U.S. Department of Homeland Security Protective Security Coordination Division

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "U.S. Department of Homeland Security Protective Security Coordination Division"

Transcription

1 U.S. Department of Homeland Security Protective Security Coordination Division Pete Owen, Protective Security Advisor Brief to CA-NV-AWWA March 31, 2010

2 Goal for this afternoon The National Infrastructure Protection Plan The Role of the Protective Security Coordination Division How we can help members of the CA-NV-AWWA 2

3 The National Infrastructure Protection Plan

4 HSPD-7, the National Infrastructure Protection Plan, and the Water Sector-Specific Plan 4

5 Critical Infrastructure and Key Resources Critical Infrastructure : Agriculture and Food Key Resources Commercial Facilities Commercial Nuclear Reactors, Materials, and Waste Dams Government Facilities Banking and Finance Chemical Critical Manufacturing Defense Industrial Base Water Emergency Services Energy Information Technology Nat l Monuments & Icons Postal and Shipping Public Health & Healthcare Telecommunications Transportation Systems 5

6 CI in the Water Sector Raw Water Supply, Storage & Transmission Water Treatment Facilities Treated Water Storage & Distribution Systems Treated Water Monitoring Systems & Distribution Control Centers Wastewater Treatment Facilities Dam Sector: Reservoir Dam Projects 6

7 Sector Partnership Model Critical infrastructure protection and resiliency are the shared responsibilities of Federal, State, local, tribal, and territorial governments, regional coalitions, and the owners and operators of the Nation s CIKR NIPP outlines their roles & responsibilities Also describes the information-sharing environment & communications

8 Example: Water Sector Lead Federal Agency: Environmental Protection Agency SCC: Water Sector Coordinating Council (WSCC) WSCC mission: To serve as a policy, strategy, and coordination mechanism and recommend actions to reduce and eliminate significant homeland security vulnerabilities to the water sector through interactions with the Federal government.

9 NIPP Risk Management Framework

10 Security Goals for the Water Sector Sustain protection of public health and the environment. Recognize and reduce risks. Maintain a resilient infrastructure. Increase communication, outreach, and public confidence.

11 The Role of the Protective Security Coordination Division

12 PSCD Programs Everything we do is voluntary Everything we do is free We do everything in partnership with state & local agencies Everything we collect is safeguarded PCII

13 PSCD Programs and Initiatives Office for Bombing Prevention (OBP) DHS lead for bombing prevention activities Seeks to reduce the Nation s risk to terrorist bombing attacks Vulnerability Assessments Branch (VAB) Conducts vulnerability assessments in partnership with Federal, State, local, and private sector security partners to prevent, deter, and mitigate the risk of a terrorist attack. Field Operations Branch (FOB) Protective Security Advisors (PSAs) in all 50 States and 1 Territory

14 DHS Office of Bombing Prevention Coordinates national efforts Analyzes IED incidents worldwide Analyzes counter-ied requirements and capabilities Promotes information sharing and IED awareness and vigilance TRIPWire

15 Bomb-Making Material Awareness Program (BMAP) Developed in partnership with FBI Focus of DHS effort is training and equipping state and local law enforcement and fire fighters. Local officers conduct outreach to commercial retailers, service providers, and chemical distributors & wholesalers. Educates private sector on suspicious behavior, hazardous materials, precursor chemicals, and other bombmaking information.

