How To Protect Your State From Cybercrime



Similar documents
Governmental Oversight and Accountability Committee

NASCIO 2014 State IT Recognition Awards

Cybersecurity in the States 2012: Priorities, Issues and Trends

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

State of Montana Information Technology Managers Advisory Council

ICBA Summary of FFIEC Cybersecurity Assessment Tool

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Bridging the HIPAA/HITECH Compliance Gap

Cyber/ Network Security. FINEX Global

GEARS Cyber-Security Services

CYBER READINESS FOR FINANCIAL INSTITUTIONS

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Personal Security Practices of the CAO

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Portal Storm: A Cyber/Business Continuity Exercise. Cyber Security Initiatives

OCIE CYBERSECURITY INITIATIVE

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Cyber Security Metrics Dashboards & Analytics

Information Security Program CHARTER

National Cyber Security Policy -2013

SECURITY. Risk & Compliance Services

NASA OFFICE OF INSPECTOR GENERAL

Attachment A. Identification of Risks/Cybersecurity Governance

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

State of Minnesota IT Governance Framework

How To Improve Federal Network Security

Establishing a State Cyber Crimes Unit White Paper

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Understanding the Business Risk

STATE OF NEW JERSEY IT CIRCULAR

Cyber Security Defense Services Portfolio Development Status. February 2016

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

Released December 18 th, 2007

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

PROTIVITI FLASH REPORT

Rogers Insurance Client Presentation

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci

INFORMATION SECURITY STRATEGIC PLAN

Managing cyber risks with insurance

Priority III: A National Cyberspace Security Awareness and Training Program

Office of the Chief Information Officer

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

The Computerworld Honors Program

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Cybersecurity Workshop

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

External Supplier Control Requirements

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

The University of Tennessee IT Governance Process (Restructured)

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1.

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Logging In: Auditing Cybersecurity in an Unsecure World

All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Agency for State Technology

Thomas J. Schlagel Chief Information Officer, BNL

Report on CAP Cybersecurity November 5, 2015

Cyber Insurance Presentation

Cyber Security key emerging risk Q3 2015

Enterprise Security Tactical Plan

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

A HELPING HAND TO PROTECT YOUR REPUTATION

Defending Against Data Beaches: Internal Controls for Cybersecurity

FISCAL YEAR 2017 OPERATING BUDGET. TESTIMONY OF David A. Garcia, Secretary

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

FFIEC Cybersecurity Assessment Tool

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

Cybersecurity Issues for Community Banks

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

How To Write A Cybersecurity Framework

Privacy Rights Clearing House

Transcription:

State of New Hampshire Cybersecurity Strategy and Actions Commissioner Goulet Director Plummer Commissioner Toumpas

Assumptions The term statewide is meant to convey that scope is not limited to the executive branch. The items we re proposing are in process or future state. There are many things that are already being done. We will take a tiered approach where a baseline will be applied to agencies in a consistent manner (no opt out), with provisions to add additional capabilities at an agency level as desired or externally mandated.

The Vision A robust statewide cybersecurity function that provides practical and effective protection and response mechanisms, which adapt over time as threats evolve.

Strategy Implement and operate a set of collaborative and standard processes that fully leverage existing capabilities, adding new capabilities as appropriate, and incorporating publicprivate partnership in a holistic manner. In the following areas: Protection Operations Mitigation & Response Human Factors Continuous Improvement

Cybersecurity Governance Strategy Development, Evangelism, Implementation, Operations DoIT, HSEM, TAG, CAC members Consult and Advise Heads, IT Council Driving Public-Private Partnership ACEPS * Approval and Oversight Governor s Office * Refers to the ACEPS Cyber Sub-committee

Protection Strengthen local administration controls Application white listing Advanced threat detection (zero day) Distributed denial of service (DDOS) mitigation services Network access controls (NAC) (in process) Administrative (Active Directory) delegation tools Consistent baseline policies for: Computer use Device protection Internet access & use

Operations Patch management Tighten up current methodologies Resource appropriately Integrate security considerations into project planning methodology Commission outside assessment of posture and operational plans (risk assessment) Security Operations Center (SOC), collaborative & consistent statewide capabilities

Security Operations Center (SOC) Governance And Oversight (ACEPS Cyber Sub-committee) Operations and Response (HSEM) SOC Leadership Technical Infrastructure and Operations (DoIT) Other Detailed DOS Detailed Staffing External Service Provider DoIT Detailed DHHS Detailed

TBD TBD DOS ACEPS Chairperson DoIT Cyber Sub- Committee Chairperson DHHS CIO TBD TBD HSEM Resources HSEM Director ACEPS Cyber Sub- committee IAC SOC Manager DoIT CISO Report to Advisory & Intel Assistant SOC Manager - Detailed to SOC Technical Consultation Technical Operations and Strategy Analyst Detailed to SOC Detailed or Funded Analyst Detailed to SOC Detailed or Funded Analyst Detailed to SOC Detailed or Funded External Service Provider Funded by SOC or External Service Provider Funded by SOC or

Mitigation & Response Incident response workshops & exercises * Cyber insurance Broad collaboration to include: DoIT Federal Agencies HSEM Local Governments * National Guard Private Sector Entities * State Agencies Private Non-profit * * Refers to the ACEPS Cyber Sub-committee

Cyber Insurance by Definition Protection against losses related to information security breaches, such as data theft/loss, business interruption caused by a computer malfunction or virus, and fines or lost income because of system downtime and/or network intrusion. Source: NASCIO 2015 Midyear Conference

Montana s Cyber Security Insurance The state s commercial insurance policy provides coverage for: Data breach response costs including, but not limited to, forensic investigations, mail notification, and credit monitoring (one year) Fines/penalties assessed by regulatory authorities Revenue streams lost as a result of a breach Personal injuries and property damage for negligent acts or omissions of the state Website content and media Cyber ransoms and fines Public relations firm consultation Source: NASCIO 2015 Midyear Conference

Cyber Hygiene Campaign Regular, accountable employee & supervisor training Standards for new hire screening & training Targeted social engineering testing: Phishing and Spear Phishing Flash drive exploits Etc. Outreach to: Human Factors State Employees Local Governments * Leadership Private Sector Entities * Legislative Private Non-profit * * Refers to the ACEPS Cyber Sub-committee

Continuous Improvement Regular assessment Score Card Constant evaluation of new threats and methods Threat risk analysis trending Prioritized partners (local governments and private sector entities) and address accordingly * * Refers to the ACEPS Cyber Sub-committee

Challenges Acceptance of base standards is counter to existing culture in some cases (employees, leadership, legislature) Cross agency collaboration can be difficult Resources (we will need to shift some priorities)

Next Steps Plan Details Kickoff bi-weekly SOC implementation planning sessions August 2015 Restart ACEPS Cyber Sub-committee October 2015 Ballpark pricing for DDOS mitigation services complete Ballpark pricing for cyber insurance September 2015 Propose cyber investment level & plan to get there - TBD Plan to operationalize cybersecurity capital budget item In Process

Next Steps Plan Ratification Review cybersecurity plan with IT Council 7/29/2015 Review and solicit feedback from Commissioners TBD Review and solicit feedback from CAC 8/27/2015 Update to Governor s Office September 2015 Review and final ratification by IT Council October 2015