Governor s Cybersecurity Task Force. Monday, November 23, 2015 Roughrider Room State Capitol Building



Similar documents
The STAGEnet Security Model

State Information Technology Advisory Committee (SITAC) March 12,2015 Pioneer Room State Capitol Building

Water Security in New Jersey: Partnership and Services

Presentation to the SITAC Meeting. July 21,2014 Brynhild Haugland Room State Capitol Building

How To Write A Cybersecurity Framework

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

How To Protect Your State From Cybercrime

Information Security Program CHARTER

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

The Protection Mission a constant endeavor

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

Wisconsin National Governor s Association: Call To Action

State of Montana Information Technology Managers Advisory Council

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Report on CAP Cybersecurity November 5, 2015

Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

State Governments at Risk: The Data Breach Reality

Get the most out of Public Sector Cyber Security Associations & Collaboration

CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

FFIEC Cybersecurity Assessment Tool

Emerging Trends in Information. Impacting the States

National Cybersecurity & Communications Integration Center (NCCIC)

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Governmental Oversight and Accountability Committee

U. S. Attorney Office Northern District of Texas March 2013

INFORMATION TECHNOLOGY POLICY

The Heart of the Matter:

operational and regional area.

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

ITCC. November 18,2015 ITD Room 438

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Inform e-commerce Reference Guide

Big Data, Big Risk, Big Rewards. Hussein Syed

south dakota enterprise cyber security operations 2014 NASCIO Recognition Award Nomination Category: Cybersecurity Initiatives

State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1.

How To Create A Cyber Security Program For Itd

Into the cybersecurity breach

DOD Medical Device Cybersecurity Considerations

Working with the FBI

ESET SECURITY FOR MICROSOFT SHAREPOINT SERVER. Quick Start Guide

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

The Digital Identity Ecosystem of the States: Securing the Enterprise

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Sample audit Data Center - A Topical Overview

Cybersecurity in the States 2012: Priorities, Issues and Trends

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

California Counties Information Security Programs A look into the progress and future plans across counties

Personal Security Practices of the CAO

OPE R ATION R A PID ROI Situation:

Presentation to the IT Directional Meeting. July 23, 2014 Pioneer Room State Capitol

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Looking at the SANS 20 Critical Security Controls

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Cybersecurity. Are you prepared?

INFRAGARD.ORG. Portland FBI. Unclassified 1

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Review of the SEC s Systems Certification and Accreditation Process

Italy. EY s Global Information Security Survey 2013

CYBER SECURITY GUIDANCE

Public Sector Information Security in Washington State

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

NARA s Information Security Program. OIG Audit Report No October 27, 2014

An Overview of Large US Military Cybersecurity Organizations

Implementation Guide. Step by Step Instructions to Help You Setup the Envision Software

Cybercrime and Regulatory Priorities for Cybersecurity

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

USSD AND API MANAGEMENT PAVE THE WAY INTOA CONNECTED WORLD. Ruedi ger Kl ei n, Head of Devel opment, di gades GmbH

Enterprise Security Tactical Plan

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Brief Description: Reorganizing and streamlining central service functions, powers, and duties of state government.

Cybersecurity and internal audit. August 15, 2014

Cyber Security Metrics Dashboards & Analytics

Cybersecurity The role of Internal Audit

BPA Policy Cyber Security Program

Introduction to NICE Cybersecurity Workforce Framework

Cybersecurity Challenges in Healthcare. Doug Copley Beaumont Health & Michigan Healthcare Cybersecurity Council

The Computerworld Honors Program

SMITHSONIAN INSTITUTION

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

State of the States: Priorities, Trends and Issues NCSL Fall Forum December 6, 2013

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT INFORMATION TECHNOLOGY SECURITY POLICY. HUD Handbook REV4.1

Enterprise Security Governance, Risk and Compliance System. Category: Enterprise IT Management Initiatives. Initiation date: June 15, 2013

INFORMATION TECHNOLOGY DEPARTMENT INDEPENDENT SERVICE ORGANIZATION AUDIT For the period 4/1/ /1/2014

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Network Marketing Strategy - Overview of the Colorado Cyber Security Program

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Transcription:

Governor s Cybersecurity Task Force Monday, November 23, 2015 Roughrider Room State Capitol Building

Agenda Topic October Meeting Highlights Lt. Gov. Drew Wrigley NAIC Cybersecurity Overview Adam Hamm, ND Insurance Commissioner Current State of Cybersecurity Governance ITD Open Discussion: Task Force Perspectives on Cybersecurity Governance Closing Comments