16 DHS Vulnerability Assessments Buffer-Zone Protection Program Computer Based Assessment Tool + Site Assist Visit Regional Resiliency Assessment Enhanced Critical Infrastructure Protection visit Detail Man-hours

17 Protective Security Advisors (PSAs) PSA Locations Anchorage Seattle Bismarck Helena Portland Minneapolis Portland Williston Pierre Manchester Boise Milwaukee Buffalo Cheyenne Omaha Des Moines Boston Detroit Grand Rapids Albany Chicago Cleveland Pittsburgh Harrisburg Salt Lake City Denver Springfield Indianapolis Sacramento Topeka Kansas City St. Louis Northeast Philadelphia Cincinnati Dover Louisville Baltimore Washington, D.C. Charlestown San Francisco Richmond Norfolk Nashville Las Vegas Albuquerque Raleigh Memphis Oklahoma City Little Rock Los Angeles Phoenix Birmingham San Diego Atlanta Mid-Atlantic Columbia Jackson El Paso Denton Dallas Mobile Baton Rouge Houston New Orleans Tallahassee San Antonio Honolulu Gulf Coast Guam Texas Tampa Florida New Haven Newark New York City Providence U.S. Virgin Islands Miami San Juan

18 PSAs Who we are Link to DHS infrastructure protection resources Risk assessment Information sharing Incident support 18

19 Who We Are Not Grant administrators Regulators or inspectors Law enforcement 19

20 How We Assess Risk Risk is a function of Consequences Vulnerability & Threat DHS and our state partners: Identify and prioritize CIKR according to consequences Perform detailed vulnerability assessments of CIKR Assess threats 20

21 How We Share Information Push intelligence & best practices to our local partners Conduct intelligence analysis Regionally at the fusion center Reach-back to DHS Participate in hazard mitigation planning Provide local context to DHS Coordinate security training and exercises 21

22 Critical Infrastructure Information Act of 2002 Protects PCII from The Freedom of Information Act (FOIA), State and local disclosure laws, and Use in civil litigation PCII cannot be used for regulatory purposes PCII can only be accessed in accordance with strict safeguarding and handling requirements 22

23 What PSAs do as the Infrastructure Liaison during an incident or special event Conduct liaison for CIKR between DHS, state & local agencies + the private sector at the field level. Recommend CIKR priorities to the Unified Coordination Group. Provides situational awareness on CIKR to the incident managers. Support prioritization of response and restoration efforts. Leverage private-sector relationships to support response and recovery efforts. 23

24 How we can help members of the CA-NV-AWWA

25 Assessing Risk: Infrastructure Surveys aka Enhanced Critical Infrastructure Protection (ECIP) Helps DHS build the national risk picture Provides comparison to similar facilities Based on consistent, objective criteria

26 Vulnerability Dashboard Facility and Sector Protective Measures Index Physical Security Overall Random Security Measures

27 Assessing Risk: Buffer Zone Protection Program (BZPP) An infrastructure protection grant program targeted to first responders. Builds terrorism prevention and protection capabilities through planning and equipment acquisition by local law enforcement and first responders. Develops protective measures that make it more difficult for terrorists to conduct surveillance or launch attacks from the immediate vicinity of CIKR.

28 Assessing Risk: Site Assistance Visits (SAVs) Conducted with federal, state, and local government agencies, and CIKR owners/ operators. Identifies CIKR dependencies, interdependencies, resiliency characteristics, and regional capability gaps. Increases owner/operator awareness of vulnerabilities and provides options for enhancing protective measures. Provides detailed reports to private sector partners used to make security enhancements.

29 Assessing Risk: Automated Critical Asset Management System (ACAMS) Originally developed by LAPD as Archangel Now administered and funded by DHS Conducted by state in partnership with fusion centers and local law enforcement Not all states & local agencies use this Facilitates emergency planning + response Helps assess consequence + vulnerability

30 Cyber Assessments Cyber Security Evaluation Tool (CSET) A desktop software tool For both control systems and business/enterprise systems Guides the user through a step-bystep process Assesses cyber systems and network security practices against recognized industry standards Cyber Resiliency Review A technical assist visit Assesses key process areas of cyber security management Facilitated Q&A that identifies and substantiates cyber security performance To learn more: or

31 Information Sharing Resources HSIN TRIPwire Infragard Best practices Training

32 Homeland Security Information Network Secure and trusted web-based platform Sensitive But Unclassified (SBU) information Used by federal, state, local, tribal, private sector Request membership via to or

