Cyber Security Exercises A Useful Tool for Business Continuity Managers. Gregory B. White, Ph.D. Director, UTSA/CIAS 2 March 2015
|
|
- Sabina Franklin
- 5 years ago
- Views:
Transcription
1 Cyber Security Exercises A Useful Tool for Business Continuity Managers Gregory B. White, Ph.D. Director, UTSA/CIAS 2 March 2015
2 The University of Texas at San Antonio (UTSA) 2014 Ranked #1 Cybersecurity Program by Ponemon Inst. First Texas school designated an NSA / DHS Center of Academic Excellence in Information Assurance Education (re-designated as a CAE IA/CD with a focus area of Digital Forensics in 2014) UTSA has also received the COAE-Research designation Security programs and 3 centers in multiple departments BS in IA and concentrations in IA at the BS, MS, and PhD levels in Information Systems & Cyber Security (COB) Concentrations in Computer Security at the BS, MS, and PhD levels in Computer Science (COS) Research in various security topics at the PhD level in Electrical and Computer Engineering (COE) World-class Education and Research Outreach Programs with a National Impact
3 A sampling of security related courses Introduction to IA Intrusion Detection Digital Forensics Incident Response Secure Network Design Secure E-Commerce IA Policy SCADA Risk Assessment Cryptography Unix and Network Security Principles of Computer and Information Security Developing Secure Systems and Software Advanced topics in Computer Security Computer Security Practices 3
4 A sampling of security research areas Cyber Physical Systems Digital Forensics Data Mining Steganography Authentication Intrusion Detection/ Prevention Encryption Intelligent Agents Wireless Network Security Development of a Honey Community Botnet Detection, Analysis and Elimination Secure Information Sharing Trustworthy Cloud Computing Data Privacy Software Reliability and Security Community Computer Incident Response Malware Analysis 4
5 The Institute for Cyber Security (ICS) ICS performs Cyber security research in four major areas Foundations: Core principles, models and theories for Cyber security and their translation to practice Application-Centric: Theory and practice for new /emerging application areas: Technology-Centric: Theory and practice in new technologies that present new challenges: Attack-Centric: Malware analysis and detection Emphasis: Research, Development, Education
6 Center for Education and Research in Information and Infrastructure Security (CERI 2 S) Research in information assurance and security Cybersecurity workforce education Advanced Laboratory for Infrastructure Assurance and Security (ALIAS) Supports faculty research in broad spectrum of security-centric activities within the College of Business Laboratory for Advanced Information Security Education and Research (LAISER) Highly-secure environment to study cybersecurity phenomena CyberRange: study of advanced information assurance issues Behavioral Lab: research social science issues in cybersecurity Emphasis: Cybersecurity Research, Development, and Education in the Business Environment
7 Center for Infrastructure Assurance and Security (CIAS) The CIAS was founded in the summer of 2001 The operational security center at UTSA Having a significant impact on the nation! Three focus areas Cyber Defense Competition Program Collegiate, High School, Industry Middle School Program in development Lead on the development of a collegiate championship cup Cyber Security Training & Awareness Infrastructure Assurance Programs States, communities and other entities Emphasis: Competitions, State and Local Government Cyber Security, Training, Awareness, & Infrastructure Protection
8 Business Continuity, Disaster Recovery Some definitions so we are all on the same page Business Continuity: At its most simplistic level, business continuity is the ability to maintain operations/services in the face of a disruptive event. Disaster Recovery is a broad concept that can include recovery of people, facilities, and the like the coordinated activity of recovering IT systems following the complete or partial loss of a site due to a natural disaster or a security event. IDC-Best_Practices_in_Business_Continuity Disaster_Recovery.pdf
9 A common question How do I get senior management s attention or buy-in? Unfortunately, there is no single trick or silver bullet that will work for all organizations. FUD factor Regulations (especially with penalties) You have an incident Or maybe your chief competitor has an incident Conduct an exercise
10 Obtaining Interest in IT Continuity Best Practices in Business Continuity and Disaster Recovery An Incident Regulations Regulations Planning ahead? Planning ahead? An Incident
11 Some Basic Best Practices Create your plans (and obtain management buy-in)! Prioritize applications and determine SLAs for each based on the needs of the business. What is the cost of downtime for each application? Ensure you have the appropriate tools. Test your plans! Review your plans for adequacy (annually). (Also today you should examine use of the cloud )
