Indiana State Government, K-12 Cyber Safety

Similar documents
S. ll IN THE SENATE OF THE UNITED STATES

Thank you for your very kind introduction.

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Dealer Member Cyber-security

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

S. 21 IN THE SENATE OF THE UNITED STATES

Improving Cyber Security Risk Management through Collaboration

NNIT Cybersecurity. A new threat landscape requires a new approach

THE drop cap white spread is the chartacter style to use for the drop cap. Use this masater

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Security Awareness Training Solutions

ALERT LOGIC FOR HIPAA COMPLIANCE

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

What is Really Needed to Secure the Internet of Things?

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

TUSKEGEE CYBER SECURITY PATH FORWARD

Closing the Vulnerability Gap of Third- Party Patching

Cyber Risk Management with COBIT 5

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Oil & Gas Cybersecurity

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

State Governments at Risk: The Data Breach Reality

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cybersecurity Enhancement Account. FY 2017 President s Budget

TRANSATLANTIC CYBER SECURITY SUMMIT

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Northrop Grumman Cybersecurity Research Consortium

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Building a Business Case:

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)

Defense Security Service

Cyber attack on Twitter, 250,000 accounts hacked

CYBER SECURITY FOUNDATION - OUTLINE

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cyber Security Solutions:

National Cyber Security Policy -2013

EY Cyber Security Hacktics Center of Excellence

VMware and the Need for Cyber Supply Chain Security Assurance

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

April 28, Dear Mr. Chairman:

El Camino College Homeland Security Spring 2016 Courses

Symantec Cyber Security Services: A Recipe for Disaster

Automotive Suppliers and Cybersecurity

Cyberprivacy and Cybersecurity for Health Data

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Defensible Strategy To. Cyber Incident Response

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

SMALL BUSINESS PRESENTATION

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Building a Corporate Application Security Assessment Program

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cybersecurity Awareness for Executives

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

INDIANA UNIVERSITY MASTERS OF SOCIAL WORK PROGRAM ASSESSMENT OF STUDENT LEARNING OUTCOMES BY CAMPUS LAST COMPLETED ON FEBRUARY 4, 2015

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER

Military Credit Transfer Policies at Indiana Institutions

Cyberspace Situational Awarness in National Security System

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

I N T E L L I G E N C E A S S E S S M E N T

The Economic Benefit of International Students $26.8 billion Contributed; 340,000 U.S. Jobs Supported

Collateral Effects of Cyberwar

Lessons from Defending Cyberspace

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

A Detailed Strategy for Managing Corporation Cyber War Security

Public Law th Congress An Act

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Software that provides secure access to technology, everywhere.

Legislative Language

OCIE Technology Controls Program

Enterprise Cybersecurity: Building an Effective Defense

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Stop advanced targeted attacks, identify high risk users and control Insider Threats

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Cyber Security Initiatives at the Federal Level & Technology Opportunities. Slide 1

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Preventing and Defending Against Cyber Attacks November 2010

Cybersecurity thoughts and issues from a political perspective

Healthcare Security: Improving Network Defenses While Serving Patients

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

State of Security Survey GLOBAL FINDINGS

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Government + Enterprise + Innovation + Strategy

Transcription:

INCSC INDIANA CYBERSECURITY SERVICES CENTER Hans Vargas Purdue University Professor Melissa Dark Purdue University

INDIANA CENTRALIZED OFFICE OF TECHNOLOGY The Indiana Office of Technology (IOT) encompasses all technological services for state agencies in the state, striving to provide cost-effective, secure, and reliable technology services. Indiana Code, Article 13.1 established IOT as a state agency in July of 2005 to: Establish standards for the technology infrastructure of the state. Lower costs of providing information technology services. Bring the most appropriate technology solutions to. Improve and expand government services provided electronically.

THE NEED FOR INCSC Local governments, K-12 schools, and small/medium sized businesses are VULNERABLE Indiana lacks a centralized entity to create, update, and identify areas of improvement on cyber-related policies to all the agencies in the state. Currently, each Indiana agency,k-12 school has the authority to comply or not with those security recommendations. Indiana has a good number of large and medium industries as well as businesses that are targeted by attackers.

KEY CAPABILITIES Military operations: Naval Surface Warfare Center Crane Division Air National Guard fighter units at Fort Wayne, and Terre Haute The National Guard operations at Camp Atterbury in Edinburgh, and Muscatatuck Urban Training Center. Naval Operational Support Center Indianapolis Department of Defense operates the Defense Finance and Accounting Service (DFAS) State Economy. 2012 fiscal year ended with 2.15 billion USD. Network Infrastructure: ilight network for Research and Education collaboration. Higher Education. Purdue University, Indiana University, Notre Dame University,

INCSC INDIANA CYBERSECURITY SERVICES CENTER The goal is to preserve Indiana economic development from cyber-attacks. INCSC will represent a Public Broker of Private Services, and using as a delivery model: Security-as-a-Service. The Center would be created by the partnership and collaboration of several important actors: 1) The Board, formed by a selected group of institutions that have the responsibility to actively formulate the strategy, specify the common needs and deploy the solutions among their respective institutions and other customers; 2) Industry Partners, are key global providers of IT security products and services that will be offered to the customers in order to offer effective protection from cyberintrusions, data breaches, and disruption of business operations; 3) Customers, formed by a diverse array of state and local government institutions, private businesses, schools (K-12) and Universities.

INCSC (THE CENTER)- IMPACT The impact will be measured by security benchmarks achieved by its public and private participating members. Indiana critical infrastructure organizations will be 1) aware of threats and 2) capable of maintaining minimum operating levels under attack thanks to preventive and defensive controls suggested by The Center. The model of security as a service provides great benefits for The Center s members, and also helped them understand the real benefits of sharing attack-related data to the center to create a knowledge database and share best practices and common threats with other members. Members of The Center will utilize the latest technology related to vulnerability analysis, Security policy framework, access to industry tools and services, real time network flow analysis, better response and protection from imminent attacks, and continuity of operations. Indiana State will position itself in a vantage point to better protect critical infrastructure, state agencies, businesses, K-12, and its citizens from malicious attacks and exploits.

INCSC IMPORTANCE FOR EDUCATION The Center considers education as a top priority, from: Creating and delivering content to K-12 schools Promoting research collaboration among top universities connected to ilight. Serving as a training facilitator of cyber content to state agencies, businesses, and maybe even citizens.

QUESTIONS? ADVICE? Melissa Dark Purdue University dark@purdue.edu Hans Vargas Purdue University hvargas@purdue.edu