NIST Cybersecurity Framework What It Means for Energy Companies



Similar documents
How To Write A Cybersecurity Framework

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

PROTIVITI FLASH REPORT

NIST Unveils Preliminary Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Framework for Improving Critical Infrastructure Cybersecurity

No. 33 February 19, The President

Framework for Improving Critical Infrastructure Cybersecurity

Why you should adopt the NIST Cybersecurity Framework

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Cybersecurity Framework: Current Status and Next Steps

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

The NIST Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

CYBERSECURITY RISK MANAGEMENT

NIST Cybersecurity Framework & A Tale of Two Criticalities

Framework for Improving Critical Infrastructure Cybersecurity

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Billing Code: 3510-EA

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

Cybersecurity Primer

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Legislative Language

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Applying Framework to Mobile & BYOD

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Why you should adopt the NIST Cybersecurity Framework

Lessons from Defending Cyberspace

Which cybersecurity standard is most relevant for a water utility?

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

How To Write A National Cybersecurity Act

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

How To Understand And Manage Cybersecurity Risk

Legislative Language

Cybersecurity for Medical Devices

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

CONCEPTS IN CYBER SECURITY

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

POLICIES TO MITIGATE CYBER RISK

Adopting a Cybersecurity Framework for Governance and Risk Management

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Regulatory Compliance Management for Energy and Utilities

Business Continuity in Healthcare

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity: What CFO s Need to Know

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cyber Risk to Help Shape Industry Trends in 2014

December 13, Submitted via to

Cyber Security and Privacy - Program 183

Risk Management in Practice A Guide for the Electric Sector

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

DOE Cyber Security Policy Perspectives

Health Industry Implementation of the NIST Cybersecurity Framework

Cybersecurity The role of Internal Audit

Building Insecurity Lisa Kaiser

Middle Class Economics: Cybersecurity Updated August 7, 2015

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?

Preparing for the Convergence of Risk Management & Business Continuity

Big Data, Big Risk, Big Rewards. Hussein Syed

Navigating the NIST Cybersecurity Framework

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

AURORA Vulnerability Background

Docket No. DHS , Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Transcription:

Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013

Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2

Overview The Cyber Threat to the Energy Sector Cybersecurity Executive Order NIST Cybersecurity Framework Incentives What It Means for Energy Companies 3

What Is Cybersecurity? Activities to (a) identify vulnerabilities of computers and computer systems and networks, and (b) protect information, information systems, computer systems and networks, etc. from unauthorized access, use, disclosure, disruption, modification, or destruction Two goals: Data security and privacy protection Critical infrastructure protection 4

Nature of the Threat Targeting critical infrastructure: Cyberterrorists Cyberwarriors Cyberhacktivists Targeting data and information: Cyberspies Cyberthieves Not mutually exclusive 5

The Threat Is Real DHS s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Responded to 198 cyber incidents in FY 2012 Of these, 41% were in the energy sector In first half of FY 2013, highest percentage of reported incidents occurred in the energy sector (53%) Identified in 2012 an active series of cyber intrusions targeting natural gas pipeline companies dating back to Dec. 2011 McAfee Report Reported incidents of cyber attacks originating in China to collect competitive information about oil and gas fields Dating back to 2009 6

The Threat Is Real (cont d) Markey / Waxman Report (May 2013) The electric grid is the target of numerous and daily cyber attacks ranging from phishing to malware infection to unfriendly probes One utility reported approximately 10,000 attempted cyber attacks each month The Bottom Line Since 2010, DOE has invested more than $100 million in cybersecurity R&D But utilities are predicted to spend $7.25 billion in security from 2013 until 2020 7

So what is to be done? 8

Cybersecurity Executive Order Improving Critical Infrastructure Cybersecurity Issued Feb. 12, 2013 Intended to address cybersecurity of owners / operators of critical infrastructure But only governs federal agencies, not private companies Includes all sectors: Utilities electric, gas, water, telecom Banking and finance Health care industry Any physical or virtual assets or systems the incapacity or destruction of which could have a debilitating impact on national security, the economy, or public health or safety 9

New Processes Underway 10 DHS-led consultative process among agencies to improve cybersecurity of critical infrastructure NIST-developed Cybersecurity Framework To identify and mitigate cyber risks to critical infrastructure using voluntary consensus standards and industry best practices Framework must provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach Framework must be technology neutral, allow for use of competitive markets, and offer guidance for measuring performance DHS-led effort to establish voluntary program to support adoption of Framework by owners / operators of critical infrastructure

NIST Cybersecurity Framework Timeline Preliminary Framework issued Oct. 22, 2013 Final Framework due Feb. 12, 2014 Issuance of Preliminary Framework based on rulemakings at NIST RFIs, comments, workshops Additional workshop underway Comments on Preliminary Framework due Dec. 13, 2013 Available at: http://www.nist.gov/itl/cyberframework.cfm 11

Framework Overview 12 Framework uses risk management processes to enable organizations to inform and prioritize cybersecurity decisions a common language and mechanism for organizations to: Describe their current cybersecurity posture Describe their target state Identify and prioritize ways to improve Assess progress Communicate internally and externally Tools to build or improve cybersecurity risk management processes and activities Not intended to be a checklist