12 Some advice The three most important things to implement for security/bc/dr: Backup! Backup!! Backup!!!
13 Business Continuity Management Another definition Business Continuity Management (BCM) is a management process that identifies risk, threats and vulnerabilities that could impact an entity's continued operations and provides a framework for building organizational resilience and the capability for an effective response. As opposed to Risk Avoidance or Prevention We can t avoid all risks and incidents, what we need to do is our best to manage them
14 5-step BCM Process Step 1: Program Management Obtain Executive support and commitment of resources, Step 2: Risk and Business Impact Analysis Determine and prioritize business activities that are critical Step 3: Identify Response Options Determine response options to meet overall objectives Step 4: Develop Response Plans Based on list of response options, develop best response plan Step 5: Train, Exercise and Maintain Used to ensure that what has been developed is appropriate, understood, and will actually work
15 Testing/Exercises Exercises provide an inexpensive (depending on the level of detail) way to build incident response skills and to identify potential discrepancies in your plans, processes, and training programs. Can be anything from a desk-top exercise to a fully-functional exercise.
16 Some Help NIST SP Computer Security Incident Handling Guide Appendix B Incident Handling Scenarios Includes scenario questions and sample scenarios NIST SP Guide to Malware incident Prevention and Handling Appendix B Malware Incident Handling Scenarios Includes scenario questions and sample scenarios NIST SP Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities Discusses tests, tabletop and functional exercises
17 SP sample questions What indications of the incident might the organization detect? Which indications would cause someone to think that an incident might have occurred? (Sections 3.2.2, 3.2.3) What strategy should the organization take to contain the incident? Why is this strategy preferable to others? (Section 3.3.1) What could happen if the incident were not contained? (Section 3.3.1)
18 SP sample scenario Scenario 5: Compromised Database Server On a Tuesday night, a database administrator performs some offhours maintenance on several production database servers. The administrator notices some unfamiliar and unusual directory names on one of the servers. After reviewing the directory listings and viewing some of the files, the administrator concludes that the server has been attacked and calls the incident response team for assistance. The team s investigation determines that the attacker successfully gained root access to the server 6 weeks ago. The following are additional questions for this scenario: 1. What sources might the team use to determine when the compromise had occurred? 2. How would the handling of this incident change if the team found that the database server had been running a packet sniffer and capturing passwords from the network? 3. How would the handling of this incident change if the team found that the server was running a process that would copy a database containing sensitive customer information each night and it to an external address?
19 SP sample scenario Scenario 5: Application Crashes On a Monday morning, the organization s help desk receives calls from three users who are having problems with their spreadsheet applications crashing repeatedly during use. As the day progresses, additional users call with similar problems. Most of the users are on the same team or related teams. 1. What types of malware could be causing the spreadsheet application crashes? What are the most likely non-malware causes? 2. What steps should be taken to determine if the crashes are caused by malware?
20 Beyond the NIST Pubs The NIST special pubs mentioned provide some useful scenarios that can be used for short training sessions of mostly IT and response personnel. Can also put several together for a more extensive exercise What is also needed, and may help in obtaining Executive-level support is a more extensive exercise that involves more than just IT staff.
21 What is your responsibility to the larger community? At the recent President s Cyber Security Summit an executive order signed to encourage sharing of information within industry and with the government. Government to serve as a broker of information Many in industry skeptical of this approach At the same time, there is a valid argument that can be made for the sharing of information and the benefit of doing so. An example would be the various industry ISACs
22 What about communities from a geographical perspective? Is there a possibility that a community (e.g. city) might be targeted for a cyber attack? (Yes! It has happened) Is it useful for the various entities (public and private sectors) to share information at some level? (again Yes!) Are communities ready for this sort of activity? (for the most part, No!) Is there a plan to help states and communities prepare? (Yes, it is called the Community Cyber Security Maturity Model CCSMM) Like a BCM for an organization, it needs to obtain executive level support. Exercises have proven useful to obtain this support.
