Piloting Supply Chain Risk Management Practices for Federal Information Systems
|
|
|
- Stuart Vernon Tucker
- 10 years ago
- Views:
Transcription
1 Piloting Supply Chain Risk Management Practices for Federal Information Systems Marianne Swanson Computer Security Division Information Technology Laboratory
2 Agenda Terms and Background Implementing Supply Chain Risk Management Supply Chain Risk Management Practices Contact Information 2
3 Terms Supply Chain Set of organizations, people, activities, information, and resources for creating and moving a product/elements or service (including sub-elements) from suppliers through to an organization's customers. Element COTS or GOTS software, hardware and firmware and is synonymous with components, devices, products, systems, and materials. 3
4 Terms (continued) Supplier An organization that produces elements and provides them to a customer or an integrator to be integrated into the overall system; it is synonymous with vendor and manufacturer. It also applies to maintenance/disposal service providers. Integrator A third party organization that specializes in combining products/elements of several suppliers to produce elements (information systems.) 4
5 Background Comprehensive National Cybersecurity Initiative11: Develop Multi-Pronged Approach for Global Supply Chain Risk Management (SCRM) Provide US Government with robust toolset of supply chain methods and techniques Multi-tiered Approach: Cost effective procurement related strategies Industry input into supply chain practices and development of international standards Ability to share supply chain threat information 5
6 Lifecycle Processes and Standards Working Group Develop guidance for civilian agencies on implementing supply chain risk mitigation strategies. Test existing and proposed guidance during pilots in FY09 and FY10 Collaborate with organizations and industry on developing supply chain standards and practices 6
7 Guidance Draft NIST Inter-Agency Report (NIST IR) 7622 Piloting Supply Chain Risk Management Practices for Federal Information Systems First Public Draft June, 2010 Final January, 2011 Future NIST Special Publication First Public Draft June,
8 Supply Chain Pilots Department of Defense Department of Homeland Security Piloting of guidance in NISTIR 8
9 Collaboration ISO CS-1 Global Supply Chain Risk Management Ad Hoc Meetings IT and Telecom Sector Coordinating Councils (SCCs) and Government Coordinating Councils GCCs) 9
10 Implementing Supply Chain Risk Management Prerequisites for Successful SCRM Implementation Establish a Supply Chain Risk Management Capability (SCRMC) Roles and Responsibilities SCRMC Procurement Process 10
11 Prerequisites for Successful SCRM Implementation Integrate information system security requirements from inception Ensure funding for information security and SCRM Follow consistent, well-documented repeatable system engineering and acquisition processes Proper oversight of suppliers Actively manage suppliers through Service Level Agreements/contracts Fully implement the NIST security controls 11
12 Establish a SCRMC Ad-hoc or formal team Develop policy and procedures When team comes together Who performs requirement analysis, makes risk decisions, prepares procurement related documents, and specifies any specific training requirements. 12
13 13
14 SCRMC Implementation 14
15 Step 1: Determine Supply Chain Risk Threshold FIPS 199 High Impact System NIST Special Publication Rev. 3 Security Control: SA-12 Supply Chain Protection 15
16 Step 2: Develop Requirements Identify critical elements, processes, systems, and information across the program Determine appropriate level of risk Review all data gathered during the pre-solicitation Obtain any additional information Consider a procurement strategy Develop a Statement of Work (SOW) 16
17 Statement of Work Detailed description of the technical, security, and SCRM requirements Performance measures Evaluation criteria Measurement thresholds 17
18 Step 3: Identify Potential Suppliers Conduct a market analysis Post a sources sought notification Gather information from open-sources 18
19 Open Sources Central Contractor Registry (CCR) Commercial & Government Entity (CAGE) Dunn & Bradstreet Business Identification Number Cross-reference (BINCS) 19
20 Step 4: Coordinate Acquisition Plan and Contract Execution Develop an Acquisition Plan List of potential sources of suppliers Description of how competition will be sought Description of various contacting considerations Strategies for mitigating supply chain risk Disclose any legal issues Perform technical review Select supplier 20
21 Step 5: Perform Continuous Monitoring Record lessons learned Monitor and periodically reevaluate changes in risk, suppliers, operational environment, and usage. Replacement components and maintenance should be reviewed for supply chain risk 21
22 Supply Chain Practices 21 varying practices Acquirer: Programmatic and validation activities Supplier or integrator: General, technical and validation requirements Topic areas include: Procurement Design/Development Testing Operational Personnel 22
23 Procurement Maximize acquirer s visibility into Integrators and Suppliers Protect confidentiality of element uses 23
24 Design/Development Incorporate supply chain assurance in requirements Select trustworthy elements Enable diversity Identify and protect critical processes and elements Use defensive design 24
25 Design/Development (continued) Protect the supply chain environment Configure elements to limit access and exposure Harden supply chain delivery mechanisms 25
26 Testing Manual review Static analysis Dynamic analysis Penetration testing 26
27 Operational Protect/monitor/audit operational systems Formalize service/maintenance Configuration Management Negotiate requirement changes Manage supply chain vulnerabilities Reduce supply chain risks during software updates and patches Supply chain incident response Reduce supply chain risks during disposal 27
28 Personnel Personnel considerations in the supply chain Promote awareness, educate and train personnel on supply chain risk 28
29 Contact Information Marianne Swanson, Senior Advisor for Information System Security Civilian Pilots: DoD Pilots: Standards: Kurt Seidling, Program Manager, DHS Annette Mirsky, Pilot Program Manager, OASD NII CI&IA Don Davidson, Senior Advisor Standards OASD NII CI&IA 29