National Governor s Association Act and Adjust Establish a Governance Structure for Cybersecurity Conduct Risk Assessments and Allocate Resources Accordingly Implement Continuous Vulnerability Assessments Ensure Your State Complies With Current Security Methodologies and Business Disciplines in Cybersecurity Create a Culture of Risk Awareness

North Dakota Cybersecurity Governance State Government ITD Chief Information Officer NDCC 54-59 Statewide Critical Infrastructure and Key Resources Department of Emergency Services NDSLIC (ND State and Local Intelligence Center) Higher Education NDUS Vice Chancellor for IT and Institutional Research K-12 Education Educational Technology Council and EduTech

ND Cybersecurity Governance State Government ITD Chief Information Officer Per NDCC 54-59-05.2 and 54-59-05.14 ITD has the authority and responsibility for information systems security surrounding State of North Dakota information technology assets. CIO Executive Advisory Committees State Information Technology Committee (SITAC) NDCC 54-59-07 18 Members All 3 Branches of Government, Higher Education, 11 State Agencies and 2 Private Sector Members Legislative Information Technology Committee Governor s Cybersecurity Task Force

ND Cybersecurity Governance State Government ITD Operations Deputy CIO Security Division lead by a Chief Information Security Officer Security roles and responsibilities in our Network Services, Computer Systems and Software Development divisions ITD Advisory Committees IT Coordinators Council (ITCC) All 3 Branches of Government 13 core agencies Enterprise Architecture - Security Architecture Team 13 Security Related Standards Partnerships Multi-State Information Sharing and Analysis Center (MS-ISAC) InfraGard NASCIO and NASTD

ITD Cybersecurity Framework

ITD Cybersecurity Framework - Functions Identify What do I need to protect? Protect What controls do I use? Detect How do I know I am being attacked? Respond What actions do I take? Recover How do I return to normal operations? Effective security encompasses the relationship between all five functions it is a process, not a product.

ITD Cybersecurity Framework - Functions Based on NIST Framework 5 Functions 22 Categories 18 Control Families 225 Controls 669 Control Enhancements

Cybersecurity Framework Roles and Responsibilities Six Main Roles and Responsibilities Senior Management (ITD and CIO Advisory Committees) Information Security Management (ITD) Information/Application Owner (State Agencies) Agency Director Agency IT Coordinator Agency Security Officer Technology Providers (ITD and/or Vendors) Supporting Functions (Audit, Physical Security, DR) Users (State Agencies and their Stakeholders)

Cybersecurity Roles and Responsibilities ITD s Role (IS Security Management and Technology Provider) Per NDCC 54-59-05.2 and 54-59-05.14 ITD has the authority and responsibility for information systems security surrounding State of North Dakota information technology assets. ITD is responsible for protecting the availability, integrity, and confidentiality of the state s information systems and the data stored in information systems that are managed by ITD. ITD also directs the development of standards, policies and guidelines for enterprise security. This is done in collaboration with state agencies through the ITCC and Enterprise Architecture process.

Cybersecurity Roles and Responsibilities Information/Application Owner (State Agencies) ITD does not own most of the information residing in the data center. The information owner for most data is a state agency or political subdivision. The information owner is responsible for being aware of the various applications and data they own. The information owner is responsible for authorizing access privileges and ensuring regular reviews and updates to manage changes in risk profiles.

Cybersecurity Roles and Responsibilities Agency Director Agency Directors are responsible for information security in each agency, for reducing risk exposure, and for ensuring the agency s activities do not introduce undue risk to the enterprise. The director also is responsible for ensuring compliance with state enterprise security policies and with state and federal regulations. Per NDCC 54-59-10 each agency must appoint an information technology coordinator to maintain a liaison with ITD. The agency director will often delegate their information security responsibilities to the agency information technology coordinator.

Cybersecurity Roles and Responsibilities Agency IT Coordinator This role is assigned by the Agency Director and their security responsibilities include: Submitting security requests Reviewing access logs Reviewing authorization reports Serving as the main point of contact between ITD and the agency regarding security issues These duties are sometimes delegated to the Agency Security Officer.

Cybersecurity Roles and Responsibilities Agency Security Officer Agency Security Officers are responsible for communicating with ITD s Security Incident Response Team and coordinating agency actions in response to an information security incident. In many agencies the Agency IT Coordinator fills this role. Agency User Responsible for complying with the provisions of IT security policies and procedures.