23 Incidents Impacting States and Communities 2009 State of Virginia, extortion attempt In *my* possession, right now, are 8,257,378 patient records and a total of 35,548,087 prescriptions. Also, I made an encrypted backup and deleted the original. Unfortunately for Virginia, their backups seem to have gone missing, too. Uhoh :( For $10 million, I will gladly send along the password. You have 7 days to decide. If by the end of 7 days, you decide not to pony up, I ll go ahead and put this baby out on the market and accept the highest bid.
24
25 Incidents Impacting States and Communities Anonymous attack on the City of Orlando (June 2011) The computer hacker group Anonymous credited with crashing the websites of Visa and MasterCard in support of Wikileaks launched what it called "Operation Orlando" on Tuesday, disabling a tourism website and the mayor's own campaign site. In news releases and s to the Orlando Sentinel, the loose-knit group issued a "declaration of war" and promised to bring down a different Orlando-related website every day. One hacker told the Orlando Sentinel the group may target Orlando police officers, state lawmakers and the Florida Democratic Party _1_hackers-attack-website-lake-eola-park
26 Incidents Impacting States and Communities 2012 Data Breach in South Carolina Data breach at the South Carolina Department of Revenue exposed millions of state taxpayers to identity theft. 3.8 million Social Security numbers, 3.3 million bank account numbers and information for nearly 700,000 businesses stolen Occurred after a Department of Revenue employee opened a phishing giving the hacker access to the department's data system During a period of weeks hacker scoured the department's system by remote access then, over a two-day period zipped 74.7 gigabytes of data which was then downloaded. State officials learned of the breach Oct. 10, 2012 from the U.S. Secret Service Cost so far is $25 million, including $12 million going to Experian to cover a year of state-paid credit monitoring.
27 Incidents Impacting States and Communities City of Detroit Addresses Security Breach 9/4/ The City of Detroit Department of Information Technology Services has determined that accounts created to order pre-home sale inspections through the City of Detroit Buildings, Safety Engineering and Environmental Department (BSEED) were the target of a recent low-level computer security breach. The compromised database, containing approximately 5,110 records, included only non-sensitive information such as addresses of properties and estimated home values. No personally identifying information was included in the database, nor was any credit card or other payment information. As a precaution, individuals who had an online account with BSEED will be receiving s about the data breach and what steps the City has taken to secure their information.
28 Community Cyber Security Exercises Lessons learned in communities applicable to organizations First community exercise was Dark Screen in Dozens of exercises have been conducted since then. As discussed in NIST SP , can be anywhere from a tabletop to a functional exercise. Most communities are at the beginning stages of establishing their programs and need top-level buy-in. The exercises have almost exclusively been tabletop events. Have been successful in getting mayors, city managers, chiefs of police or fire departments, heads of EOCs, etc. Note that these are NOT IT personnel! Exercises have been successful at making leaders aware of issues
29 Sample Dark Screen Event Friday, September 13, :01 AM (COSA, Bexar County, Infrastructure tables) The San Antonio Police Department, Bexar County Sheriff s office, and CPS receive an threatening to shut down San Antonio s power system. The anonymous sender claims to have inside knowledge of the CPS SCADA systems. The demands that San Antonio police stop its harassment of fighters for world justice. Question 1: (Infrastructure, COSA, Bexar tables) What actions would this report prompt? Who, if anybody, would your organization contact? How could this be adapted for industry?
30 Would Local LE Forward this to Anyone? Friday, 14 April 2006, 2:40 p.m. (Tyler Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?
