Above My Pay Grade: Incident Response at the National Level



Similar documents
[This page intentionally left blank]

DHS, National Cyber Security Division Overview

Preventing and Defending Against Cyber Attacks November 2010

Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

An Overview of Large US Military Cybersecurity Organizations

Department of Homeland Security

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security

Preventing and Defending Against Cyber Attacks June 2011

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015

U.S. Cyber Security Readiness

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

National Cybersecurity & Communications Integration Center (NCCIC)

Confrontation or Collaboration?

How To Make A National Security Agreement Between Dhs And Dod

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

National Communications System. December 6, 2007

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

Actions and Recommendations (A/R) Summary

A Crisis Response, Information Sharing View of FFIEC Appendix J?

Cybersecurity Awareness. Part 2

Testimony of John W. Carlson on behalf of the. The Financial Services Information Sharing & Analysis Center (FS-ISAC)

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

FS-ISAC CHARLES BRETZ

Banking and Finance Sector-Specific Plan An Annex to the National Infrastructure Protection Plan

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

The Aviation Information Sharing and Analysis Center (A-ISAC)

AT&T Cybersecurity Policy Overview

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC

The Comprehensive National Cybersecurity Initiative

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME

The DS Information Assurance and Cybersecurity Role-Based Training Program. Diplomatic Security Training Center (DSTC) Dunn Loring, VA

Introduction to NICE Cybersecurity Workforce Framework

Cybersecurity & the Department of Homeland Security

Water Security in New Jersey: Partnership and Services

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

US-CERT Year in Review. United States Computer Emergency Readiness Team

NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

El Camino College Homeland Security Spring 2016 Courses

Into the cybersecurity breach

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Report on CAP Cybersecurity November 5, 2015

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Data Analytics & Information Security

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

All. Presidential Directive (HSPD) 7, Critical Infrastructure Identification, Prioritization, and Protection, and as they relate to the NRF.

Michael Yakushev PIR-Center, Moscow (Russia)

Resources and Capabilities Guide

How To Write A Cybersecurity Defense Assessment Report

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

Espionage and Intelligence. Debra A. Miller, Book Editor

NSA Surveillance, National Security and Privacy

The main object of my research is :

September 20, 2013 Senior IT Examiner Gene Lilienthal

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives


Combating Spear-phishing:

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT

SECURING CYBERSPACE THROUGH PUBLIC-PRIVATE PARTNERSHIP

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Department of Homeland Security

BACHELOR OF SCIENCE DEGREE HOMELAND SECURITY (INCLUDES EMERGENCY MANAGEMENT)

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Transcription:

Above My Pay Grade: Incident Response at the National Level Jason Healey Atlantic Council

Traditional Incident Response

But at the national level, incident response is a different game Implications for Misunderstandings between geeks and wonks Attribution Decision making Large-scale response (or miscalculations about response)

EXAMPLE: LARGE SCALE ATTACK ON FINANCE

Large-scale Attack on Finance Sector Who Is Their First External Call To?

First: Call a Law Firm!

Then Mandiant or CrowdStrike!

After That: Tell the Cops FBI USSS

Then Share within the Sector FS/ISAC Operational sharing and crisis management Shared with all financial institutions Sector-wide incident response via audioconfernce bridge line Typically heard: What s the vulnerability? Is there a patch? What IP addresses? What works to mitigate?

When More than Tech Discussions Are Needed FSSCC FS/ISAC FBIIC Other ISACs Water, Energy, Telecom Policy-Level Incident Response Senior company and government executives across all sector and regulators Management response via audio bridge Typically heard: How healthy is the sector? What do we do if it gets worse? Can markets open as normal tomorrow?

If Markets are Melting FSSCC Treasury FBIIC Within Treasury Escalate to the senior leadership, especially political appointees FS/ISAC Other ISACs Water, Energy, Telecom

If Markets are Melting President s Working Group on Financial Markets FSSCC Treasury FS/ISAC FBIIC Highest Level of Financial Decision-making No different than any other financial crisis! Secretary, Chairs of FRB, SEC, CFTC Other ISACs Water, Energy, Telecom

The Cyber Response President s Working Group on Financial Markets Treasury Department of Homeland Security But what does that actually mean? And what then? FSSCC FBIIC DHS FS/ISAC Other ISACs Water, Energy, Telecom

The Cyber Response President s Working Group on Financial Markets Treasury National Cybersecurity and Communications Integration Center 24/7 operations floor Includes US-CERT, ICS-CERT, NCC FSSCC FBIIC DHS FS/ISAC Operations NCICC Planning Analysis Other ISACs Water, Energy, Telecom Watch & Warning DHS Treasury FBI Assist & Assess CIA FS-ISAC Justice Liaison DoD State & Local NSA USSS Others State

If Incident Needs Escalation A Significant Cyber Incident requires increased national coordination as it affects National security Public health and public safety National economy, including any of the individual sectors that may affect the national economy or Public confidence Cyber Unified Coordination Group Cyber UCG IMT FS/ISAC DHS NCCIC NTOC USCC Other ISACs Water, Energy, Telecom Operational Response Telcos

Who Coordinates Above DHS?

Who Coordinates Above DHS?

Who Coordinates Above DHS?

Policy Response If Incident Needs Escalation National Security Council Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency

Policy Response If Incident Needs Escalation National Security Council Deputies Committee Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency

Policy Response If Incident Needs Escalation President of the United States Principals Committee Deputies Committee Cyber Directorate ICI-IPC Cyber Response Group FS/ISAC Other ISACs Water, Energy, Telecom DHS NCCIC Operational Response DHS CIA DoD FBI NSA State Others The Interagency

Why This Works Since Worst-impact cyber conflicts generally caused by nations, not individuals and Cyber conflicts tend not to be network speed Process translates cyber crisis out of technical channels Into the time-tested traditional national security crisis management Countries with NSC equivalents have natural edge to those without like China

Why This is a Good Thing: Provides Process for Tough Decisions Enables national-level technical response options Commitment of additional resources to help private sector response Money, personnel, intelligence Determine what nation is responsible? Enables response using levers of national power: Diplomatic, economic and yes, military

Why the Process Might Not Work or It doesn t always work even for physical crises! When government wants to control the response The Katrina of something on the edges of the system The Six-Day War True Cyber War Otherwise Suck:

Financial Response Policy Response Why the Process Might Not Work: If We Are At Cyberwar! President s Working Group on Financial Markets FSSCC Treasury FBIIC Governors President Principals Committee Deputies Committee Cyber Directorate SECDEF, CJCS FS/ISAC Director FBI FEMA ICI-IPC UCG DHS NCCIC Operational Response Cyber Response Group Cyber Command Military Response Regional COCOM NTOC

Financial Response Policy Response Why the Process Might Not Work: If We Get Stupid President s Working Group on Financial Markets FSSCC Treasury FBIIC Governors Principals Committee UCG attack and in the private- FS/ISAC sector DHS networks NCCIC Operational Response President Director FBI Inside the Deputies Beltway, Committee they forget the real response, Cyber Directorate ICI-IPC Cyber Response Group the FEMA real battle isn t in DC but at the banks under Cyber Command Military Response SECDEF, CJCS Regional COCOM NTOC

QUESTIONS? Cyber Statecraft Initiative International conflict, competition and cooperation in cyberspace Publications (all at our website, acus.org) Public and Private Events jhealey@acus.org Twitter: @Jason_Healey