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT Cybersecurity Framework: Where Do We Go From Here? February 25, 2014 Just over a year ago, President Barack Obama signed an Executive Order (EO) calling for increased cybersecurity

More information

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School MARCH 31, 2014 2013 Venable LLP 1 EO 13636: Improving Critical Infrastructure Cybersecurity Directs to NIST to develop

More information

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event

More information