31 What about now? Saturday, 15 April 2006, 1:40 p.m. (Dallas Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?
32 Or now? Saturday, 15 April 2006, 1:40 p.m. (Plano Police Department) Possible War Driving During a routine stop for speeding, a police officer notices the occupants of a truck that was stopped have laptops and what appears to be oversized antennas mounted on the vehicle and connected to the laptops. When questioned about the equipment, the occupants (two males in their mid 20s) reply that the equipment is just computer stuff. The occupants agree to let the officer search the vehicle, but the officer does not find anything illegal just handheld global positioning systems and maps of the community and surrounding area. They were driving around facilities owned by the local power company. Would the State EOC want to know about this?
33 El Paso Hudspeth Dallam Hartley Oldham Deaf Smith Sherman HansfordOchiltreeLipscomb Moore Roberts Hemphill Hutchinson Potter Does this now paint a picture that you d be interested in seeing? Gray Parmer Castro Swisher Briscoe Hall Childress Bailey Lamb Hale Carson 5B Wheeler RandallArmstrong Donley Collingsworth Hardeman Floyd Motley Cottle Wilbarger Foard Wichita Clay Cochran Hockley Archer Montague Lamar Lubbock CrosbyDickens King Knox Baylor Cooke Grayson Fannin Red Sub Sub River Delta Bowie 5A 5A Young 1A 1A Titus Yoakum Terry Lynn Garza Kent Stonewall Haskell Jack Wise Denton Collin Hunt Hopkins Throckmorton Cass Camp Rockwall Rains Scurry Wood Upshur Marion Gaines Dawson Jones Shackelford Palo Parker Borden Fisher Tarrant Stephens Pinto Dallas Kaufman Van 1B Zandt Harrison Gregg 4B Hood Johnson Ellis Smith Andrews Martin Howard Mitchell Nolan Taylor CallahanEastland ErathSomervell Henderson Panola Rusk Navarro Hill Glasscock Loving Winkler Ector Coke Coleman Comanche Bosque Cherokee Midland Sterling Runnels Brown Anderson Shelby Hamilton 6A Freestone Nacogdoches Culberson Ward McLennan Limestone San Augustine Crane Mills Tom Upton Reagan Green Concho Coryell 6C Leon Houston Sub Sabine Reeves Irion Falls Angelina Sub McCulloch San 2B Lampasas Saba Bell Trinity Robertson Jasper 4B Madison Newton Pecos Schleicher Menard Burnet Milam Polk Tyler Jeff 4A Crockett Mason Williamson Walker Llano Brazos San Davis 6B Grimes Sutton Jacinto Kimble Burleson 2C Blanco Montgomery Hardin Travis Lee Terrell Gillespie Washington 2B Liberty Orange Bastrop Presidio Kerr Hays Val Edwards Waller Kendall Austin Jefferson Brewster Verde Real Fayette Harris Comal Caldwell Bandera Chambers Colorado 2A Guadalupe Sub Fort Bend Kinney Uvalde Medina Bexar Gonzales Lavaca 2C Galveston Sub 3B Wilson Wharton Brazoria DeWitt 8A Atascosa Karnes Jackson Maverick Zavala Frio Victoria Goliad Matagorda Calhoun Dimmit La Salle Bee Refugio McMullen Live 3A Oak San Aransas Patricio Webb Jim Wells Nueces Duval Sub 4A The State s View Sub 8A Zapata Jim Hogg Kleberg Brooks Kenedy Franklin Morris If you could step back and view what is occurring around the state would you be interested if you suddenly could plot all of these and similar occurrences? Friday, 14 April Saturday, 15 April Monday, 17 April Starr 8A Hidalgo Willacy Cameron
34 Results Leaders came away from these exercises with an understanding that cyber infrastructures are important to the operation of a community. In many instances IT and DRP personnel had been trying to obtain support but had made little to no headway. The need to share information was more clearly understood. Still issues with implementation of info sharing programs. The lessons learned from these state and community exercises are directly applicable to industry as well. Industry ALSO has a role in the communities.
35 The goal is of course to avoid security events, and we should do all we can to protect our systems. But, what do we do about this?
