Updating U.S. Federal Cybersecurity Policy and Guidance
|
|
|
- Derek Pierce
- 10 years ago
- Views:
Transcription
1 a report of the csis technology and public policy program Updating U.S. Federal Cybersecurity Policy and Guidance spending scarce taxpayer dollars on security programs that work Authors Franklin S. Reeder Daniel Chenok Karen S. Evans James A. Lewis Alan Paller October 2012 CHARTING our future
2 Blank
3 a report of the csis technology and public policy program Updating U.S. Federal Cybersecurity Policy and Guidance spending scarce taxpayer dollars on security programs that work Authors Franklin S. Reeder Daniel Chenok Karen S. Evans James A. Lewis Alan Paller October 2012
4 About CSIS 50th Anniversary Year For 50 years, the Center for Strategic and International Studies (CSIS) has developed practical solutions to the world s greatest challenges. As we celebrate this milestone, CSIS scholars continue to provide strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a bipartisan, nonprofit organization headquartered in Washington, D.C. The Center s more than 200 full-time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look to the future and anticipate change. Since 1962, CSIS has been dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. After 50 years, CSIS has become one of the world s preeminent international policy institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global development and economic integration. Former U.S. senator Sam Nunn has chaired the CSIS Board of Trustees since John J. Hamre became the Center s president and chief executive officer in CSIS was founded by David M. Abshire and Admiral Arleigh Burke. CSIS does not take specific policy positions; accordingly, all views expressed herein should be understood to be solely those of the author(s) by the Center for Strategic and International Studies. All rights reserved. Center for Strategic and International Studies 1800 K Street, NW, Washington, DC Tel: (202) Fax: (202) Web:
5 embedd updating u.s. federal cybersecurity policy and guidance spending scarce taxpayer dollars on security programs that work Franklin S. Reeder, Daniel Chenok, Karen S. Evans, James A. Lewis, and Alan Paller Overview and Summary As the threat to the cyber infrastructure on which the federal government and the nation relies grows, the urgency of investing wisely in protection against, detecting, mitigating, and recovering from cyber events takes on increasing urgency. Our adversaries are well equipped and agile. Our defenses must be equal to the threat, and they are not. Since the 1980s, Congress and administrations of both parties have acted periodically to address that threat, through enacting laws and issuing policies and guidance. Though the underlying principles of managing and mitigating risk remain the same, the changing nature of technology and the capabilities of those who would do us harm call for a periodic review and updating of law and policy. Congress has recognized the need to update underlying statutes. Whether or not its efforts succeed, substantial improvement can be achieved by updating policies and guidance within the current statutory framework. Such changes would both improve our security posture and make more effective use of limited resources. While one might argue that more resources need to be spent on cybersecurity in the current threat environment, the fiscal situation argues for first assuring that every dollar spent on cybersecurity be spent wisely and allow for more rapid adoption of cheaper and more efficient technologies. This report offers recommendations on areas where, in the view of the authors, the U.S. Office of Management and Budget (OMB) could use existing authorities and update its current guidance, last revised on November 28, These changes would make government cyber assets more secure without spending more money. Absent changes in policy, agency staff and oversight groups (e.g., inspectors general and the Government Accountability Office) will continue to waste scarce resources on strategies that do little to mitigate risk. Our most important recommendation involves continuous monitoring of network operations. We deem this to be critical to any policy update to ensure that federal cybersecurity programs address the highest risk areas and prevent wasteful duplication of effort. Government security experts have told us that the current regime of periodic reports and certifications requires them to spend tens of millions of dollars on reports and processes that do little to enhance security. Agencies can better implement continuous monitoring through work led by chief information officers (CIOs) and chief 1