Framework Structure Framework Core a means of organizing cybersecurity activities across the enterprise Functions highest level of structure for organizing activities Categories for organizing activities closely tied to programmatic needs Subcategories tactical groupings within each Category Informative References specific standards, guidelines and practices to accomplish cybersecurity activities within each Subcategory Framework Profile Framework Implementation Tiers 13

Framework Five Core Functions Identify Activities to develop institutional understanding of what needs to be protected, what the risks are, and what the priorities are Protect Activities to safeguard systems and services Detect Activities to identify a cybersecurity event Respond Activities to address a detected cyber event Recover Activities to restore capabilities and services 14

Framework Categories Categories and Subcategories within each function Examples: Category Asset Management (Function = Identify) Access Control (Function = Protect) Detection Processes (Function = Detect) Subcategory Inventory physical devices and systems within the organization Inventory software platforms and applications within the organization Manage identities and credentials for authorized devices and users Manage and secure physical access Ensure accountability by defining roles and responsibilities Conduct exercises to ensure readiness 15

Framework Informative References Informative References existing standards, guidelines and practices common among critical infrastructure structures that are linked to Categories and Subcategories For example, ISO standards Not exhaustive can include additional standards adopted by the organization or industry 16

Framework Profile The goal of the Framework is to enable an organization to build a cybersecurity profile how the organization: Manages cybersecurity risk Sets its goals and priorities Achieves its goals Basically a roadmap : What is my current cybersecurity posture? What do I want it to be? How do I get there? How do I assess progress and the end state? Not a one-size-fits-all approach 17

Framework Implementation Tiers Implementation Tiers demonstrate the implementation of the Core Functions and Categories and indicate how cybersecurity risk is managed Tiers: Measures level of maturity the degree of formality and sophistication in the organization s cybersecurity program Tier 1 Partial: not formalized, ad hoc, reactive Tier 2 Risk-Informed: practices approved, no formal policy Tier 3 Repeatable: practices and policy established Tier 4 Adaptive: proactive, adapts to emerging threats Helps the organization determine what its current and target cybersecurity postures are in each Category 18

Framework Privacy Concerns Framework includes an appendix on protecting privacy and civil liberties Identifies activities that can be taken within relevant Categories and Subcategories to protect personally identifiable information (PII) Goes beyond what U.S. law currently requires to protect PII 19

Incentives to Adopt Framework White House blog post (Aug. 6, 2013) on incentives to adopt NIST Framework being evaluated Recommendations provided by DHS, Commerce, and Treasury pursuant to Executive Order Incentives include: Cybersecurity Insurance collaboration to develop underwriting practices promoting adoption of cyber riskreducing measures and risk-based pricing and fostering a competitive cyber insurance market Grants adoption of Framework as condition or consideration in awarding grants Process Preference participation in Framework as a consideration in expediting existing government service delivery 20

Incentives (cont d) 21 Incentives include (cont d): Liability Limitation reduced tort liability, limited indemnity, higher burdens of proof, and creation of federal legal privilege preempting state disclosure requirements to encourage participation Streamline Regulations make compliance easier by eliminating overlaps among laws and regulations, enabling equivalent adoption across regulatory structures, and reducing audit burdens Public Recognition optional public recognition to encourage participation Rate Recovery for price-regulated industries (utilities and pipelines), allow recovery of cybersecurity investments Cybersecurity Research R&D to meet needs where commercial solutions not available

What It Means for Energy Companies On the surface, the Framework looks good Provides a process, conceptual structure, and tools to develop and improve your cybersecurity risk management program And everyone should have such a program Especially energy companies Energy companies are high-risk targets for cyber attacks Energy companies have unique concerns: Traditional IT concerns plus operational systems 22

But Some Concerns How voluntary is the EO-directed program? Some Incentives appear coercive Use of Framework by internal and external auditors check the box approach effectively makes it mandatory Framework as de facto industry standard adopt and implement to avoid liability in the event of a cyber attack Compliance vs. security 23

Some Uncertainties & Unknowns What is critical infrastructure covered by the EO and Framework? Duplicative requirements? E.g., electric utilities and compliance with NERC CIP Standards Liability protections Need legislative fix, so no liability protections provided in Framework or Incentives But, may need to follow to avoid liability in the event of a cyber attack Framework does not identify legal or regulatory requirements that may apply Gaps in supply chain management 24

Some Final Thoughts Uncertainties in legislative and regulatory developments will continue Framework as guide used by states adopting cybersecurity laws and regulations But still some things that can be done today Internal self-assessment of cyber vulnerabilities and priorities Develop, test and update incident response and recovery plans Implement cyber training Get management buy-in now 25

Questions? Dan Frank 202.383.0838 daniel.frank@sutherland.com J.J. Herbert 202.383.0822 jj.herbert@sutherland.com Mark Thibodeaux 713.470.6104 mark.thibodeaux@sutherland.com