36 And what about these? We ve all seen things like the following:
37 SECURITY CONTEST ANNOUNCEMENT You know Smokey is relying on you And McGruff has a job for you as well We are looking for ideas for a character and a slogan to energize the nation and help every citizen realize that they have a similar responsibility when it comes to cyber security and cyber crime. We will be awarding 2 prizes for this contest. A winner will be chosen for both the best slogan and best idea for a character. Winners can select their prize from the following list: Xbox One - Kindle Fire DHX 8.9 Playstation 4 - Microsoft Surface 2 64GB Nintendo Wii U - Asus Transformer T200 2-in-1 Nvidia Shield tablet (WiFi) - Dell Inspiron series laptop NVIDIA SHIELD Portable - Samsung Galaxy Tab ipad Air - ipad Mini
38 Creating a CULTURE OF SECURITY The same entry can win both prizes if the judges like both the character and its associated slogan. Otherwise, separate winners for each part will be selected. The contest is open to all citizens with a focus on students in grades K-12. Entries should include: Your name Your Grade and School, college/university, or organization/company Contact information for you or if you are under 18 for your parent/legal guardian A statement from your parent or legal guardian giving permission for you to enter the contest (if under 18) Your idea and/or drawing for either (or both) the slogan and/or the character Your choice of prize from the list above, should your entry be chosen as the winning entry A statement attesting to the fact that any slogan, image, or artwork is your own and that you give permission for the CIAS to use it in a national campaign on cyber security/crime. Entries must be received by midnight April 13, 2015 and should be either ed to cias@utsa.edu or mailed to UTSA/CIAS, attn: Culture of Security Contest, One UTSA Circle, San Antonio, TX Winners will be announced at the NCCDC banquet on April 26, 2015
39 Questions? Gregory B. White, Ph.D. Director, UTSA/CIAS
District Population Analysis with County Subtotals HOUSE DISTRICTS - PLANH309
Page 1 of 11 Total State Population Total Districts Required Ideal District Population Unassigned Population Districts in Plan Unassigned Geography Districts Contiguous 25,145,561 150 167,637 0 150 No
More informationVoting Systems by County COUNTY VENDOR TYPE MODEL VERSION QUANITY ON HAND UNITY MODEL 100 MODEL 650 AUTOMARK MODEL 650 AUTOMARK
For a more accessible copy of this document. Please contact the webmaster via email at webmaster@sos.texas.gov Voting Systems by County COUNTY VENDOR TYPE MODEL VERSION QUANITY ON HAND ANDERSON MODEL 00
More informationStop searching for property records at the courthouse. Find them from your desktop in minutes.
Spec Sheet DI Courthouse Stop searching for property records at the courthouse. Find them from your desktop in minutes. You no longer have to use antiquated index books to source documents. With DI Courthouse,
More informationContinuity/Grant Updates
Continuity/Grant Updates Brad McDannald Regional Continuity Manager FEMA Region 6 May 2017 WHAT IF 2 Continuity Overview It is the policy of the United States to maintain a comprehensive and effective
More informationThematic Mapping the display of data on a map
Thematic Mapping the display of data on a map Chloropleth Graduated Symbol Dot Density Enrollment by Country Enrollment by Level and State Location of Distance Ed Students Enrollment by County 1 A few
More informationContact Numbers for DADS Long-term Services and Supports Listed by County
Services News & Information Rules & Statutes Business Información en español DADS Home Resize text Contact Numbers for DADS Long-term Services and Supports Listed by County List updated: October 3, 2007
More informationEFFECTIVE PUBLIC INVOLVEMENT THROUGH COLLABORATION WITH CONSULTANTS
EFFECTIVE PUBLIC INVOLVEMENT THROUGH COLLABORATION WITH CONSULTANTS 2017 TxDOT Environmental Conference Sept. 13, 2017 Collaboration Panel * Shannon McCord Public involvement director for HNTB s North
More informationPS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS
PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS Revised DECEMBER 2, 2009 The Railroad Commission of Texas (RRC) has implemented an online system for the filing of
More informationPS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS
PS-95 SEMI-ANNUAL LEAK REPORT PIPELINE INTEGRITY PROJECT ELECTRONIC FILING REQUIREMENTS Revised DECEMBER 2, 2009 The Railroad Commission of Texas (RRC) has implemented an online system for the filing of
More informationLamar. Red River. Grayson. Fannin. Bowie. Delta. Titus. Collin. Hunt. Hopkins. Morris Cass. Camp. Rockwall. Rains. Wood. Marion. Dallas.
