Lessons from Defending Cyberspace

Similar documents
CYBER SECURITY GUIDANCE

National Cyber Security Policy -2013

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Business Continuity & Disaster Recovery

Middle Class Economics: Cybersecurity Updated August 7, 2015

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Qatar Computer Emergency Team

Working with the FBI

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cybersecurity. Are you prepared?

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Cyber Security Strategy

S. ll IN THE SENATE OF THE UNITED STATES

Department of Homeland Security

Cyber Security Incident Management

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Cybersecurity and internal audit. August 15, 2014

How To Write A Cybersecurity Framework

Cyber security in an organization-transcending way

How To Write A National Cybersecurity Act

PROPOSED INTERPRETIVE NOTICE

SECURITY. Risk & Compliance Services

Microsoft s cybersecurity commitment

10 IA 10 Cyber Security

BUSINESS CONTINUITY PLANNING

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Into the cybersecurity breach

Cybersecurity: Mission integration to protect your assets

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

GEARS Cyber-Security Services

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

TCOM 562 Network Security Fundamentals

Privacy and Security in Healthcare

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Cyber Risks in the Boardroom

WRITTEN TESTIMONY OF

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

A Detailed Strategy for Managing Corporation Cyber War Security

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

THE EVOLUTION OF CYBERSECURITY

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

El Camino College Homeland Security Spring 2016 Courses

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

DHS, National Cyber Security Division Overview

Managing IT Security with Penetration Testing

GAO. CRITICAL INFRASTRUCTURE PROTECTION DHS Leadership Needed to Enhance Cybersecurity

NIST Cybersecurity Framework What It Means for Energy Companies

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

The Comprehensive National Cybersecurity Initiative

Bradford J. Willke, CISSP

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

State Governments at Risk: The Data Breach Reality

Actions and Recommendations (A/R) Summary

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Business Continuity for Cyber Threat

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

Working with the Federal Government on Cybersecurity

Priority III: A National Cyberspace Security Awareness and Training Program

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Computer Network Security & Privacy Protection

Advanced Threat Protection with Dell SecureWorks Security Services

CYBERSPACE SECURITY CONTINUUM

ITL BULLETIN FOR SEPTEMBER 2012 REVISED GUIDE HELPS ORGANIZATIONS HANDLE SECURITY-RELATED INCIDENTS

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Rogers Insurance Client Presentation

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Intrusion Tolerance to Mitigate Attacks that Persist

Preventing and Defending Against Cyber Attacks November 2010

CYBER SECURITY, A GROWING CIO PRIORITY

Cybersecurity for Medical Devices

Enterprise Security Tactical Plan

Cybersecurity Framework: Current Status and Next Steps

Cyber security Country Experience: Establishment of Information Security Projects.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

The Human Factor of Cyber Crime and Cyber Security

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

US-CERT Overview & Cyber Threats

AN INFORMATION GOVERNANCE BEST

Honourable members of the National Parliaments of the EU member states and candidate countries,

Transcription:

Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009

Cyber Threat Some day we will sit down at a banquet table where our menu will consist of consequences ----- consequences of the decisions we make and those we fail to make.

Context United States is dependent on cyber for our national security, economic wellbeing, law enforcement, and public safety, and privacy.

Cyber The use of innovative technology and interconnected networks in operations improves productivity and efficiency, but also increases the Nation s vulnerability to cyber threats if cybersecurity is not addressed and integrated appropriately. A spectrum of malicious actors routinely conducts attacks against the cyber infrastructure using cyber attack tools. Because of the interconnected nature of the cyber infrastructure, these attacks could spread quickly and have a debilitating effect.

Cyber Security Cybersecurity includes preventing damage to, unauthorized use of, or exploitation of electronic information and communications systems and the information contained therein to ensure confidentiality, integrity, and availability. Cybersecurity also includes restoring electronic information and communications systems in the event of a terrorist attack or natural disaster.

Overview U.S. is dependent on cyber for national security, economic well-being, law enforcement, and public safety, and privacy The users, regulators, and owners and operators are dispersed among government and private sector Innumerable government and private entities are attempting to address cyber issues A strategic approach should facilitate and systematize public/private collaboration and information sharing to set requirements, and resource, execute, and track progress. The international nature of cyber must be reflected throughout in engagement by international stakeholders

Public Policy Challenge Nation is dependent on cyber for national security, economic well-being, public safety, and law enforcement Risk is real but not visible and obvious Authority/control is spread among multiple entities in the public and private sectors Cyber is international Individuals and organizations are reactive and tactical, not proactive and strategic We do not learn lessons from the past

What is the current cyber risk? Moderately sophisticated malicious actors can intrude into systems almost at will Intrusion into systems give outsiders the access of insiders Economic espionage - theft of proprietary data Theft of personal information and access to online accounts Broad-based or targeted disruption of communications and database access, or attacks on the integrity of data

What is our operating premise? Will it take a cyber calamity to drive an effective approach? Why expect that to make a difference? What can we expect to happen if there is a cyber disaster? How can we use that reality to drive action?

Current Approaches Either: Do more of what we have been doing, with greater effort and sharing of information? Find a benevolent, powerful despot to drive effective prioritization, adequate resource commitment, and enhanced collaboration and information sharing? Or Take a strategic approach

What is missing? What do we need to worry about and what do we need to do about it? We need to know our risk posture, identify requirements for addressing that risk that are generated by a public-private collaboration, and Make it easy to hold stakeholders accountable.

What does the nation need? A strategic approach to facilitate public/private collaboration and information sharing to set requirements, and resource, execute, and track progress on: Cyber risk; Cyber preparedness; Malicious activity and cyber crime; and Research and development.

Mission of the International Cyber Center To facilitate strategic collaboration and information sharing to better identify and address global ICT issues.

Priority Issues Capacity: Promote sustainable IT development & CERT capacity building in the developing world Risk: Develop collaboration framework to assess and mitigate risk to global ICT Response:Enhance global ICT preparedness situational awareness, analysis, information sharing, response, and recovery Crime: Strengthen coordinated, global effort against malicious activity and cyber crime to reduce frequency, impact, and risk R&D: Enhance global coordination to better assess and mitigate risk, and address long-term hard problems in cyberspace

CERT Capacity Building Int l Cyber Center (ICC) received a grant from the National Science Foundation grant to promote national CERTS in Africa, effective 10/1/09. We seek partners, advisors, & supplemental funding to support this effort. We understand CERT-FI is helping South Africa. We look for others who want to help.

Strategic Approach to Malicious Cyber Activity We are pursuing an initiative to promote a strategic approach by government (not just law enforcement) and the private sector against malicious cyber activity Seeking funding to create an information sharing capability to collect, preserve, analyze, and share information on malicious cyber actors AND enablers using a federated data-sharing model.

What capabilities do we need? Participation by key stakeholders in cyber risk, response and recovery Commitment to assess, prioritize, and implement measures to mitigate risk Situational awareness Analytical and forensic capabilities Incident response capability

Risk management for organizations & countries Risk management is critical for organization and entire countries Limited resources require prioritization Internal stakeholders must work together in ongoing, dynamic process to identify critical functions, interdependencies, risks Exercise and improve Provide resource requirements to seniors

How should we address cyber risk? Stakeholders at the national and int l levels must work together to assess and mitigate risk, and plan, and build capacity for, response and recovery. Use standards to drive risk reduction. Exercise to identify gaps and improve. Use this process to identify requirements to drive resource allocation and risk mitigation. Limited resources require prioritization.

Contact information: Andy Purdy Co-Director, International Cyber Center George Mason University President, DRA Enterprises, Inc. Andy.Purdy@comcast.net