6 information security officers (CISOs). This report suggests ways that OMB Circular A-130, Management of Federal Information Resources, can be revised to enhance these activities through OMB and Department of Homeland Security (DHS) actions. Under the current policy regime, oversight organizations, like the inspectors general and the Government Accountability Office, produce reports on compliance against outdated policies, wasting time and energy and incentivizing exactly the wrong behavior among agencies. There is hard evidence that continuous monitoring, measurement, and mitigation are far more effective in addressing real threats in an environment in which those who seek to do us harm move quickly. While agencies will still be required to report annually to OMB and Congress under the Federal Information Security Management Act of 2002 (FISMA), effective security requires that continuous monitoring, measurement, and mitigation must replace the current regime of periodic, compliance-based reporting. Changing FISMA requirements from a compliance approach that focuses on process rather than outcomes to one of continuous monitoring is the single most important action OMB can take for cybersecurity. We recommend that OMB use the authority provided under the existing statute to effect this important reform. 1 We also recommend revisiting authority structures to reflect the reality of a changing world; namely (1) the critical role in information security for the Department of Homeland Security, which did not exist at the time OMB Circular A-130 was last revised, and (2) the need to redefine the roles and relationship between national security and non-national security systems. Although OMB further delineated responsibilities in a policy memorandum, we are encouraging OMB to address the issues in the circular s section on responsibilities. Finally, our conversations with experts in cybersecurity revealed three other areas where, in revising Circular A-130, OMB could materially improve the effectiveness and efficiency of the federal government s cybersecurity program: Revising the definitions currently used and, therefore, the object of planning and review, from a technology-based (system, major application) to an information-based regime. This approach does not discount the need to analyze the components associated with the management of information, such as the network and storage locations. Agencies are ultimately accountable for protecting the information and processes for which they are stewards, whether they are on agency-operated infrastructure or in the cloud, and the policies need to reflect that. Although we do not recommend the creation of a classification scheme per se, an information-based, not technology-based, security program has allowed the national security sector to adapt much more quickly as technology has evolved. This is not to suggest that there is no need for rigorous physical and technology infrastructure standards in the civilian space. Rather, such continuous monitoring standards should be implemented immediately, with the goal of making them part of a broader, information-based 1 Federal Agency Data Protection Act, Public Law , Section 3543(a)(1) and Section 3543(a)(4). 2 updating u.s. federal cybersecurity policy and guidance
7 framework, which is increasingly important as the government moves to virtual and cloudbased computing. Developing agency enterprise architectures that support the strategic, business, and technical views necessary to assist in the transition from the current state of paper compliance to a future desired state of continuous monitoring of government assets. DHS, working with OMB and the CIO Council, should have responsibility for developing a security architecture that recognizes common features across agencies, even though they have disparate missions. Promulgating a cybersecurity capability maturity model, much like that developed for software development. This would leverage what works best to achieve the continuous monitoring environment (and avoid deployment of a compliance model), based on real action and not the presence or absence of policies. A capability maturity model would allow the federal government as an entity to understand overall operating risk. This would provide agencies and oversight organizations a benchmark against which to measure the level to which they aspire and the steps needed to achieve it. The changes we propose will require both modifying OMB Circular A-130 and related guidance and a change in mind-set from a compliance mentality to a true risk-based approach to deploying cybersecurity resources. Since implementing the recommendations on a maturity model and on architecture could take some time, we urge OMB not to delay issuance of an updated A-130 pending their development. Rather, we recommend that A-130 support their development. Continuous Monitoring, Measurement, and Mitigation Changing A-130 requirements from compliance to continuous monitoring is the single most important action OMB can take for cybersecurity. In the past few years, a new approach to cybersecurity has emerged, based on both analysis of network data and on practical experience. In this approach, continuous diagnostics and mitigation replace periodic reporting on compliance with written standards. The approach combines continuous automated diagnostic monitoring of networks for anomalous behavior with relatively straightforward mitigation strategies to address common vulnerabilities. Continuous monitoring allows organizations to run programs that observe the behavior of their networks; generate quantifiable data that let them identify, report, and measure risk; and take rapid action to resolve problems. These vulnerability mitigation strategies reduce the avenues for potential attack and force attackers to develop more sophisticated (and expensive) techniques or to give up on the target. In combination, we recommend that continuous monitoring and mitigation strategies form the basis for the guidance for cybersecurity provided by A-130. Continuous monitoring does not mean a 24-hour watch on a computer screen. This is a softwarebased approach that generates data and alerts by comparing network performance and configuration to specific standards and known vulnerabilities. A-130 should build on the guidance franklin s. reeder, daniel chenok, karen s. evans, james a. lewis, and alan paller 3