33 TRIPWire (Technical Resource for Incident Prevention) Secure, online information-sharing network Current terrorist bombing tactics, techniques, and procedures, including improvised explosive device (IED) design and emplacement. Access through HSIN Critical Sectors Community Portal

34 Infragard A partnership between the FBI and the private sector. An association of businesses, academic institutions, state and local law enforcement agencies, and others Dedicated to sharing information and intelligence to prevent hostile acts against the United States

35 Sharing Best Practices Common Vulnerabilities Potential Indicators of Terrorist Activity Protective Measures Active Shooter material Bombing prevention material All available on TRIPwire

36 Training Resources Surveillance Detection 3-day course Developing, applying, & employing surveillance detection protective measures Developing a surveillance detection plan Protective Measures 2-day course Provide executives & employees with the knowledge to identify vulnerabilities & select appropriate protective measures for their facility 36

37 The Department of Homeland Security Control Systems Security Program is offering a one-day introductory training course covering control systems cybersecurity challenges facing the nation s critical infrastructure. The course discusses the importance of securing control systems, how cyber attacks can be launched, and concepts for implementing mitigation strategies. Participants will also gain an understanding of how to start improving the cyber security posture of their control system networks. Specific topics will include: Protecting control systems from cyber attacks and why they are susceptible Risks and potential consequences of cyber attacks Common vulnerabilities in industrial control systems System exposures to attacks, various attack scenarios, and associate mitigation strategies Control System Security Program products and services available to asset owners. When: May 5, :00 a.m. to 5:00 p.m. Training Course Introduction to Industrial Control Systems Cybersecurity Where: Saddleback Church, 1 Saddleback Way, Lake Forest, CA Who may attend: Priority registration will be given to control system and IT professionals associated with operations of critical infrastructure assets in all sectors. Cost: The course is offered at no cost. Travel and accommodations are the responsibility of each participant. Registration: Contact Pete Owen, DHS Protective Security Advisor at May 5, 2010

38 Questions? Brian Keith Los Angeles CA Donald Ray Los Angeles CA Frank Calvillo Sacramento CA Peter Owen San Diego CA Richard Sierze San Francisco CA Richard Stribling San Francisco CA Gonzalo Cordova Las Vegas NV

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2012 What s Inside Welcome 1 Organization 3 Outreach 4 Industrial Control Systems Joint Working Group 5 Advanced Analytical

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

National Cyber Incident Response - Architectural Concepts

National Cyber Incident Response - Architectural Concepts CSIRT Contributions to National Cyber Incident Response: An Architectural Perspective with U.S. Examples Bradford J. Willke Team Lead, Information Security Assessment & Evaluation Survivable Enterprise

More information

IBM ServicePac Warranty Service Upgrade (WSU)

IBM ServicePac Warranty Service Upgrade (WSU) IBM Maintenance Services ServicePac for Warranty and Maintenance Options IBM ServicePac Warranty Service Upgrade (WSU) Supported Products January 24, 2012 IBM ServicePac Warranty Service Upgrade Post-warranty

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014 2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating

More information

Federal Information Sharing Resources for Small and Midsize Businesses

Federal Information Sharing Resources for Small and Midsize Businesses Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017

More information

Increase uptime with a faster, more reliable, connection

Increase uptime with a faster, more reliable, connection FIXED WIRELESS SELLING GUIDE Key takeaways It s survivable: you ll see improved uptime and redundancy Increase uptime with a faster, more reliable, connection It s cost-efficient: you can specify, and

More information

Dallas Police Department Fusion Center Update

Dallas Police Department Fusion Center Update Dallas Police Department Fusion Center Update Public Safety Committee October 24, 2011 www.dallaspolice.net David O. Brown Chief Of Police Purpose Provide historical background Provide an overview of current

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY 2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for