North Dakota Cybersecurity Governance Discussion on Governance and Roles and Responsibilities

Application Inventory and Risk Categorization Agency Name or acronym Division If applicable within your agency Business Function Short description such as Case Management, Unemployment Payments, etc. Agency Contact Primary application owner System Short Name If applicable; often an acronym System Full Name System title; without acronyms Users Internal (within agency), External (other agencies/partners), and/or Public Data Access Personally Identifiable Information (PII), Protected Health Information (PHI), Internal Use, and/or Public Use Internal via STAGEnet and/or external via the public internet Authentication None, NDGOV Active Directory, ND Login (LDAP), and/or Other Developed By ITD, Agency, and/or Other Hosted By ITD, Agency, and/or Other Cost Acquisition, Maintenance/Support, and Hosting

North Dakota Cyber Disruption Response Strategy Focusing on Cybersecurity for Critical Infrastructure and Key Resources in the State of North Dakota. Specific goals are still under development but working goals are: Improve Situational Awareness in the various sectors. Create Plans for Cyber Threat Prevention, Mitigation, Response and Recovery Train Staff and Conduct Exercises of Plans Conduct Risk Assessments to Identify Vulnerabilities Coordinated by ITD and the Department of Emergency Services

Closing Comments

THANK YOU!!!

High Level Cybersecurity Relationships and Strategies - November 2015 Statewide Infrastructure State Government ND SLIC (DES) NDCC Cybersecurity Related Sections Adj. General - Dave Sprynczynatyk Highway Patrol - Mike Gerhardt AG/BCI - Dallas Carlson ITD - Mike Ressler K-12 University ETC Director NDUS - CIO EduTech Director Pa rt of SITAC Coordi na tes wi th ITD EduTech K-12 Security Analyst NDUS Security Staff CIO SITAC (18 Members) Al l 3 Bra nches + 11 Agenci es + 2 Pri va te Sector Reps Security Briefings/Education Direction Setting and Initiatives IT Committee Securi ty Bri efi ngs /Educa ti on Di recti on Setti ng a nd Ini ti a ti ves Planned Initiatives Appl i ca ti on Inventory/Cl a s s i fi ca ti on Expa nded Appl i ca ti on Sca nni ng Devel op Exec Level SIRT Pl a n Expl ore Agency Ri s k Scori ng Cybersecurity Task Force Securi ty Bri efi ngs /Educa ti on Di recti on Setti ng a nd Ini ti a ti ves ITD SLIC Security Analyst New Pos i ti on Cyber Disruption Response Strategy Deputy CIO Chi ef Informa ti on Securi ty Offi cer Securi ty Di vi s i on ITD Operations Network Servi ces, Computer Servi ces, Softwa re Devel opment Partnerships Color Key In Progress Completed Initiatives Securi ty Archi tecture Tea m 3 Bra nches - 13 core a genci es Agency IT Coordinators and Security Officers In Place Owners - DES a nd ITD Planned Initiatives IT Coordinators Council US DHS - CIS/MS-ISAC FBI - Infra Ga rd NASCIO a nd NASTD STAGEnet a l l ows Pol Sub - NDACo Cybersecurity Framework - NIST La yered Securi ty Approa ch Identi fy, Protect, Detect, Res pond, Recover Centralized Security Practices Infra s tructure a nd Moni tori ng Awareness - Annua l /New Hi res October Cybers ecuri ty Month Audits - SAO (SOC2) + Securi ty Federa l - DHS a nd Ta x (8) Speci a l - BND a nd others In Place Enterpri s e Archi tecture Sta nda rds a nd Gui del i nes 14 Securi ty Rel a ted In Progress New Pos i ti on ITD Cybersecurity Framework Roles Monthl y Ca bi net Level Bri ef Seni or Mgmt - CIO, SITAC, Leg IT Comm. (NDCC 54-59) Federa l Homel a nd Securi ty Ma na ged Securi ty Pa rtners hi p Info Securi ty Mgmt - ITD Deputy CIO a nd ITD CISO Hi gh-ri s k Appl i ca ti on Sca ns Info/App Owners - Agency Di rectors a nd Agency IT Coord. ITD Broker Rol e Technol ogy Provi ders - ITD Sta ff a nd Vendors Zero Trus t Bui l d Out Us ers - Agency Sta ff a nd Externa l Us ers