8 provided in the FY 2011 FISMA reporting requirements to provide a coherent system of requirements for continuous monitoring. Continuous monitoring continues the trend of moving away from a compliance-based approach to cybersecurity to a measurement of outcomes to improve agency risk management. The compliance-based approach was expensive, insufficiently dynamic to account for threats, and did not provide managers with adequate information to make timely decisions on risk mitigation. Automating critical controls provides daily, authoritative data on the readiness of computers to withstand attack, as well as prioritized action lists for system administrators to maintain high levels of security. At the same time, it eliminates the financial waste associated with thick audit reports that are out of date long before they are published. In 2009, the U.S. State Department was the first agency to require wide implementation of automated security monitoring using a scoring system that gave administrators unequivocal information on the most important security actions to implement. 2 The automated security monitoring covered 85,000 computers around the world. In the first year, the risk score for thousands of computers across the department dropped by nearly 90 percent. In contrast, the risk scores of other federal agencies hardly changed at all. When a critical vulnerability in Internet Explorer was being exploited on Department of Defense and Department of State computers, the Defense Department took two and a half months to get 65 percent reported compliance with the critical patching. The State Department reached 89 percent actually patched in just 11 days. The State Department s pioneering work in continuous monitoring has now been adapted and extended by three other government organizations: the National Aeronautics and Space Administration (NASA), the Centers for Medicare and Medicaid Services of the Department of Health and Human Services, and the U.S. Senate. At NASA, a project led by NASA Ames implemented continuous monitoring and delivered reports every few days to all the system administrators. Within days of implementation, dozens of vulnerable machines unknown to systems administrators had been eliminated from the network. Systems that were out of mind were never patched and thus provided a critical vulnerability; their elimination made a huge improvement in security. The entire cost of implementing the project and getting initial benefits was the time for two NASA programmers working for about eight weeks. The Centers for Medicare and Medicaid Services (CMS) maintain information systems in nearly 200 data centers, processing claims and payments with a value of over $800 billion each year, for medical services rendered to over 100 million program beneficiaries and recipients. After 2 In the scoring system, each automated security system from vulnerability scanners to patch managers to antivirus managers to active directory managers and many more feed data daily (or up to every 72 hours) into a system that converts the data into a common scoring format, an algorithm vetted by the National Security Agency (NSA). The result is a risk score for every system and for every group of systems (like those in an embassy) that can be compared and made into grades. 4 updating u.s. federal cybersecurity policy and guidance
9 implementing a small pilot program, CMS used the methodology from that pilot effort to systematize the technical deployment, establish an outreach program for the remaining contractors, and implement its Continuous Monitoring and Risk Scoring (CMRS) program at additional 32 CMS sites. Many of these sites use the CMS-offered continuous monitoring tools, while others use legacy systems, connected to the CMS tool via the standardized Security Content Automation Protocol (SCAP). 3 CMS increased the total number of continuously monitored hosts from 18,000 to 46,000, while at the same time reducing average host risk scores by 83 percent. Guidance for continuous monitoring requires identifying what to monitor, the timely collection and analysis of data, and an ability to take immediate mitigation actions. A-130 should require agencies to use standardized processes and databases for baseline security data, such as the SCAPbased data set. This guidance must be flexible enough to accommodate the customization of monitoring systems to different agencies operational needs, while setting minimal controls for all agencies based on common needs. Clearly, agencies will need to plan for a migration from the current compliance-oriented cyber regime and toward one that focuses