Piloting Supply Chain Risk Management Practices for Federal Information Systems
Draft NISTIR 7622 Piloting Supply Chain Risk Management Practices for Federal Information Systems Marianne Swanson Nadya Bartol Rama Moorthy Draft NISTIR 7622 Piloting Supply Chain Risk Management for
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
ICT Supply Chain Risk Management
ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory Manager s Forum June 4, 2013 General Problem Definition Scope of Supplier Expansion and Foreign Involvement graphic
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
Rebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Notional Supply Chain Risk Management Practices for Federal Information Systems
NISTIR 7622 Notional Supply Chain Risk Management Practices for Federal Information Systems Jon Boyens Celia Paulsen Nadya Bartol Rama Moorthy Stephanie Shankles http://dx.doi.org/10.6028/nist.ir.7622
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009
National Security & Homeland Security Councils Review of National Cyber Security Policy Submission of the Business Software Alliance March 19, 2009 Question # 1: What is the federal government s role in
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
Cyber Security Risk Management: A New and Holistic Approach
Cyber Security Risk Management: A New and Holistic Approach Understanding and Applying NIST SP 800-39 WebEx Hosted by: Business of Security and Federal InfoSec Forum April 12, 2011 Dr. Ron Ross Computer
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
National Cybersecurity Assessment and Technical Services
National Cybersecurity Assessment and Technical Services Updated: September 9, 2015 NCATS Program Overview Offer Full-Scope Red Team/Penetration Testing Capabilities through two primary programs: Risk
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Supply Chain Risk Management Practices for Federal Information Systems and Organizations
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 (Second Draft) NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations Jon Boyens
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Towards a standard approach to supply chain integrity. Claire Vishik September 2013
Towards a standard approach to supply chain integrity Claire Vishik September 2013 1 Draws from: ENISA s report on this topic Slawomir Gorniak, European Network and Information Security Agency Demosthenes
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Software Assurance in Acquisition and Contract Language
Software Assurance in Acquisition and Contract Language Acquisition & Outsourcing, Volume I Version 1.1, July 31, 2009 Software Assurance (SwA) Pocket Guide Resources This is a resource for getting started
Code of Practice for Cyber Security in the Built Environment
Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503. October 30, 2015
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 October 30, 2015 Executive Summary Strengthening the cybersecurity of Federal networks, systems, and data is one
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
Managing Security and Privacy Risk in Healthcare Applications
Managing Security and Privacy Risk in Healthcare Applications 5 th Annual OCR / NIST HIPAA Security Rule Conference June 6, 2012 Dr. Ron Ross Computer Security Division Information Technology Laboratory
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!! Cornell Institute for Social and Economic Research and Cornell Restricted Access Data Center CISER s Mission:.anticipate
NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems
NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems Marianne Swanson NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Table Of Contents Introduction to NIST SP 800-34
FISMA Implementation Project
FISMA Implementation Project The Associated Security Standards and Guidelines Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive environment
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
AHS Flaw Remediation Standard
AGENCY OF HUMAN SERVICES AHS Flaw Remediation Standard Jack Green 10/14/2013 The purpose of this procedure is to facilitate the implementation of the Vermont Health Connect s security control requirements
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer
BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center Executive Officer 1 Purpose of Briefing To present the selection and acquisition process for biometric devices at the BFC. 2 Briefing
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
GAO IT SUPPLY CHAIN. National Security- Related Agencies Need to Better Address Risks. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters March 2012 IT SUPPLY CHAIN National Security- Related Agencies Need to Better Address Risks GAO-12-361 March 2012 IT
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities
Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES
M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
How To Get The Nist Report And Other Products For Free
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893) Now What? What does NIST have for you to use and how do you get it? How do you contact
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka
Security Touchpoints When Acquiring Software Dr Carsten Huth Nadim Barsoum Dawid Sroka 2 Topics Context Problem Definition SDLC and Security Touchpoints Acquisition Process Conclusions 3 Acknowledgement
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Information Security Office Version 8.0 June 06, 2011 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM SECURITY OFFICER (ISSO)
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
U.S. Nuclear Regulatory Commission
U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
Modeling and Simulation (M&S) for Homeland Security
Modeling and Simulation (M&S) for Homeland Security Dr. Charles Hutchings Deputy Director, Modeling and Simulation Test and Standards Division Science and Technology Directorate June 23, 2008 Outline How
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
defense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The most effective way to protect
