2015 Cybersecurity Awareness



Similar documents
TRAINING PRODUCTS & RESOURCES

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

INSIDER THREAT PROGRAM DEVELOPMENT TRAINING (INSIDER THREAT SECURITY SPECIALIST COURSE)

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.

How Private Industry Protects Our Country's Secrets. James Kirk

COURSES AND. Courses & Products LEARN. PERFORM. PROTECT. CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE REVISED AS OF MARCH 2015 PRODUCTS

DoD IA Training Products, Tools Integration, and Operationalization

DOD Information Assurance Training & Awareness Products To order our products, please go to the following website:

MICROSOFT OFFICE LIVE MEETING GUIDE TO GENERATING REPORTS

03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Altius IT Policy Collection Compliance and Standards Matrix

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

TOPSECRETPROTECTION.COM (TSP)

DSS Monthly Newsletter

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Common Cyber Threats. Common cyber threats include:

Industrial Security Facilities Database (ISFD) Job Aid. December 2014

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Table of Contents CDSE. Together, we will address evolving threats to national security so that we can keep our nation and the warfighter safe.

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Information Security Risk and Compliance Series Risking Your Business

Leveraging SANS and NIST to Evaluate New Security Tools

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

INFORMATION SECURITY FOR YOUR AGENCY

Click to edit Master title style

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Information Blue Valley Schools FEBRUARY 2015

Cybersecurity: What CFO s Need to Know

Cyber R &D Research Roundtable

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Bellevue University Cybersecurity Programs & Courses

NWX-DTSW-DEFENSE SECURITY SERV. Moderator: Nancy McKeown March 12, :30 am CT

Securing OS Legacy Systems Alexander Rau

Jumpstarting Your Security Awareness Program

Defense Security Service

Defending Against Data Beaches: Internal Controls for Cybersecurity

Client Security Risk Assessment Questionnaire

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service

Commercial Practices in IA Testing Panel

The Protection Mission a constant endeavor

2012 Endpoint Security Best Practices Survey

AAT webinars what they are and how to take part

Student Tech Security Training. ITS Security Office

Current Accounting and Reporting Developments Webcast Series Third Quarter 2015

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Designing & Building an Information Security Program. To protect our critical assets

Department of Defense DIRECTIVE

Cybersecurity The role of Internal Audit

Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader

ONLINE PRIVACY POLICY

Cyber Security Training and Awareness Through Game Play

2012 Data Breach Investigations Report

Report on CAP Cybersecurity November 5, 2015

THE EVOLUTION OF CYBERSECURITY

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Working with the FBI

Understanding SCADA System Security Vulnerabilities

Cyber Security. John Leek Chief Strategist

Looking at the SANS 20 Critical Security Controls

<Insert Picture Here> How to protect sensitive data, challenges & risks

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

Compilation of Results of a Pilot Survey of Cybersecurity Practices of Small and Mid Sized Investment Adviser Firms

2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories

Defense Security Service

Guide to Using Citrix at SLU (Windows)

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

TRAINING COMMERCIAL PRICELIST MANTECH INTERNATIONAL CORPORATION January 2015

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

Computer Crime & Security Survey

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Romanian National Computer Security Incident Response Team CERT-RO.

Websense Certified Engineer Web Security Professional Examination Specification

Industrial Security Facilities Database (ISFD) Troubleshooting Tips

How to send s triggered by events

Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

Transcription:

2015 Cybersecurity Awareness

CDSE Cybersecurity Thomas N. LeBaron, CISSP Cybersecurity Curriculum Manager Mr. LeBaron has been the Cybersecurity Curriculum Manager for CDSE since October 2012 Mr. LeBaron is a former DSS Information System Security Professional from the Northern Region Prior to DSS, Mr. LeBaron served as an Information Systems Security Manager in private industry and spent over four years on active duty with the U.S. Air Force Mr. LeBaron holds CISSP, Security+, and Network+ certifications and a Master of Science in Information Assurance from Capella University thomas.lebaron@dss.mil 410-689-1379

Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click on the Full Screen button. To get out of Full Screen view, select Full Screen again. You will need to be out of Full Screen view to enter question responses.

Navigation in the Meeting Room Q&A box for entering questions to the presenters File share box to download resources relevant to today s presentation

Download and Print Files Now!