primarily on continuous monitoring, and there will be some costs involved in this migration for which agencies need to plan. A-130 should recognize that reality; this migration could be accomplished by having agencies set timetables and resource plans against which they will be assessed, similar to how many OMB issuances address such issues. In addition, we recognize that good process is part of effective cybersecurity, and some level of reporting will continue to be necessary to demonstrate that agencies are taking basic measures to secure their networks. But given the pace of technology change, including the need to focus cyber resources on identifying and mitigating real threats and vulnerabilities that bring increased potential impacts given new technologies (e.g., cloud computing big data), we believe that focusing agency activity on continuous monitoring and not compliance is critical to achieve strong cybersecurity in the future. Effective security requires continuous automated monitoring of agency networks for security problems, immediate access to the National Vulnerabilities Database to be able to identify problems, and immediate mitigation of problems when they are found. It does not require periodic written reports on compliance. We recommend that the centerpiece of a revised A-130 take this new approach, based on automated network diagnostics and mitigation, a comprehensive vulnerabilities database, and protocols for automated vulnerability management. 3 Security Content Automation Protocol (SCAP) is a suite of specifications that standardize the ways by which security information is communicated to machines and humans. SCAP is designed to organize, express, and measure security-related information in standardized ways. franklin s. reeder, daniel chenok, karen s. evans, james a. lewis, and alan paller 5
10 Recognizing and Reinforcing the Role of the Department of Homeland Security (DHS) DHS has spent considerable effort to build its cybersecurity program, but there continues to be skepticism about DHS s capacity. Unfortunately, this legacy continues to shape agency and public perception and is an impediment to it fully exercising its oversight functions for the federal government. More orders, statements, or guidance alone will not change this. DHS has significantly strengthened its capacity to carry out its FISMA responsibilities. DHS will need to continue to demonstrate both capacity and accomplishment, and in our view, it is on track to do this. The assignment of FISMA authorities to DHS can only work if the department can build on its recent successes and if A-130 reinforces this by laying out explicitly the DHS role in implementing FISMA. The administration s decision in 2010 to make DHS the focal point for FISMA implementation was a first step toward a new approach to federal information technology (IT) security. DHS s role needs to be made a central element in the implementation of a continuous monitoring, measurement, and mitigation requirement at agencies to create a fundamentally new approach to securing federal networks. A-130 should assign four tasks to DHS: 1. Recommend minimum security controls for agencies to implement, based on analysis of risks common across the government; 2. Analyze risks common across the government to recommend security controls for agencies to implement; 3. Provide this minimum control and priority list to inspectors general to help guide their assessment of agency performance; and 4. Establish a collaborative interagency process with the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) that would provide authoritative, coherent guidance for agency implementation of continuous monitoring and mitigation, based on the National Vulnerabilities Database. FISMA responsibilities are placed in the National Cyber Security Division (NCSD) of DHS. That division has visibility into the activities of the agencies through the Federal Network Security Branch, which also oversees the Trusted Internet Connection (TIC) implementation in each agency. However NCSD s mandate also includes incident response for all agencies and other services, which takes a great deal of time and attention from management. While the internal structure of DHS is beyond the scope of A-130 and this report, we believe that if DHS were to separate its tactical, operational functions from its management oversight responsibilities (e.g., FISMA), this separation would allow a greater focus on rapid reduction of vulnerabilities across the government. 6 updating u.s. federal cybersecurity policy and guidance
