U.S. Cyber Security Readiness



Similar documents
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

DHS, National Cyber Security Division Overview

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

INFRAGARD.ORG. Portland FBI. Unclassified 1

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Subject: Critical Infrastructure Identification, Prioritization, and Protection

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

An Overview of Large US Military Cybersecurity Organizations

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Privacy and Security in Healthcare

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Actions and Recommendations (A/R) Summary

Cybersecurity Awareness. Part 2

Water Security in New Jersey: Partnership and Services

[This page intentionally left blank]

Middle Class Economics: Cybersecurity Updated August 7, 2015

Preventing and Defending Against Cyber Attacks November 2010

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Working with the FBI

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

CYBER SECURITY GUIDANCE

Preventing and Defending Against Cyber Attacks June 2011

S. ll IN THE SENATE OF THE UNITED STATES

El Camino College Homeland Security Spring 2016 Courses

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Department of Homeland Security

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

The Comprehensive National Cybersecurity Initiative

Homeland Security Presidential Directive/HSPD-5 1

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

What are you trying to secure against Cyber Attack?

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

National Cybersecurity & Communications Integration Center (NCCIC)

Critical Infrastructure Security and Resilience

Cybersecurity: What CFO s Need to Know

National Initiative for Cyber Security Education

CYBERSECURITY INVESTIGATIONS

Threat and Hazard Identification and Risk Assessment

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

US-CERT Overview & Cyber Threats

CONCEPTS IN CYBER SECURITY

Keeping the Lights On

DHS. CMSI Webinar Series

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Confrontation or Collaboration?

CYBERSECURITY EXAMINATION SWEEP SUMMARY

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

How To Protect Yourself From Cyber Crime

ITU National Cybersecurity/CIIP Self-Assessment Tool

US-CERT Year in Review. United States Computer Emergency Readiness Team

Above My Pay Grade: Incident Response at the National Level

The President s Task Force on Identity Theft and The FTC s Role in Identity Theft

Resources and Capabilities Guide

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

2014 Montana Government IT Conference. Securing Data Networks and People

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Cyber Security Strategy of Georgia

( 4EC C11392)

Ohio Homeland Security Strategic Plan

v. 03/03/2015 Page ii

Australia s proposed accession to the Council of Europe Convention on Cybercrime

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

DEPARTMENT OF HOMELAND SECURITY

Why you should adopt the NIST Cybersecurity Framework

Transcription:

U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation

Overview U.S. National Plan National Cyber Risk Management Risk Mitigation/Security Compliance Way Forward/Areas of Cooperation

Cyber - Physical Relationship Critical Infrastructure / Key Resources Farms Agriculture and Food Food Processing Plants Energy Transportation Chemical Industry Power Plants Production Sites Railroad Tracks Highway Bridges Pipelines Ports Chemical Plants Cyber Infrastructure Internet Domain Name System Web Hosting IP Protocol E-Mail Hardware Servers Desktops Networking Equipment Postal and Shipping Water Public Health Telecommunications Banking and Finance Key Assets Delivery Sites Reservoirs Treatment Plants Hospitals Cable Fiber FDIC institutions Nuclear Power Plants Government facilities Dams Software Operating Systems System Utilities Program Applications Control Systems SCADA PCS DCS

Government s key cyber roles Cyber Law Enforcement and Intelligence State Cyber Security Coordination FBI/DOJ Homeland Security/ Secret Service Cyber Preparedness, Cyber Infrastructure Response, Recovery, Protection Homeland Security Consumer Protection Cyber Fraud Prevention FTC Information Security Standards and Guidelines NIST

Framework for National Action a national strategy sound legal and regulatory foundation to address and respond to cyber security and cyber crime (DoJ/FBI/ USSS); a national security response system with effective organizations to prevent, predict, detect, respond to and recover from cyber incidents (DHS/NCSD) coordinated partnership between government at all levels and the private sector leadership role by governments in promoting a culture of cyber security among those who own, provide, manage, service and use information systems and networks.

Public and private partnerships are essential to cyber security Majority of U.S. assets in private sector Exception for U.S. military and government assets Often relies on private sector infrastructure Represent the foundation of our critical infrastructure protection and cyber security initiatives Work together to mitigate the risk associated with cyber consequences, vulnerabilities and threats Build global situational awareness through outreach, collaboration, and engagement

Managing Cyber Risk The National Infrastructure Protection Plan (NIPP): Cyber Risk Mitigation Programs

NIPP: Cyber Implements the NIPP Risk Management Framework toward securing the cyber infrastructure across all the 17 critical infrastructure/key resource sectors Assess and prioritize risk mitigation efforts based on threat, vulnerabilities, and consequences Requires coordination among agencies and between government and private sector Cyber Components: IT Sector risk management/sector Specific Plan Cyber guidance across all sectors

Risk Mitigation Programs Internet Disruption Working Group Promote resiliency of the Internet Control Systems Security Program Reduce control system cyber vulnerabilities in critical infrastructure Software Assurance Program Mitigate risk through the creation of more secure software

National Cyberspace Security Response System Federal Agencies (GFIRST, DOD, CISOs) Law Enforcement/Intelligence International State and Local agencies Private Sector Homeland Security Operations Center (HSOC)

Risk Mitigation/Compliance Outreach and Awareness Promote cyber security awareness among the general public and within key communities including international and private sector Establish and maintain relationships with: Government cyber security professionals Industry www.onguardonline.gov Awareness Organizations www.staysafeonline.org National Cyber Security Awareness Month - October

National Cyberspace Security Response System Correlate incident data from multiple sources US-CERT Malicious Code Analysis Team Cyber risk analysis Cyber Threat: Participate in the National Intelligence Estimate for cyber and cyber intelligence requirements Coordination with law enforcement and intelligence

National Cyberspace Security Response System Response US-CERT Operations: 24x7x365 watch and warning center US-CERT Portal National Cyber Response Coordination Group (NCRCG) Federal government's principal interagency mechanism to facilitate coordination of efforts to respond to and recover from cyber incidents of national significance Established by Cyber Annex to National Response Plan

Law Enforcement Strategy 1. Investigate and prosecute cybercriminals 2. Improve domestic operational response and cooperation. 3. Improve international cooperation on cybercrime investigation. 4. Improve domestic cybersecurity efforts to reduce vulnerabilities.

Cybercriminals are changing

Law Enforcement International Cooperation Countries need to: Enact sufficient laws to criminalize computer abuses Commit adequate personnel and resources Improve abilities to collect and share evidence internationally Council of Europe Convention on Cybercrime ratified by U.S. Senate G8 24/7 Network

Areas of Cooperation Standards and best practices Training and education Research and development Long term planning and improvements Law enforcement cooperation

Room document United States Framework for National Action for Cybersecurity and Critical Information Infrastructure Protection