INFRAGARD.ORG. Portland FBI. Unclassified 1



Similar documents
Working with the FBI

An Overview of Large US Military Cybersecurity Organizations

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

U.S. Cyber Security Readiness

U. S. Attorney Office Northern District of Texas March 2013

Report on CAP Cybersecurity November 5, 2015

Federal Bureau of Investigation

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Middle Class Economics: Cybersecurity Updated August 7, 2015

HPC IN Cybersecurity Annual Technical Meeting. Venue: Schlumberger Richmond Ave, Houston, TX 77042

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

US-CERT Year in Review. United States Computer Emergency Readiness Team

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

National Cybersecurity & Communications Integration Center (NCCIC)

v. 03/03/2015 Page ii

Critical Infrastructure Security and Resilience

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Establishing a State Cyber Crimes Unit White Paper

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Washington State Fusion Center. The Pacific Northwest Economic Region

El Camino College Homeland Security Spring 2016 Courses

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

What are you trying to secure against Cyber Attack?

BUSINESS CONTINUITY PLANNING

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Water Security in New Jersey: Partnership and Services

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

FBI AND CYBER SECURITY

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Cybersecurity Converged Resilience :

Microsoft s cybersecurity commitment

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

Lessons from Defending Cyberspace

Into the cybersecurity breach

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

Preventing and Defending Against Cyber Attacks November 2010

WRITTEN TESTIMONY OF

Department of Homeland Security

CYBER SECURITY GUIDANCE

Health Security Intelligence Enterprise. State and Local Initiatives Branch Office of Health Affairs Department of Homeland Security

Actions and Recommendations (A/R) Summary

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

Legislative Language

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Who s Doing the Hacking?

Purpose of the Governor s strategy. Guiding Principles

Threat and Hazard Identification and Risk Assessment

Cybersecurity and internal audit. August 15, 2014

Confrontation or Collaboration?

NICE and Framework Overview

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Department of Homeland Security (DHS) GPS Interference Detection and Mitigation (IDM) Program

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

FBI CHALLENGES IN A CYBER-BASED WORLD

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Cybersecurity Awareness. Part 2

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

I N T E L L I G E N C E A S S E S S M E N T

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

HSIN R3 User Accounts: Manual Identity Proofing Process

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Protecting critical infrastructure from Cyber-attack

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing

BUSINESS CONTINUITY POLICY

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Action Plan for Canada s Cyber Security Strategy

Seven Strategies to Defend ICSs

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Defensible Strategy To. Cyber Incident Response

National Cybersecurity Assessment and Technical Services

Transcription:

INFRAGARD.ORG Portland FBI 1

INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2

INFRAGARD Provides a trusted environment for the exchange of Intelligence Strategy Expertise 3

INFRAGARD Partnership is our Key Resource 4

INFRAGARD - Member Benefits Access through authenticated Portal www.infragard.org Timely Intelligence Briefings and Analytical Products 5

INFRAGARD - Member Benefits Unique Networking Opportunities Training and Education 6

Members by Sectors Chemical Commercial FaciliCes CommunicaCons CriCcal Manufacturing Dams Defense Industrial Base 30% 2% 1% 1% 3% 1% 7% 4% 1% 0% 5% 5% Emergency Services Energy 7% Financial Services Food and Agriculture Government FaciliCes 7% 11% 13% Healthcare and Public Health InformaCon Technology No Sector Designated Nuclear Reactors/Materials/Waste 2% TransportaCon Systems Water and Wastewater Systems 7

Sector Chief Program Motivated Leaders of their Sectors Subject Matter Experts Willing to Share their Knowledge 8

Sector Chief Program Main POC for their Sector Access to Network within their Sector Understands they will have periodic access to classified information (after obtaining a security clearance) 9

Current Sector Chiefs By Sector Chemical Commercial FaciliCes CommunicaCons CriCcal Manufacturing Dams Defense Industrial Base 12% 2% 7% 6% 3% 7% 6% 2% 2% 6% Emergency Services Energy 7% Financial Services 10% Food and Agriculture Government FaciliCes 6% 10% Healthcare and Public Health InformaCon Technology 5% 11% Nuclear Reactors/Materials/Waste TransportaCon Systems Water and Wastewater Systems 10

Special Interest Groups (SIGs) ElectroMagnetic Pulse EMP SIG Inform Communities how to mitigate the threat of long-term failure of life-sustaining infrastructures 11

EMP SIG EMP = Every Major Problem SIG Extreme Space Weather Cyber Attacks Coordinated Physical Attacks Widespread Pandemics Natural Disasters Man-made Disasters 12

InfraGard Operational Goals and Methodology InfraGard Operational Goals Information Sharing Strategy Collaboration Efficiency/Effectiveness One to One One to Few One to Many 13

Value Added for InfraGard Members FBI Value Added for InfraGard Members Far reach in all states and US territories with investigative and operational capability Good visibility into the threatscape Dual law enforcement and national security roles FBI with InfraGard program serves as an aggregator of data between LE/USIC/Private Sectors FBI offers services and products Intelligence Report Tools for collaboration and partnership Proactive and Aggressive gesture on threats 14

Value Added for InfraGard Members FBI investigative capability may enhance incident response Provide experts in investigative cases Experienced in media and joint messaging to enhance both government and PS Customized RFI at individual levels for members and their companies Provide legal instruments as needed FBI may potential extended incident response with additional investigative legal authority FBI may assist in victim notifications and process requirements 15

InfraGard Value Added for the FBI InfraGard Value Added (For FBI and InfraGard members) Membership covers the grassroot individuals InfraGard is the workhorse of the FBI outreach program. InfraGard membership actively participate with the program Private sector members are true experts in their field Force multiplier for information collection and dissemination Brand name / Reputation Large individual membership Trusted relationship and community Extensive reach to all regions 16

Government Interaction CYBERSECURITY RESPONSIBILITES DHS (Protection, Prevention, Mitigation, & Recovery) Coordinate the national protection, prevention, mitigation of, and recovery from cyber events Disseminate domestic cyber threat and vulnerability analysis Protect critical infrastructure Secure federal civilian systems Investigative cyber crimes under DHS jurisdiction FOREIGN DOMESTIC DOJ/FBI (Detection Investigation, Attribution, & Disruption) Investigate, attribute, disrupt, and prosecute cyber crimes Lead domestic national security operations Conduct domestic collection, analysis, and dissemination of cyber threat intelligence Support the national protection, prevention, mitigation of, and recovery from cyber incidents Coordinate cyber threat investigations DOD/NSA (Defense, Prevention, & Overseas Intelligence) Defend the nation from attack Gather foreign cyber threat intelligence and determine attribution Secure national security and military systems Support the national protection, prevention, mitigation or, and recovery from cyber incidents Investigate cyber crimes under military jurisdiction 17

MALWARE INVESTIGATOR What is Malware Investigator? Automated system that analyzes suspected malware samples and quickly returns technical information about the samples 18

Access Malware Investigator Malware Investigator is available to the FBI private sector partners via InfaraGard Login to InfraGard Connect to ileep Answer 3 Security Questions 19