Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust



Similar documents
The Comprehensive National Cybersecurity Initiative

DOE Cyber Security Policy Perspectives

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

National Cyber Security Strategies: United States

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

IEEE-Northwest Energy Systems Symposium (NWESS)

September 4, appearing before you today. I am here to testify about issues and challenges in providing for

3 keys to effective service availability management. Visibility. Proactivity. Collaboration.

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Cyber Security Research and Development a Homeland Security Perspective

The Aviation Information Sharing and Analysis Center (A-ISAC)

Lessons from Defending Cyberspace

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

Cyber security Building confidence in your digital future

IoT & SCADA Cyber Security Services

Enterprise Security Tactical Plan

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Conflict management Funmi Olonisaki King s College London

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

Obtaining Enterprise Cybersituational

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Department-wide Systems & Capital Investment Programs

FFIEC Cybersecurity Assessment Tool

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation

FREQUENTLY ASKED QUESTIONS

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

Network Security Deployment (NSD)

Cyber Security and Privacy - Program 183

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Cyber security in an organization-transcending way

US-CERT Year in Review. United States Computer Emergency Readiness Team

NICE and Framework Overview

SMB Update on Service Information Gathering

Middle Class Economics: Cybersecurity Updated August 7, 2015

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003

Cybersecurity Strategic Consulting

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW

KUDELSKI SECURITY DEFENSE.

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Technology and Cyber Resilience Benchmarking Report December 2013

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Defending Against Data Beaches: Internal Controls for Cybersecurity

QRadar SIEM and FireEye MPS Integration

IBM Penetration Testing Services

Is Penetration Testing recommended for Industrial Control Systems?

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Docket No. DHS , Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Advanced Threat Protection with Dell SecureWorks Security Services

Can We Become Resilient to Cyber Attacks?

EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics

Cybersecurity Awareness for Executives

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Priority III: A National Cyberspace Security Awareness and Training Program

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

Bio-inspired cyber security for your enterprise

ITIL V3: Making Business Services Serve the Business

Address C-level Cybersecurity issues to enable and secure Digital transformation

A Primer on Cyber Threat Intelligence

All about Threat Central

Combating a new generation of cybercriminal with in-depth security monitoring

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

Addressing Cyber Risk Building robust cyber governance

Understanding the NIST Cybersecurity Framework September 30, 2014

Nine Cyber Security Trends for 2016

Cyber security Building confidence in your digital future

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

Securing the Nation: Creating cyber security, resilience and readiness

PwC s Advanced Threat and Vulnerability Management Services

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Building a Cyber Security Operations Center

Cybersecurity and internal audit. August 15, 2014

Transcription:

Session ID: PNG-F01 Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust Michael E. Smith Senior Cyber Policy Advisor to the Assistant Secretary, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy

How serious is the threat? Sophisticated, patient actors have gained direct access to control systems Presence goes undetected for years More ICS devices are being connected to the internet, intentionally and unintentionally Search engines are enabling the discovery and identification of internet facing devices Scanning and cataloguing of devices with known vulnerabilities is ongoing 2

Objectives Increase awareness of the Cybersecurity Risk Information Sharing Program (CRISP) and its robust new model of public-private partnership Recognize the challenges posed by current U.S. laws and policies in getting CRISP up and running Examine how we jointly addressed these challenges Persuade you to pursue similar partnerships 3

What is the impact of CRISP? One of a kind partnership Pushing the boundaries of information sharing Current participants provide electric power to 60,107,604 customers - 45.68% of the continental U.S. total 4

The Foundation of Trust Achieving bi-directional trust The authorities and policies that define our relationship The programs and events that sustain our relationship 5

The Energy Sector Roadmap Provides strategic framework to: Align activities to sector needs Coordinate public and private programs Stimulate investments in ICS security 6 www.controlsystemsroadmap.net Build a Culture of Security Assess and Monitor Risk Develop and Implement New Protective Measures to Reduce Risk Manage Incidents Sustain Security Improvements

Participants The government Department of Energy And the rest of the government Industry Energy Sector Information Sharing and Analysis Centers Owners and operators Cybersecurity service providers 7

Architecture Cyber Fed Model (CFM) Energy Sector Electricity Information Sharing and Analysis Center (ISAC) Downstream Natural Gas ISAC Oil and Natural Gas ISAC Operational Pilots Information Sharing Devices (ISD) Actionable Indicators Analysis Reports Situational Awareness Asset Owners Selected Data Transferred to a Highly Secure DOE Environment 8 DOE Energy Sector Cyber Intel Unit Analytics Information Sharing Analysis Anonymized Enriched Data Multi-Agency Classified Information: Actionable Indicators Tools and Techniques Multi-Agency Classified Analytics

Five Year Plan Mission and Vision Mission: By utilizing advanced technologies and innovative analytical capabilities: establish and maintain effective collaboration with energy sector partners through robust bi-directional information sharing provide energy sector partners with targeted, actionable information to enable requirement setting, detection, prevention, mitigation, and rapid response to emerging threats Vision: By 2019, an enduring, trusted bi-directional information sharing partnership between the Department of Energy and its energy sector partners significantly enhances the security of energy sector infrastructure systems and improves the U.S. Government s near real-time situational awareness. 9

Five Year Plan - Goals Efficient and effective decision making is a sector challenge DOE will focus on three strategic goals to address this challenge: Data enrichment Analytic platform Operational pilots 10

Strategic Goal 1: Data Enrichment DOE Energy Sector Cyber Intel Unit Information Sharing Multi-Agency Classified Information: Actionable Indicators Tools and Techniques Analytics Analysis Anonymized Enriched Data Multi-Agency Classified Analytics 11

Strategic Goal 2: Analytic Platform Platform is key to managing increasing data diversity and must: provide both industry and government with near real-time actionable threat information; facilitate collaborative analysis; and deliver the insight required for crucial risk management decisions. The platform will also: shape and evaluate sensor technologies; identify capability gaps; and enhance and help correlate data 12

Strategic Goal 3: Operational Pilots Investigate technologies and capabilities that improve CRISP Ensure operational activities align with industry priorities Collaborate with DHS, the ISACs, energy sector, and cybersecurity vendors to: identify and validate pilot targeted capabilities review proposals, and select pilot awardees conduct subsequent evaluation and assessment 13

1 st Operational Pilot Norse-FireEye Norse Corporation FireEye 14

Year One Results Direct results: capability (architectural, technology, and process) improvements and/or gaps identified and incorporated by CRISP, Norse, FireEye and the volunteer participants; volunteer participants choose to remain in CRISP after the pilot ends Indirect results: raising energy sector awareness of the range of best in class commercially available cybersecurity capabilities while also; raising the cybersecurity industry awareness of the unique concerns, challenges, and threats faced by the energy sector 15

Next Operational Pilots ICS Focused Adding two new national labs Fully implementing machine-tomachine sharing Identifying and employing ICS situational awareness capabilities http://www.grants.gov/ 16

Apply Develop your own trusted information sharing relationships Actively participate in U.S. Government information sharing programs Question existing information sharing models and advocate for improvements 17

Summary We can t wait CRISP represents a ground-breaking new model of publicprivate partnership U.S. laws and policies have historically not kept pace with the current cyber threat landscape nor with this type of aggressive partnership DOE and its energy sector partners jointly decided that we needed to act now I encourage all of you to do the same 18

Questions? Mike Smith 202-586-8710 Michael.smith2@hq.doe.gov Cybersecurity for Energy Delivery Systems Program Website: http://energy.gov/oe/services/technologydevelopment/energy-delivery-systems-cybersecurity 19