Cyber Security Exercises A Useful Tool for Business Continuity Managers. Gregory B. White, Ph.D. Director, UTSA/CIAS 2 March 2015

Size: px
Start display at page:

Download "Cyber Security Exercises A Useful Tool for Business Continuity Managers. Gregory B. White, Ph.D. Director, UTSA/CIAS 2 March 2015"

Transcription

1 Cyber Security Exercises A Useful Tool for Business Continuity Managers Gregory B. White, Ph.D. Director, UTSA/CIAS 2 March 2015

2 The University of Texas at San Antonio (UTSA) 2014 Ranked #1 Cybersecurity Program by Ponemon Inst. First Texas school designated an NSA / DHS Center of Academic Excellence in Information Assurance Education (re-designated as a CAE IA/CD with a focus area of Digital Forensics in 2014) UTSA has also received the COAE-Research designation Security programs and 3 centers in multiple departments BS in IA and concentrations in IA at the BS, MS, and PhD levels in Information Systems & Cyber Security (COB) Concentrations in Computer Security at the BS, MS, and PhD levels in Computer Science (COS) Research in various security topics at the PhD level in Electrical and Computer Engineering (COE) World-class Education and Research Outreach Programs with a National Impact

3 A sampling of security related courses Introduction to IA Intrusion Detection Digital Forensics Incident Response Secure Network Design Secure E-Commerce IA Policy SCADA Risk Assessment Cryptography Unix and Network Security Principles of Computer and Information Security Developing Secure Systems and Software Advanced topics in Computer Security Computer Security Practices 3

4 A sampling of security research areas Cyber Physical Systems Digital Forensics Data Mining Steganography Authentication Intrusion Detection/ Prevention Encryption Intelligent Agents Wireless Network Security Development of a Honey Community Botnet Detection, Analysis and Elimination Secure Information Sharing Trustworthy Cloud Computing Data Privacy Software Reliability and Security Community Computer Incident Response Malware Analysis 4

5 The Institute for Cyber Security (ICS) ICS performs Cyber security research in four major areas Foundations: Core principles, models and theories for Cyber security and their translation to practice Application-Centric: Theory and practice for new /emerging application areas: Technology-Centric: Theory and practice in new technologies that present new challenges: Attack-Centric: Malware analysis and detection Emphasis: Research, Development, Education

6 Center for Education and Research in Information and Infrastructure Security (CERI 2 S) Research in information assurance and security Cybersecurity workforce education Advanced Laboratory for Infrastructure Assurance and Security (ALIAS) Supports faculty research in broad spectrum of security-centric activities within the College of Business Laboratory for Advanced Information Security Education and Research (LAISER) Highly-secure environment to study cybersecurity phenomena CyberRange: study of advanced information assurance issues Behavioral Lab: research social science issues in cybersecurity Emphasis: Cybersecurity Research, Development, and Education in the Business Environment

7 Center for Infrastructure Assurance and Security (CIAS) The CIAS was founded in the summer of 2001 The operational security center at UTSA Having a significant impact on the nation! Three focus areas Cyber Defense Competition Program Collegiate, High School, Industry Middle School Program in development Lead on the development of a collegiate championship cup Cyber Security Training & Awareness Infrastructure Assurance Programs States, communities and other entities Emphasis: Competitions, State and Local Government Cyber Security, Training, Awareness, & Infrastructure Protection

8 Business Continuity, Disaster Recovery Some definitions so we are all on the same page Business Continuity: At its most simplistic level, business continuity is the ability to maintain operations/services in the face of a disruptive event. Disaster Recovery is a broad concept that can include recovery of people, facilities, and the like the coordinated activity of recovering IT systems following the complete or partial loss of a site due to a natural disaster or a security event. IDC-Best_Practices_in_Business_Continuity Disaster_Recovery.pdf

9 A common question How do I get senior management s attention or buy-in? Unfortunately, there is no single trick or silver bullet that will work for all organizations. FUD factor Regulations (especially with penalties) You have an incident Or maybe your chief competitor has an incident Conduct an exercise

10 Obtaining Interest in IT Continuity Best Practices in Business Continuity and Disaster Recovery An Incident Regulations Regulations Planning ahead? Planning ahead? An Incident