El Paso Hudspeth Culberson Jeff Davis Presido Loving Reeves Ward Brewster Winkler Bailey Cochran Yoakum Pecos Dallam Gaines Andrews Ector Crane Lamb Hockley Terry Sherman Dawson Martin Midland Upton Terrell
More informationTCEQ REGULATORY GUIDANCE Registration, Review & Reporting Division RG-309 Revised December 2003
TCEQ REGULATORY GUIDANCE Registration, Review & Reporting Division RG-309 Revised December 2003 The Step-by-Step Guide to Registration, Operating, and Reporting Requirements for Transporting Sludge Wastes
More informationEmergency Communications. ARRL North Texas Section
Emergency Communications ARRL North Texas Section A Little About the SEC Licensed since 1957 Harris County RACES Radio Officer - 1961 Collin County EC - 1973-2000 DEC District 5 Texas State RACES Unit
More informationCITY COMPANY COUNTY RESIDENTIAL
RAILROAD COMMISSION OF TEXAS TABLE 1B - NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2014 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL
More informationTABLE 1A 1 OF 53 INVESTOR OWNED NUMBER OF CONSUMERS ABBOTT HILL ATMOS ENERGY CORP., MID-TEX DIV -
RAILROAD COMMISSION OF TEXAS TABLE 1A NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES NUMBER OF CONSUMERS CALENDAR YEAR 2015 CITY COMPANY COUNTY RESIDENTIAL SM COMM LG COMM
More informationTABLE 1C 1 OF 69 INVESTOR OWNED AVG. PRICE PER MCF SM. COMM. LG COMM WEIGHTED & IND & IND AVG, CITY COMPANY COUNTY RESIDENTIAL
TABLE 1C NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES AVERAGE PRICE PER MCF RESIDENTIAL & COMMERCIAL CALENDAR YEAR 2012 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL ATMOS
More informationABBOTT HILL 4,821 1,824-6,645 ATMOS ENERGY CORP., MID-TEX DIV - -
RAILROAD COMMISSION OF TEXAS TABLE 1B NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2013 CITY COMPANY COUNTY RESIDENTIAL ABBOTT HILL
More informationRAILROAD COMMISSION OF TEXAS TABLE 1B - NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES
RAILROAD COMMISSION OF TEXAS TABLE 1B NATURAL GAS SERVICE TO TEXAS CITIES INVESTOR OWNED GAS DISTRIBUTION UTILITIES VOLUMES (Mcf) CONSUMED CALENDAR YEAR 2015 CITY COMPANY COUNTY RESIDENTIAL SM COMM LG
More informationCybersecurity: Incident Response Short
Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability
More informationREQUEST FOR PROPOSALS Rolling Plains Management Corporation Request for Proposal Cellular Phone Services
REQUEST FOR PROPOSALS Rolling Plains Management Corporation Request for Proposal Cellular Phone Services INQUIRIES AND PROPOSALS SHOULD BE DIRECTED TO: Lezlie Carroll Transportation Director Or Keren Whitney
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationNCPC ANNUAL REPORT 2015 NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM. Helping Secure the Nation s Cyber Infrastructure One Community at a Time
NCPC NATIONAL CYBERSECURITY PREPAREDNESS CONSORTIUM ANNUAL REPORT 2015 elping Secure the Nation s Cyber Infrastructure One Community at a Time NCPC Mission NCPC Experience The mission of the NCPC is to
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationA New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO
A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationIncident Response Table Tops
Incident Response Table Tops Agenda Introductions SecureState overview Need for improved incident response capability https://pollev.com/securestate Overview of the exercise: Sample incident response table
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationInformation Security Is a Business
Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari Cyber Risk and Resilience Management Team CERT Division Software Engineering Institute Carnegie Mellon University
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationUNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT ONE Introduction to CyberPatriot and Cybersecurity www.uscyberpatriot.org Learning Objectives Participants will gain an
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationCenter for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS
Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationThink Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe
Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity
More informationAn Overview of Mobile Security
An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim
More informationWelcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time
TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationBuilding Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018
Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationNew York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief
Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced
More informationYou ve Been Hacked Now What? Incident Response Tabletop Exercise