2015 Cybersecurity Awareness

Poll #1 How often do you visit the CDSE website for Cybersecurity training and resources? 1) Once a day or more 2) Once a week 3) Once a month 4) Rarely

Agenda Current Cybersecurity Training: Information Security in the NISP Cybersecurity Awareness System Management Audit & Continuous Monitoring Incident Response Alternative Platform Devices

Poll #2 Have you completed the Information Security in NISP Curriculum? 1) Yes 2) No

Information Security in NISP Curriculum Introduction To The NISP C&A Process Course, IS100.16 and Exam IS100.06 NISP C&A Process Walk-through Course, IS200.16 and Exam IS200.06 Technical Implementation Of C&A - Configuration to DSS Standards, IS310.16 and Exam IS310.06 Technical Implementation Of C&A - Virtual Environment, IS311.16 http://www.cdse.edu/catalog/curricula/is201.html

Information Security in NISP Curriculum

Poll #3 How many Cybersecurity Courses have you taken at CDSE? 1) One 2) Two 3) Three 4) Four or more

Cybersecurity Awareness CyberAwareness Challenge, DS-IA106.06 CyberAwareness Challenge for the Intelligence Community, DS- IA110.06 Cyberprotect, DS-CP102.06 Cybersecurity Awareness, CI130.16 Information Assurance/Computer Network Defense Information Sharing, DS-IA104.06 Phishing Awareness, DS-IA103.06 Portable Electronic Devices / Removable Storage Media, DS- IA109.06 Smartphones and Tablets, DS-IA108.06 Social Networking, Short http://www.cdse.edu/catalog/cybersecurity.html

Poll #4 Do you have responsibilities for auditing or monitoring your network? 1) Yes 2) No

Auditing & Continuous Monitoring Introduction to DoD IDS Analysis, DS-IA105.06 DoD Intrusion Detection System (IDS) Analysis Part II, DS-IA107.06 Phishing Awareness, DS-IA103.06 Portable Electronic Devices / Removable Storage Media, DS-IA109.06 Privileged User IA Responsibilities, DS-IA112.06 Smartphones and Tablets, DS-IA108.06 Introduction to Risk Management Framework, CS124.16 http://www.cdse.edu/catalog/cybersecurity.html

Poll #5 Do you have responsibilities as a System Administrator or are you a Privileged User? 1) System Administrator 2) Privileged User

System Management Training Information Assurance/Computer Network Defense Information Sharing, DS-IA104.06 Cyberprotect, DS-CP102.06 Introduction to DoD IDS Analysis, DS-IA105.06 DoD Intrusion Detection System (IDS) Analysis Part II, DS-IA107.06 Privileged User IA Responsibilities, DS-IA112.06 Smartphones and Tablets, DS-IA108.06 http://www.cdse.edu/catalog/cybersecurity.html

Poll #6 Have you ever implemented Cyber Incident Response actions? 1) Yes 2) No

Incident Reporting Incident Response Windows Server 2003 Incident Preparation & Response (IP&R), DS-IA300.06 Introduction to DoD IDS Analysis, DS-IA105.06 DoD Intrusion Detection System (IDS) Analysis Part II, DS- IA107.06 Unauthorized Disclosure of Classified Information, IF130.16 Data Spills, Short Alternative Platform Devices Portable Electronic Devices / Removable Storage Media, DS- IA109.06 Smartphones and Tablets, DS-IA108.06 http://www.cdse.edu/catalog/cybersecurity.html

Poll #7 Have you used CDSE s Cybersecurity Toolkits? 1) Yes 2) No

Toolkits Cybersecurity Information System Security Managers (ISSMs) http://www.cdse.edu/toolkits/index.html

Poll #8 How many CDSE Cybersecurity Webinars have you attended? 1) One 2) Two 3) Three 4) Four or more

Archived Cybersecurity Webinars Cyber Insider Threat Information Security Continuous Monitoring Risk Management Framework Overview Top 20 Critical Security Controls Trusted Download http://www.cdse.edu/catalog/webinars/webinar-archives.html

Poll #9 What is your role in your organization? 1) Security Officer 2) FSO 3) ISSM 4) ISSO 5) Network Administrator 6) CISO 7) Other

Questions?

Contact Information Cybersecurity email: cybersecurity.training@dss.mil Please Provide Webinar Feedback