11 Some Basic Best Practices Create your plans (and obtain management buy-in)! Prioritize applications and determine SLAs for each based on the needs of the business. What is the cost of downtime for each application? Ensure you have the appropriate tools. Test your plans! Review your plans for adequacy (annually). (Also today you should examine use of the cloud )

12 Some advice The three most important things to implement for security/bc/dr: Backup! Backup!! Backup!!!

13 Business Continuity Management Another definition Business Continuity Management (BCM) is a management process that identifies risk, threats and vulnerabilities that could impact an entity's continued operations and provides a framework for building organizational resilience and the capability for an effective response. As opposed to Risk Avoidance or Prevention We can t avoid all risks and incidents, what we need to do is our best to manage them

14 5-step BCM Process Step 1: Program Management Obtain Executive support and commitment of resources, Step 2: Risk and Business Impact Analysis Determine and prioritize business activities that are critical Step 3: Identify Response Options Determine response options to meet overall objectives Step 4: Develop Response Plans Based on list of response options, develop best response plan Step 5: Train, Exercise and Maintain Used to ensure that what has been developed is appropriate, understood, and will actually work

15 Testing/Exercises Exercises provide an inexpensive (depending on the level of detail) way to build incident response skills and to identify potential discrepancies in your plans, processes, and training programs. Can be anything from a desk-top exercise to a fully-functional exercise.

16 Some Help NIST SP Computer Security Incident Handling Guide Appendix B Incident Handling Scenarios Includes scenario questions and sample scenarios NIST SP Guide to Malware incident Prevention and Handling Appendix B Malware Incident Handling Scenarios Includes scenario questions and sample scenarios NIST SP Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities Discusses tests, tabletop and functional exercises

17 SP sample questions What indications of the incident might the organization detect? Which indications would cause someone to think that an incident might have occurred? (Sections 3.2.2, 3.2.3) What strategy should the organization take to contain the incident? Why is this strategy preferable to others? (Section 3.3.1) What could happen if the incident were not contained? (Section 3.3.1)

18 SP sample scenario Scenario 5: Compromised Database Server On a Tuesday night, a database administrator performs some offhours maintenance on several production database servers. The administrator notices some unfamiliar and unusual directory names on one of the servers. After reviewing the directory listings and viewing some of the files, the administrator concludes that the server has been attacked and calls the incident response team for assistance. The team s investigation determines that the attacker successfully gained root access to the server 6 weeks ago. The following are additional questions for this scenario: 1. What sources might the team use to determine when the compromise had occurred? 2. How would the handling of this incident change if the team found that the database server had been running a packet sniffer and capturing passwords from the network? 3. How would the handling of this incident change if the team found that the server was running a process that would copy a database containing sensitive customer information each night and it to an external address?

19 SP sample scenario Scenario 5: Application Crashes On a Monday morning, the organization s help desk receives calls from three users who are having problems with their spreadsheet applications crashing repeatedly during use. As the day progresses, additional users call with similar problems. Most of the users are on the same team or related teams. 1. What types of malware could be causing the spreadsheet application crashes? What are the most likely non-malware causes? 2. What steps should be taken to determine if the crashes are caused by malware?

20 Beyond the NIST Pubs The NIST special pubs mentioned provide some useful scenarios that can be used for short training sessions of mostly IT and response personnel. Can also put several together for a more extensive exercise What is also needed, and may help in obtaining Executive-level support is a more extensive exercise that involves more than just IT staff.

21 What is your responsibility to the larger community? At the recent President s Cyber Security Summit an executive order signed to encourage sharing of information within industry and with the government. Government to serve as a broker of information Many in industry skeptical of this approach At the same time, there is a valid argument that can be made for the sharing of information and the benefit of doing so. An example would be the various industry ISACs

22 What about communities from a geographical perspective? Is there a possibility that a community (e.g. city) might be targeted for a cyber attack? (Yes! It has happened) Is it useful for the various entities (public and private sectors) to share information at some level? (again Yes!) Are communities ready for this sort of activity? (for the most part, No!) Is there a plan to help states and communities prepare? (Yes, it is called the Community Cyber Security Maturity Model CCSMM) Like a BCM for an organization, it needs to obtain executive level support. Exercises have proven useful to obtain this support.