You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationCybersecurity for Health Care Providers
Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationTina Ladabouche. GenCyber Program Manager
Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation
More informationFlorida State University
Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that
More informationSURVIVING THE CYBERPOCALYPSE. Craig Felty Vice President, Patient Care Services Hancock Regional Hospital
SURVIVING THE CYBERPOCALYPSE Craig Felty Vice President, Patient Care Services Hancock Regional Hospital Independent health system, $150M annual revenue, 1,200 employees, 150 active medical staff members,
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More informationA Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016
A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationPA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016
PA TechCon Cyber Wargaming: You ve been breached: Now what? April 26, 2016 Cyber attacks are on the rise $3.79M The average cost of a cyber incident [1] o f i n c i d e n t s 15% s t i l l t a k e d a
More informationSyllabus:))AIT)671)0)Information)Systems)Infrastructure)Lifecycle) Management)
Syllabus:))AIT)671)0)Information)Systems)Infrastructure)Lifecycle) Management) Term:))Spring)2015) Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School
More informationMANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY
19 MAY 2016 MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY CHRIS FURLOW PRESIDENT RIDGE GLOBAL cfurlow@ridgeglobal.com www.ridgeglobal.com ABOUT RIDGE GLOBAL Ridge Global is the risk management
More informationCOUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017
COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime
More informationJune Member of The Month Prosperity Bank
June Member of The Month Prosperity Bank The Aransas Pass Chamber recognized Prosperity Bank as the Member of the Month by presenting an award on June 6, 2017. As of March 31, 2017, Prosperity Bancshares
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationCYBER SECURITY AND MITIGATING RISKS
CYBER SECURITY AND MITIGATING RISKS 01 WHO Tom Stewart Associate Director Technology Consulting Chicago Technical Security Leader Protiviti Slides PRESENTATION AGENDA 3 START HACKING DEFINITION BRIEF HISTORY
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationDHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1
Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com
More informationOA Cyber Security Plan FY 2018 (Abridged)
OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1
More information2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action
2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com
More informationFOCUS ON. Computer. Due to Replacement 205. Due to Growth 250
FOCUS ON Computer Houston Gulf Coast Region* 1 of 5 Put Your Mind to It Be a Computer. Organizations and businesses increasingly rely on computer technology to operate efficiently in the highly competitive
More informationIncident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles
Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationEntertaining & Effective Security Awareness Training
Entertaining & Effective Security Awareness Training www.digitaldefense.com Technology Isn t Enough Improve Security with a Fun Training Program that Works! Social engineering, system issues and employee
More informationInformation Security Controls Policy
Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationCybersecurity 2016 Survey Summary Report of Survey Results
Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local
More informationCyber Security in M&A. Joshua Stone, CIA, CFE, CISA
Cyber Security in M&A Joshua Stone, CIA, CFE, CISA Agenda About Whitley Penn, LLP The Threat Landscape Changed Cybersecurity Due Diligence Privacy Practices Cybersecurity Practices Costs of a Data Breach
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationGDPR: The Day After. Pierre-Luc REFALO
GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationDHS Election Task Force Updates. Geoff Hale, Elections Task Force
1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More information2018 National Homeland Security Conference Preliminary Conference Agenda
The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationRegional Resilience: Prerequisite for Defense Industry Base Resilience
Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationThe Problem with Privileged Users
Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information
More informationThe Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio
Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More information