C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY



Similar documents
C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

The Comprehensive National Cybersecurity Initiative

How To Write A Cybersecurity Framework

CyberSecurity Solutions. Delivering

Middle Class Economics: Cybersecurity Updated August 7, 2015

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

CONSULTING IMAGE PLACEHOLDER

NICE and Framework Overview

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cyber Security VTT and the Finnish Approach

Microsoft s cybersecurity commitment

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

[STAFF WORKING DRAFT]

TUSKEGEE CYBER SECURITY PATH FORWARD

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

DoD Strategy for Defending Networks, Systems, and Data

National Cyber Security Strategies: United States

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Threat Information Sharing; Perspectives, Strategies, and Scenarios

A NEW APPROACH TO CYBER SECURITY

Preventing and Defending Against Cyber Attacks November 2010

Cybersecurity The role of Internal Audit

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

The Danish Cyber and Information Security Strategy

Cyber security in an organization-transcending way

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

DHS, National Cyber Security Division Overview

Introduction to NICE Cybersecurity Workforce Framework

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Protecting Malaysia in the Connected world

Enterprise Capabilities Descriptions

Address C-level Cybersecurity issues to enable and secure Digital transformation

An Overview of Large US Military Cybersecurity Organizations

CYBER AND PRIVACY INSURANCE: LOSS MITIGATION SERVICES

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Preventing and Defending Against Cyber Attacks October 2011

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Cybersecurity: Mission integration to protect your assets

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

No. 33 February 19, The President

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Computer Network Security & Privacy Protection

Department of Homeland Security Federal Government Offerings, Products, and Services

Bellevue University Cybersecurity Programs & Courses

Regulatory Compliance Management for Energy and Utilities

CYBER SECURITY TRAINING SAFE AND SECURE

Software Defined Hybrid IT. Execute your 2020 plan

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

US-CERT Year in Review. United States Computer Emergency Readiness Team

How To Protect Your Network From Attack From A Network Security Threat

Cybersecurity Framework: Current Status and Next Steps

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

Cyber Information-Sharing Models: An Overview

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Department of Homeland Security

ARMA: Information Governance: A Revenue Source Potential

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Cyber Security Solutions

The Dow Chemical Company. statement for the record. David E. Kepler. before

CBEST/STAR Threat Intelligence

Preventing and Defending Against Cyber Attacks June 2011

Qatar Computer Emergency Team

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

(BDT) BDT/POL/CYB/Circular

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

Cybersecurity Converged Resilience :

Defending Against Data Beaches: Internal Controls for Cybersecurity

The ICS Approach to Security-Focused IT Solutions

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

A Guide to the Cyber Essentials Scheme

Cybersecurity and internal audit. August 15, 2014

Network Management and Defense Telos offers a full range of managed services for:

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

S. ll IN THE SENATE OF THE UNITED STATES

Homeland Security: Information Assurance Challenges and Opportunities. Building the National Cyber Security Division

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

I N T E L L I G E N C E A S S E S S M E N T

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Legislative Language

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Cybersecurity on a Global Scale

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

How To Write A National Cybersecurity Act

Transcription:

CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE

CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information assurance, risk management, cyber resilience, cybersecurity programs, multi-layer cyber capabilities and technologies CSCSS delivers and leverages its expertise in a variety of ways to help organizations move in the right direction, make the right decisions on security investments, save budget resources, and show a solid return on investment. The changing factors in business, security, and cost effectiveness are vital, complex, constantly in play, and must be clear and concise to have any impact. These changes are leading the way for the critical evaluations and innovative thought leadership that will shape and steer your business SECURELY.

Why C/ETS? C/CETS is the IT security industry s foremost resource for addressing many of the cybersecurity, technology, and business risk issues faced today. As IT infrastructure, security, and operations (IS&O) begin to blend, organizations are looking to implement solutions that deliver agility, cost effectiveness, and benefits. CSCSS is a globally-positioned, non-profit cybersecurity and research group. We offer world-class credibility and are uniquely able to provide objective, independent insight on virtually any area of IT security and risk management. We deliver refined standards-based processes and proven methodologies that provide the foundation for unbiased, practical, and actionable insight. Information Assurance (IA) The CSCSS Enterprise Technology + Security Group (C/ETS) focuses on providing information systems assurance and information security engineering and architecture services to assist in the design and development of information services, technologies, communications, products, and systems that ensure the certification and accreditation requirements of relevant national security authorities are met. Trending the Future in IA Cyber Strategy CSCSS, working with its interagency and international partners, leverages the opportunities of cyberspace while working to mitigate the risks. We are focused on respecting and protecting the privacy, civil liberties, freedom of expression, and innovation that have made cyberspace an integral part of global prosperity and securitywhile managing the intrinsic uncertainties and vulnerabilities that directly and drastically impact information assurance, defensive readiness, and national security. In developing its strategy for cyberspace, CSCSS has focused primarily on a number of fundamental aspects of the cyber threat. These include external threat actors, insider threats, supply chain vulnerabilities, and threats to global internet operational and economic capabilities. Our Mission n Manage cyberspace risk through efforts such as increased training, information assurance, greater situational awareness, workforce education, and creating secure and resilient network environments n Drive information assurance and security through Confidentiality, Integrity, and Availability by engaging and leveraging our collaborative partnerships n Build resilient cyber frameworks and self defenses while maintaining an innovative approach to information security development n Work closely with collaborative partners, public-private industry, academia, and the security community to rapidly deliver innovative, resilient, and secure capabilities where they are needed the most We Deliver C/ETS delivers a multi-disciplinary, standards-based approach with focused, practical industry knowledge into the issues affecting your mission-critical decisions and, ultimately, your bottom line and return on investment. C/ETS provides services that go beyond simple technology to provide an innovative, strategic approach to the business of managing information security, information assurance, and essential business processes and assets. AREAS OF DELIVERY n Information assurance n Security strategic planning n Security: Executive situational awareness briefings n Defining security objectives n Industry best practices n Standards delivery n Security audit/information assurance testing n Security training n Security maturity/metrics programs n Baseline security program frameworks n Security GRC management n Security: Program review and recommendations n Security program presentations for senior/executive management n Documentation (GRC, audit, general security, and project management) n Custom research, benchmarks, and industry reports