23 Incidents Impacting States and Communities 2009 State of Virginia, extortion attempt In *my* possession, right now, are 8,257,378 patient records and a total of 35,548,087 prescriptions. Also, I made an encrypted backup and deleted the original. Unfortunately for Virginia, their backups seem to have gone missing, too. Uhoh :( For $10 million, I will gladly send along the password. You have 7 days to decide. If by the end of 7 days, you decide not to pony up, I ll go ahead and put this baby out on the market and accept the highest bid.

24

25 Incidents Impacting States and Communities Anonymous attack on the City of Orlando (June 2011) The computer hacker group Anonymous credited with crashing the websites of Visa and MasterCard in support of Wikileaks launched what it called "Operation Orlando" on Tuesday, disabling a tourism website and the mayor's own campaign site. In news releases and s to the Orlando Sentinel, the loose-knit group issued a "declaration of war" and promised to bring down a different Orlando-related website every day. One hacker told the Orlando Sentinel the group may target Orlando police officers, state lawmakers and the Florida Democratic Party _1_hackers-attack-website-lake-eola-park

26 Incidents Impacting States and Communities 2012 Data Breach in South Carolina Data breach at the South Carolina Department of Revenue exposed millions of state taxpayers to identity theft. 3.8 million Social Security numbers, 3.3 million bank account numbers and information for nearly 700,000 businesses stolen Occurred after a Department of Revenue employee opened a phishing giving the hacker access to the department's data system During a period of weeks hacker scoured the department's system by remote access then, over a two-day period zipped 74.7 gigabytes of data which was then downloaded. State officials learned of the breach Oct. 10, 2012 from the U.S. Secret Service Cost so far is $25 million, including $12 million going to Experian to cover a year of state-paid credit monitoring.

27 Incidents Impacting States and Communities City of Detroit Addresses Security Breach 9/4/ The City of Detroit Department of Information Technology Services has determined that accounts created to order pre-home sale inspections through the City of Detroit Buildings, Safety Engineering and Environmental Department (BSEED) were the target of a recent low-level computer security breach. The compromised database, containing approximately 5,110 records, included only non-sensitive information such as addresses of properties and estimated home values. No personally identifying information was included in the database, nor was any credit card or other payment information. As a precaution, individuals who had an online account with BSEED will be receiving s about the data breach and what steps the City has taken to secure their information.

28 Community Cyber Security Exercises Lessons learned in communities applicable to organizations First community exercise was Dark Screen in Dozens of exercises have been conducted since then. As discussed in NIST SP , can be anywhere from a tabletop to a functional exercise. Most communities are at the beginning stages of establishing their programs and need top-level buy-in. The exercises have almost exclusively been tabletop events. Have been successful in getting mayors, city managers, chiefs of police or fire departments, heads of EOCs, etc. Note that these are NOT IT personnel! Exercises have been successful at making leaders aware of issues

29 Sample Dark Screen Event Friday, September 13, :01 AM (COSA, Bexar County, Infrastructure tables) The San Antonio Police Department, Bexar County Sheriff s office, and CPS receive an threatening to shut down San Antonio s power system. The anonymous sender claims to have inside knowledge of the CPS SCADA systems. The demands that San Antonio police stop its harassment of fighters for world justice. Question 1: (Infrastructure, COSA, Bexar tables) What actions would this report prompt? Who, if anybody, would your organization contact? How could this be adapted for industry?

30 Would Local LE Forward this to Anyone? Friday, 14 April 2006, 2:40 p.m. (Tyler Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?