11 Revisiting the National Security Civilian Dichotomy As the CSIS Commission on Cybersecurity for the 44th Presidency noted in its 2008 report, the historic distinction between civilian agency systems and national security systems no longer serves the U.S. interest. 4 Originating in the Computer Security Act of 1987, this split has served to ensure that efficiency and privacy interests in the civilian space are not overtaken by more stringent standards commonly associated with national security systems. In today s cyber environment, both threats and vulnerabilities travel across the federal space in real time, calling for close coordination in response. Such coordination ensures that there are not different levels of effectiveness in protecting federal systems based solely on which agency responds to a common cyber incident. At the same time, the authors support the important privacy and civil liberties interests that any agency, whether civilian or national security, should respect in addressing security. The historic distinction between national security systems and non-national security systems, however, is an anachronism. The distinction between civilian agency systems and national security systems creates a gap that attackers can exploit to enter and damage government systems or gain access to highly sensitive information. Our adversaries understand this. Our policies and structures need to reflect this reality. The Obama administration has taken a number of steps to operationalize greater coordination of cybersecurity policy across the civilian and national security spaces. Two examples are the crossplacement of DHS and NSA staff under the October 2010 Memorandum of Agreement, and the creation of a committee to coordinate standards development across NIST and NSA. 5 We recommend that OMB policy should base cyber policy and response on level of risk rather than agency source similar to the principles that were laid out in OMB M on authentication, which also required that privacy be addressed at each risk level. This policy established four hierarchical levels of assurance, with each level requiring more stringent actions. OMB should use A-130 to initiate a similar government-wide policy based on assessments of vulnerability and threats to mission outcomes. Where the agency mission involves sensitive information, this policy could instruct agencies to implement stronger security with more extensive protections. Other, less sensitive missions would emphasize open access and transparency. 4 CSIS Commission on Cybersecurity for the 44th Presidency, Securing Cyberspace for the 44th Presidency (Washington, DC: CSIS, December 2008), p. 70, securingcyberspace_44.pdf. 5 The Joint Task Force Transformation Initiative, a partnership with NIST, the Department of Defense, the intelligence community, the Office of the Director National Intelligence, and the Committee on National Security Systems, is tasked with developing a unified information security framework for the federal government. franklin s. reeder, daniel chenok, karen s. evans, james a. lewis, and alan paller 7
12 Because the current statutory framework calls for a two-track security policy, we recommend that A-130 set forth in policy the goals that similar risks should be handled with similar approaches, regardless of the category into which the agency at risk falls. Specifically, A-130 should indicate that the process started under the Joint Task Force Transformation Initiative should continue. Finally, we recommend that A-130 require each agency that addresses cybersecurity at given levels of risk to ensure that privacy and civil liberties are addressed from the onset, as well as at each stage of agency implementation of its cyber program. Privacy could be protected at all levels through requirements for Privacy Impact Assessments and the application of Fair Information Principles under the Privacy Act. Definitions OMB Circular A-130, titled Management of Federal Information Resources, is aptly named as information is the federal government s largest asset. Appendix III addresses security for federal automated information resources. There is one definition that through the years of use has caused confusion on what should be included and what should not be included in oversight. Currently, the definition of major information system is an information system that requires special management attention because of its importance to an agency mission; its high development, operating, or maintenance costs; or its significant role in the administration of agency programs, finances, property or other resources. This definition as currently written was meant to give agencies flexibility in determining how to develop their portfolio and investments for information technology. However, as agencies take advantage of the efficiencies of technology, costs should be much lower because agencies can combine information resources to deliver a service, without creating new hardware or software assets which also means that the system may not rise to the level of oversight or considered to be included in the overall management of departmental assets. We recommend a new definition to continue to allow flexibility for agencies, but also allow for a common understanding by all parties of what goes into a system. This revised definition should be consistent with the Clinger-Cohen Act and FISMA definitions of information system, which is a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. 6 The proposed definition would include and/or build from the FIPS-199, Standards for Security Categorization of Federal Information and Information Systems. 7 By looking at the categories of 6 Information Technology Management Reform Act, 44 USC 3502(8). 7 National Institute of Standards and Technology, Standards for Security Categorization of Federal Information and Information Systems, Federal Information Processing Standards (FIPS) Publication 199, February updating u.s. federal cybersecurity policy and guidance