Industry Focus Industry focus is fundamental to GICSR s approach. We provide multi-disciplinary teams of audit, business risk management, security, and technology advisory professionals focused on the needs of key industry sectors. Leveraging our global reach, our skills and talents, we deliver industry-specific services providing real value to our clients. To do this we invest continuously to build our knowledge base of the industries we serve. We bring value by having a systematic understanding of key industries. C/ETSFOCUSES EFFORTS WITHIN INDUSTRY ORGANIZATIONS THROUGH: n Evaluation of organizational security programs n Security research/security trend analysis n Alignment of security programs with business goals and objectives n Corporate profitability and security: ROSI (Return on Security Investment) n Development of "lean" security programs n Optimizing security programs n Security best practices and standards implementation n Enhancing security awareness and education n Developing meaningful security/ maturity metrics program n Creating integrated risk management programs n Discovering and effectively complying with GRC n Security vendor selection n Defining strategic security plans n Projecting emerging issues in security and security technology CSCSS Enterprise Technology + Security Group (C/ETS) We work closely with industry clients helping them mitigate risks and make the solid decisions required in lean operating environments while seizing opportunities for pragmatic change and return on security, service, and technology investment. Together with CSCSS Defence Intelligence Group, CSCSS Cybercrime Intelligence Service and C3i Group, we provide monitoring and analysis activity delivering threat warnings, attack alerts, and bulletins that focus on the prevention of IA security issues. IA Strategic Leadership C/ETS provides strategic guidance and leadership in information assurance. Our experience, expertise, and background in security makes it possible for us to deliver independentlyfocused tactical IA solutions and frameworks that help mitigate security threats and reduce security and business risk. IA Client and Partner Support The IA mission within C/ETS spans industry verticals and supports clients while leveraging the efforts of our collaborative partners across government and industry to provide guidance, ensure the availability of IA solutions, and broaden IA knowledge and skills. C/ETS Core Competencies C/ETS has extensive information security architecture and engineering knowledge and experience. We have developed strong relationships with national security authorities and standards groups through CSCSS s collaborative partnerships to assist in product certification and system accreditation. IN SUPPORT OF FORMAL CERTIFICATION AND ACCREDITATION ACTIVITIES, STIAC INFORMATION SECURITY ENGINEERS PROVIDE: n Security architecture design, implementation, and review n Security policy design, implementation, and review n Threat risk and vulnerability analysis n Input on security-related test procedures and performance of high-level penetration testing n Secure operating system configuration n Security-relevant documentation n Security accreditation plans and security impact analysis n Network and telecom security and cryptography n Security management/risk management n Security management practices n Security architecture and models n Development/planning aspects of operational and physical security n Access control systems and methodologies n Security-focused application and systems development n Security consultation services (focusing in all knowledge areas of operation as well as business continuity/disaster response planning, law intrusion investigation, and ethics)

CSCSS / ENTERPRISE TECHNOLOGY + SECURITY Business, Industry, and Academic Outreach Providing key leadership and balancing cybersecurity and information assurance while protecting and delivering cyber innovation, critical business entities, intellectual property, and National Security Systems demands close collaboration between public-private sector institutions, government, and academia to raise the information assurance bar. To do this we will leverage existing programs within CSCSS such as C3i Group and the CSCSS Defence Intelligence Group (C/DIG), CSCSS Cybercrime Intelligence Service and our collective resources. Through our collaborative partnerships with government agencies, academia, and the public- private sector, our focus and mission advocate improvements in IA education and training, as well as in cybersecurity awareness and workforce education. Outreach and inclusion benefits the whole spectrum of information technology. They represent and reflect major focus areas for information assurance and may also provide opportunities to industry for IA research and innovation, as well as cybersecurity awareness, education, and delivery. Strategic Vendor Partners Program Our faculty of analysts research hardware, software, and service providers, independently reviewing vendors that provide innovative technologies to build and manage security services, secure information environments, and risk management services. This research provides an unbiased, independent assessment of vendor products, service, and technology differentiators and challenges. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE About CSCSS The Centre for Strategic Cyberspace + Security Science / CSCSS is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. Internationally, CSCSS operates in the United Kingdom, Europe, United States, South America, Australia, and Canada. CSCSS Collaborative Partners The Centre for Strategic Cyberspace + Security Science operates in a collaborative partnership with agencies and organizations that share our commitment to the advancement of Cybersecurity, National + International Security, Cyber Education and Awareness, and Cybersecurity Research and Initiatives. Contact Us For more information on the C3i Group, the Centre for Strategic Cyberspace + Security Science, its programmes or to find out how we can help you please contact us. CSCSS / Centre for Strategic Cyberspace + Security Washington D.C + 571.451.0312 London, United Kingdom +44 2035141784 North America +877.436.6746 Middle East +855.237.8767 Australia +61 2.8003.7553 Email cets@cscss.org CSCSS.org