31 What about now? Saturday, 15 April 2006, 1:40 p.m. (Dallas Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?

32 Or now? Saturday, 15 April 2006, 1:40 p.m. (Plano Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?

33 El Paso Hudspeth Dallam Hartley Oldham Deaf Smith Sherman HansfordOchiltreeLipscomb Moore Roberts Hemphill Hutchinson Potter Does this now paint a picture that you d be interested in seeing? Gray Parmer Castro Swisher Briscoe Hall Childress Bailey Lamb Hale Carson 5B Wheeler RandallArmstrong Donley Collingsworth Hardeman Floyd Motley Cottle Wilbarger Foard Wichita Clay Cochran Hockley Archer Montague Lamar Lubbock CrosbyDickens King Knox Baylor Cooke Grayson Fannin Red Sub Sub River Delta Bowie 5A 5A Young 1A 1A Titus Yoakum Terry Lynn Garza Kent Stonewall Haskell Jack Wise Denton Collin Hunt Hopkins Throckmorton Cass Camp Rockwall Rains Scurry Wood Upshur Marion Gaines Dawson Jones Shackelford Palo Parker Borden Fisher Tarrant Stephens Pinto Dallas Kaufman Van 1B Zandt Harrison Gregg 4B Hood Johnson Ellis Smith Andrews Martin Howard Mitchell Nolan Taylor CallahanEastland ErathSomervell Henderson Panola Rusk Navarro Hill Glasscock Loving Winkler Ector Coke Coleman Comanche Bosque Cherokee Midland Sterling Runnels Brown Anderson Shelby Hamilton 6A Freestone Nacogdoches Culberson Ward McLennan Limestone San Augustine Crane Mills Tom Upton Reagan Green Concho Coryell 6C Leon Houston Sub Sabine Reeves Irion Falls Angelina Sub McCulloch San 2B Lampasas Saba Bell Trinity Robertson Jasper 4B Madison Newton Pecos Schleicher Menard Burnet Milam Polk Tyler Jeff 4A Crockett Mason Williamson Walker Llano Brazos San Davis 6B Grimes Sutton Jacinto Kimble Burleson 2C Blanco Montgomery Hardin Travis Lee Terrell Gillespie Washington 2B Liberty Orange Bastrop Presidio Kerr Hays Val Edwards Waller Kendall Austin Jefferson Brewster Verde Real Fayette Harris Comal Caldwell Bandera Chambers Colorado 2A Guadalupe Sub Fort Bend Kinney Uvalde Medina Bexar Gonzales Lavaca 2C Galveston Sub 3B Wilson Wharton Brazoria DeWitt 8A Atascosa Karnes Jackson Maverick Zavala Frio Victoria Goliad Matagorda Calhoun Dimmit La Salle Bee Refugio McMullen Live 3A Oak San Aransas Patricio Webb Jim Wells Nueces Duval Sub 4A The State s View Sub 8A Zapata Jim Hogg Kleberg Brooks Kenedy Franklin Morris If you could step back and view what is occurring around the state would you be interested if you suddenly could plot all of these and similar occurrences? Friday, 14 April Saturday, 15 April Monday, 17 April Starr 8A Hidalgo Willacy Cameron

34 Results Leaders came away from these exercises with an understanding that cyber infrastructures are important to the operation of a community. In many instances IT and DRP personnel had been trying to obtain support but had made little to no headway. The need to share information was more clearly understood. Still issues with implementation of info sharing programs. The lessons learned from these state and community exercises are directly applicable to industry as well. Industry ALSO has a role in the communities.

35 The goal is of course to avoid security events, and we should do all we can to protect our systems. But, what do we do about this?

36 And what about these? We ve all seen things like the following:

37 SECURITY CONTEST ANNOUNCEMENT You know Smokey is relying on you And McGruff has a job for you as well We are looking for ideas for a character and a slogan to energize the nation and help every citizen realize that they have a similar responsibility when it comes to cyber security and cyber crime. We will be awarding 2 prizes for this contest. A winner will be chosen for both the best slogan and best idea for a character. Winners can select their prize from the following list: Xbox One - Kindle Fire DHX 8.9 Playstation 4 - Microsoft Surface 2 64GB Nintendo Wii U - Asus Transformer T200 2-in-1 Nvidia Shield tablet (WiFi) - Dell Inspiron series laptop NVIDIA SHIELD Portable - Samsung Galaxy Tab ipad Air - ipad Mini