13 information to include confidentiality, integrity, and availability, the definition of major information system could be modified along the following lines: A major information system is one in which compromise of any of the security objectives confidentiality, integrity, and availability (44 USC, SEC 3542) have been rated to have a severe or catastrophic adverse effect on organizational operations (FIPS 199, Table 1) or where compromise could put significant financial resources or investments at risk. In addition, A-130 could clarify that the definition of information system under Clinger-Cohen does not mean a static set of resources, but rather can change over time and thus requires continuous management attention which reinforces the importance of continuous monitoring of the various sources that flow in and out of the information system. Taken together, these two changes would focus the attention to the information itself, as opposed to the technology and application being used to supply or create the information. The shift of the focus to information recognizes the constantly changing technology environment and allows agencies to take advantage of the most up-to-date solutions, while taking into consideration the risk associated with their deployment. Additionally, this only assists in prioritizing the overall review of information resources. The approach would need to be used in conjunction with the continuous monitoring in order to adequately assess the risk profile associated with the agencies services. Security Architectures The development of agency security architectures is essential to achieve this shift from systems to a total focus on information. Most agencies should have their current state mapped out ( as is ). The shift to information eliminates the barriers and borders of information technology systems and would have the agencies map the use of the information in their target architectures ( to be ). This shift is critical in order to have continuous monitoring really work. The architectural efforts will assist the agencies in transition from managing configurations today to managing risk levels of information into the future with the shift to cloud services. Initiatives such as the Federal Risk and Authorization Management Program (FedRAMP) will then allow for agencies to rely on the security being established at an agreed upon risk level with associated security settings that align with the architecture. The use of this approach to testing of security settings should also be expanded beyond just cloud services, in order to allow agencies to focus on their mission specific needs. Continuous testing/monitoring will then be able strengthen agency risk postures, facilitated by testing for a range of IT applications prior to being approved for use. Security Capability Maturity Model In order to truly strengthen the nation s security posture, it is imperative that we shift from the compliance methodologies to true performance outcomes. To reduce risk, the entire department and/or agency needs to be involved. The development and implementation of a security capability maturity model, and rigorous scoring against that model, would recognize the differences among franklin s. reeder, daniel chenok, karen s. evans, james a. lewis, and alan paller 9
14 agencies and reinforce the need for continuous improvement. This model would provide a more meaningful basis for the inspectors general independent annual evaluation of FISMA and assist in shifting from the current paperwork to real outcomes. By taking the current NIST standards, FIPS publications, and other available policy documents, one could design a capability maturity model around: Assets: measure/test actual settings; inventory, etc.; Events: ability to respond to cyber events; People: what are roles and responsibilities? A capability maturity model would measure progress toward achieving the risk levels established as acceptable. Progress can also be measured along technical and process dimensions. The key to success will be to avoid the mistakes of past models and measurements of cyber security, to ensure we are raising the bar and not just providing another method of compliance, in order to achieve a truly improved cybersecurity posture as a nation. Conclusion The current policy and legislative framework for protecting our nation s cyber infrastructure needs updating and revision. It is our view that the administration, and OMB in particular, have ample legal authority to adopt reforms that would materially reduce risk and enhance response for systems operated by or on behalf of the federal government. 10 updating u.s. federal cybersecurity policy and guidance