38 Creating a CULTURE OF SECURITY The same entry can win both prizes if the judges like both the character and its associated slogan. Otherwise, separate winners for each part will be selected. The contest is open to all citizens with a focus on students in grades K-12. Entries should include: Your name Your Grade and School, college/university, or organization/company Contact information for you or if you are under 18 for your parent/legal guardian A statement from your parent or legal guardian giving permission for you to enter the contest (if under 18) Your idea and/or drawing for either (or both) the slogan and/or the character Your choice of prize from the list above, should your entry be chosen as the winning entry A statement attesting to the fact that any slogan, image, or artwork is your own and that you give permission for the CIAS to use it in a national campaign on cyber security/crime. Entries must be received by midnight April 13, 2015 and should be either ed to cias@utsa.edu or mailed to UTSA/CIAS, attn: Culture of Security Contest, One UTSA Circle, San Antonio, TX Winners will be announced at the NCCDC banquet on April 26, 2015

39 Questions? Gregory B. White, Ph.D. Director, UTSA/CIAS

District Population Analysis with County Subtotals HOUSE DISTRICTS - PLANH309

District Population Analysis with County Subtotals HOUSE DISTRICTS - PLANH309 Page 1 of 11 Total State Population Total Districts Required Ideal District Population Unassigned Population Districts in Plan Unassigned Geography Districts Contiguous 25,145,561 150 167,637 0 150 No

More information

Voting Systems by County COUNTY VENDOR TYPE MODEL VERSION QUANITY ON HAND UNITY MODEL 100 MODEL 650 AUTOMARK MODEL 650 AUTOMARK

Voting Systems by County COUNTY VENDOR TYPE MODEL VERSION QUANITY ON HAND UNITY MODEL 100 MODEL 650 AUTOMARK MODEL 650 AUTOMARK For a more accessible copy of this document. Please contact the webmaster via email at webmaster@sos.texas.gov Voting Systems by County COUNTY VENDOR TYPE MODEL VERSION QUANITY ON HAND ANDERSON MODEL 00

More information

Stop searching for property records at the courthouse. Find them from your desktop in minutes.

Stop searching for property records at the courthouse. Find them from your desktop in minutes. Spec Sheet DI Courthouse Stop searching for property records at the courthouse. Find them from your desktop in minutes. You no longer have to use antiquated index books to source documents. With DI Courthouse,

More information

Continuity/Grant Updates

Continuity/Grant Updates Continuity/Grant Updates Brad McDannald Regional Continuity Manager FEMA Region 6 May 2017 WHAT IF 2 Continuity Overview It is the policy of the United States to maintain a comprehensive and effective

More information

Thematic Mapping the display of data on a map

Thematic Mapping the display of data on a map Thematic Mapping the display of data on a map Chloropleth Graduated Symbol Dot Density Enrollment by Country Enrollment by Level and State Location of Distance Ed Students Enrollment by County 1 A few

More information

Contact Numbers for DADS Long-term Services and Supports Listed by County

Contact Numbers for DADS Long-term Services and Supports Listed by County Services News & Information Rules & Statutes Business Información en español DADS Home Resize text Contact Numbers for DADS Long-term Services and Supports Listed by County List updated: October 3, 2007

More information

EFFECTIVE PUBLIC INVOLVEMENT THROUGH COLLABORATION WITH CONSULTANTS

EFFECTIVE PUBLIC INVOLVEMENT THROUGH COLLABORATION WITH CONSULTANTS EFFECTIVE PUBLIC INVOLVEMENT THROUGH COLLABORATION WITH CONSULTANTS 2017 TxDOT Environmental Conference Sept. 13, 2017 Collaboration Panel * Shannon McCord Public involvement director for HNTB s North

More information

PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS

PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS Revised DECEMBER 2, 2009 The Railroad Commission of Texas (RRC) has implemented an online system for the filing of

More information

PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS

PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS Revised DECEMBER 2, 2009 The Railroad Commission of Texas (RRC) has implemented an online system for the filing of

More information

Lamar. Red River. Grayson. Fannin. Bowie. Delta. Titus. Collin. Hunt. Hopkins. Morris Cass. Camp. Rockwall. Rains. Wood. Marion. Dallas.

Lamar. Red River. Grayson. Fannin. Bowie. Delta. Titus. Collin. Hunt. Hopkins. Morris Cass. Camp. Rockwall. Rains. Wood. Marion. Dallas. El Paso Hudspeth Culberson Jeff Davis Presido Loving Reeves Ward Brewster Winkler Bailey Cochran Yoakum Pecos Dallam Gaines Andrews Ector Crane Lamb Hockley Terry Sherman Dawson Martin Midland Upton Terrell

More information

TCEQ REGULATORY GUIDANCE Registration, Review & Reporting Division RG-309 Revised December 2003

TCEQ REGULATORY GUIDANCE Registration, Review & Reporting Division RG-309 Revised December 2003 TCEQ REGULATORY GUIDANCE Registration, Review & Reporting Division RG-309 Revised December 2003 The Step-by-Step Guide to Registration, Operating, and Reporting Requirements for Transporting Sludge Wastes

More information

Emergency Communications. ARRL North Texas Section

Emergency Communications. ARRL North Texas Section Emergency Communications ARRL North Texas Section A Little About the SEC Licensed since 1957 Harris County RACES Radio Officer - 1961 Collin County EC - 1973-2000 DEC District 5 Texas State RACES Unit

More information

CITY COMPANY COUNTY RESIDENTIAL

CITY COMPANY COUNTY RESIDENTIAL RAILROAD COMMISSION OF TEXAS TABLE 1B - NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2014 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL

More information

TABLE 1A 1 OF 53 INVESTOR OWNED NUMBER OF CONSUMERS ABBOTT HILL ATMOS ENERGY CORP., MID-TEX DIV -

TABLE 1A 1 OF 53 INVESTOR OWNED NUMBER OF CONSUMERS ABBOTT HILL ATMOS ENERGY CORP., MID-TEX DIV - RAILROAD COMMISSION OF TEXAS TABLE 1A NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES NUMBER OF CONSUMERS CALENDAR YEAR 2015 CITY COMPANY COUNTY RESIDENTIAL SM COMM LG COMM

More information

TABLE 1C 1 OF 69 INVESTOR OWNED AVG. PRICE PER MCF SM. COMM. LG COMM WEIGHTED & IND & IND AVG, CITY COMPANY COUNTY RESIDENTIAL

TABLE 1C 1 OF 69 INVESTOR OWNED AVG. PRICE PER MCF SM. COMM. LG COMM WEIGHTED & IND & IND AVG, CITY COMPANY COUNTY RESIDENTIAL TABLE 1C NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES AVERAGE PRICE PER MCF RESIDENTIAL & COMMERCIAL CALENDAR YEAR 2012 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL ATMOS

More information

ABBOTT HILL 4,821 1,824-6,645 ATMOS ENERGY CORP., MID-TEX DIV - -

ABBOTT HILL 4,821 1,824-6,645 ATMOS ENERGY CORP., MID-TEX DIV - - RAILROAD COMMISSION OF TEXAS TABLE 1B NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2013 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL

More information

RAILROAD COMMISSION OF TEXAS TABLE 1B - NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES

RAILROAD COMMISSION OF TEXAS TABLE 1B - NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES RAILROAD COMMISSION OF TEXAS TABLE 1B NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2015 CITY COMPANY COUNTY RESIDENTIAL SM COMM LG

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

REQUEST FOR PROPOSALS Rolling Plains Management Corporation Request for Proposal Cellular Phone Services

REQUEST FOR PROPOSALS Rolling Plains Management Corporation Request for Proposal Cellular Phone Services REQUEST FOR PROPOSALS Rolling Plains Management Corporation Request for Proposal Cellular Phone Services INQUIRIES AND PROPOSALS SHOULD BE DIRECTED TO: Lezlie Carroll Transportation Director Or Keren Whitney

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

NCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time

NCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

Incident Response Table Tops

Incident Response Table Tops Incident Response Table Tops Agenda Introductions SecureState overview Need for improved incident response capability https://pollev.com/securestate Overview of the exercise: Sample incident response table

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Information Security Is a Business

Information Security Is a Business Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari Cyber Risk and Resilience Management Team CERT Division Software Engineering Institute Carnegie Mellon University

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

UNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT

UNIT ONE. Introduction to CyberPatriot and Cybersecurity.  AIR FORCE ASSOCIATION S CYBERPATRIOT AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT ONE Introduction to CyberPatriot and Cybersecurity www.uscyberpatriot.org Learning Objectives Participants will gain an