15 About the Authors Franklin S. Reeder, a former official with the Office of Management and Budget, is cofounder and director of the Center for Internet Security and the National Board of Information Security Examiners. He served on the CSIS Commission on Cybersecurity and, with Karen Evans, coauthored the Commission s white paper on the cybersecurity workforce, A Human Capital Crisis in Cybersecurity (CSIS, November 2010). Daniel Chenok is executive director of the IBM Center for the Business of Government and chair of the Information Security and Privacy Advisory Board. He was a member of the CSIS Commission on Cybersecurity and worked in the Office of Management and Budget, where he led the Information Policy and Technology Branch that oversaw policy and budget for technology, computer security, information policy, and related issues. Karen S. Evans serves as national director for the U.S. Cyber Challenge, a nationwide program focused specifically on the cyber workforce. She serves as a voice of authority for Safegov.org, an online forum focused on cloud computing policy issues. She retired after nearly 28 years with the federal government, including service as administrator for e-government and information technology at the Office of Management and Budget, where she oversaw the federal information technology budget of nearly $71 billion. James A. Lewis is a senior fellow and director of the CSIS Technology and Public Policy Program. His recent work has focused on cybersecurity, including the groundbreaking report Securing Cyberspace for the 44th Presidency (CSIS, December 2008). His current research examines the political effect of the Internet, strategic competition among nations, and technological innovation. Alan Paller founded and is director of research at the SANS Institute, a college and professional cybersecurity training school. He oversees the Internet Storm Center, the annual identification of the Seven Most Dangerous New Attack Vectors. He also cochairs the Department of Homeland Security Task Force on Cyber Skills and serves on the Federal Communications Commission s Communications Security, Reliability and Interoperability Council. franklin s. reeder, daniel chenok, karen s. evans, james a. lewis, and alan paller 11
16 Blank
17 Blank
18 Blank
19 Blank
20 1800 K Street, NW Washington, DC Tel: (202) Fax: (202) [email protected] Web:
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain
GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
Chairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.
Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Inquiries about this report may be addressed
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""
National(Health#ISAC#(NH!ISAC) GlobalInstituteforCybersecurity+Research7GlobalSituationalAwarenessCenter NASA SpaceLifeSciencesLaboratory KennedySpaceCenter,FL NH!ISACADVISORY201.13 NATIONALCRITICALINFRASTRUCTURERESILIENCEANALYSISREPORT
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS
SEPTEMBER 14, 2010 AUDIT REPORT OFFICE OF AUDITS AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space
NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS
MARCH 18, 2013 AUDIT REPORT OFFICE OF AUDITS NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Department of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
2015 List of Major Management Challenges for the CFPB
September 30, 2015 MEMORANDUM TO: FROM: SUBJECT: Richard Cordray Director Consumer Financial Protection Bureau Mark Bialek Inspector General 2015 List of Major Management Challenges for the CFPB We are
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security
OFFICE OF INSPECTOR GENERAL Audit Report Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security Report No. 08-04 September 26, 2008 RAILROAD RETIREMENT BOARD INTRODUCTION
GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513
a GAO-05-700 GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program
GAO United States Government Accountability Office Report to the Ranking Minority Member, Committee on Homeland Security and Governmental Affairs, U.S. Senate June 2005 INFORMATION SECURITY Department
THE STATUS OF ENTERPRISE ARCHITECTURE AND INFORMATION TECHNOLOGY INVESTMENT MANAGEMENT IN THE DEPARTMENT OF JUSTICE
THE STATUS OF ENTERPRISE ARCHITECTURE AND INFORMATION TECHNOLOGY INVESTMENT MANAGEMENT IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report
PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
White Paper. Understanding NIST 800 37 FISMA Requirements
White Paper Understanding NIST 800 37 FISMA Requirements Contents Overview... 3 I. The Role of NIST in FISMA Compliance... 3 II. NIST Risk Management Framework for FISMA... 4 III. Application Security
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
Executive Office of the President. Office of Management and Budget. Fiscal Year 2015 Budget
Fiscal Year 2015 Budget Mission Statement and Background The (OMB) assists the President in the development and execution of his policies and programs and in meeting certain requirements in law such as
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
How To Improve Federal Network Security
Department of Federal Network Trusted Internet Connections (TIC) Update for the Information and Privacy Advisory Board July 29, 2009 Federal Network (FNS) Federal Network Branch Branch Vision: To be the
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES
STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
2.0 ROLES AND RESPONSIBILITIES
2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash
Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Introduction Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need