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018 Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

You ve Been Hacked Now What? Incident Response Tabletop Exercise

You ve Been Hacked Now What? Incident Response Tabletop Exercise You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Cybersecurity for Health Care Providers

Cybersecurity for Health Care Providers Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Tina Ladabouche. GenCyber Program Manager

Tina Ladabouche. GenCyber Program Manager Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation

More information

Florida State University

Florida State University Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that

More information

SURVIVING THE CYBERPOCALYPSE. Craig Felty Vice President, Patient Care Services Hancock Regional Hospital

SURVIVING THE CYBERPOCALYPSE. Craig Felty Vice President, Patient Care Services Hancock Regional Hospital SURVIVING THE CYBERPOCALYPSE Craig Felty Vice President, Patient Care Services Hancock Regional Hospital Independent health system, $150M annual revenue, 1,200 employees, 150 active medical staff members,

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016 PA TechCon Cyber Wargaming: You ve been breached: Now what? April 26, 2016 Cyber attacks are on the rise $3.79M The average cost of a cyber incident [1] o f i n c i d e n t s 15% s t i l l t a k e d a

More information

Syllabus:))AIT)671)0)Information)Systems)Infrastructure)Lifecycle) Management)

Syllabus:))AIT)671)0)Information)Systems)Infrastructure)Lifecycle) Management) Syllabus:))AIT)671)0)Information)Systems)Infrastructure)Lifecycle) Management) Term:))Spring)2015) Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School

More information

MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY

MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY 19 MAY 2016 MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY CHRIS FURLOW PRESIDENT RIDGE GLOBAL cfurlow@ridgeglobal.com www.ridgeglobal.com ABOUT RIDGE GLOBAL Ridge Global is the risk management

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

June Member of The Month Prosperity Bank

June Member of The Month Prosperity Bank June Member of The Month Prosperity Bank The Aransas Pass Chamber recognized Prosperity Bank as the Member of the Month by presenting an award on June 6, 2017. As of March 31, 2017, Prosperity Bancshares

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

CYBER SECURITY AND MITIGATING RISKS

CYBER SECURITY AND MITIGATING RISKS CYBER SECURITY AND MITIGATING RISKS 01 WHO Tom Stewart Associate Director Technology Consulting Chicago Technical Security Leader Protiviti Slides PRESENTATION AGENDA 3 START HACKING DEFINITION BRIEF HISTORY

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1 Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com

More information

OA Cyber Security Plan FY 2018 (Abridged)

OA Cyber Security Plan FY 2018 (Abridged) OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

FOCUS ON. Computer. Due to Replacement 205. Due to Growth 250

FOCUS ON. Computer. Due to Replacement 205. Due to Growth 250 FOCUS ON Computer Houston Gulf Coast Region* 1 of 5 Put Your Mind to It Be a Computer. Organizations and businesses increasingly rely on computer technology to operate efficiently in the highly competitive

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Entertaining & Effective Security Awareness Training

Entertaining & Effective Security Awareness Training Entertaining & Effective Security Awareness Training www.digitaldefense.com Technology Isn t Enough Improve Security with a Fun Training Program that Works! Social engineering, system issues and employee

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Cybersecurity 2016 Survey Summary Report of Survey Results

Cybersecurity 2016 Survey Summary Report of Survey Results Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local

More information

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA Cyber Security in M&A Joshua Stone, CIA, CFE, CISA Agenda About Whitley Penn, LLP The Threat Landscape Changed Cybersecurity Due Diligence Privacy Practices Cybersecurity Practices Costs of a Data Breach

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

GDPR: The Day After. Pierre-Luc REFALO

GDPR: The Day After. Pierre-Luc REFALO GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

DHS Election Task Force Updates. Geoff Hale, Elections Task Force

DHS Election Task Force Updates. Geoff Hale, Elections Task Force 1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

2018 National Homeland Security Conference Preliminary Conference Agenda

2018 National Homeland Security Conference Preliminary Conference Agenda The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Regional Resilience: Prerequisite for Defense Industry Base Resilience Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information