More information

How to Order and Use Penalty Mail Stamps and Stationery

How to Order and Use Penalty Mail Stamps and Stationery How to Order and Use Penalty Mail Stamps and Stationery Publication 350 Transmittal Letter 3 A. Explanation. This publication provides procedures for U.S. Government agencies to requisition and use penalty

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Critical Infrastructure Protection (CIP)

Critical Infrastructure Protection (CIP) Critical Infrastructure Protection (CIP) John Hoyt Department of Homeland Security Science and Technology (S&T) Directorate john.hoyt@dhs.gov (202) 401-3467 September 11, 2003 The Nation s Infrastructure

More information

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center OVERALL RESULTS E-Crime Watch Survey: 2005 Field Dates: 3/3/05 3/14/05 Total completed surveys: 819 Margin of Error: +/- 3.4% NOTE TO EDITOR For the purpose of this survey, electronic crime, intrusion,

More information

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN:

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN: 2014-2017 Her Majesty the Queen in Right of Canada, 2014 Cat. No.: PS4-66/2014E-PDF ISBN: 978-1-100-23291-1 ii Table of contents 1. Introduction....3 What we have learned and what has changed...3 2. A

More information

Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer

Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer Applied Research Associates, Inc. www.ara.com 601-638-5401 Architectural Graphic Standards 12 th

More information

ICS-CERT Year in Review

ICS-CERT Year in Review ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2014 National Cybersecurity and Communications Integration Center What s Inside Welcome 1 ICS-CERT Introduction 2 ICS-CERT

More information

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE Countermeasures Assessment & Security Experts, LLC 110 Quigley Boulevard Airport Park New Castle, DE 19720 302-322-9600 9/9/2010 1 20-59(28) IS AN INTRODUCTORY REFERENCE DOCUMENT 2 3 CHAPTER 1: FIGURE

More information

Resiliency and the Need for Re-Thinking our Water Infrastructure. Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015

Resiliency and the Need for Re-Thinking our Water Infrastructure. Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015 Resiliency and the Need for Re-Thinking our Water Infrastructure Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015 Presentation Goals & Focus Define What is Meant by Resiliency Explain

More information

The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing

The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing Analysis Center DIB ISAC December 18, 2014 Why ISACs?

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

Terrorism Prevention. April 13, 2011 Michael J. McMullen Program Manager

Terrorism Prevention. April 13, 2011 Michael J. McMullen Program Manager Terrorism Prevention Exercise Program (TPEP) Training & Exercise Conference April 13, 2011 Michael J. McMullen Program Manager Agenda Mission TPEP and Baseline Capabilities Current Offerings TPEP Service

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS)

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) U.S. Department of Homeland Security Information Sharing and Services Office (IS 2 O) Office of the Chief Information Officer

More information

CALIFORNIA CYBERSECURITY TASK FORCE

CALIFORNIA CYBERSECURITY TASK FORCE CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity May 2017 cyberframework@nist.gov Why Cybersecurity Framework? Cybersecurity Framework Uses Identify mission or business cybersecurity dependencies

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Energy Audits Municipal and Commercial Buildings. Cities that routinely conduct energy audits for municipal buildings and operations.

Energy Audits Municipal and Commercial Buildings. Cities that routinely conduct energy audits for municipal buildings and operations. Energy Audits Municipal and Commercial Buildings Cities that routinely conduct energy audits for municipal buildings and operations. Large Cities Austin 949,587 Los Angeles 4,030,904 Portland 639,863 San

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

HIPAA Regulatory Compliance

HIPAA Regulatory Compliance Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health

More information

Global Security Operation Center GSOC

Global Security Operation Center GSOC Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0 P.O. Box 212 Philip D. Murphy, Governor 300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ 08625-0212 www.tech.nj.gov STATE OF NEW JERSEY TECHNOLOGY CIRCULAR Enterprise Information

More information

The Integrated Food Safety System. IFPTI AFDO Pre-Conference Workshop June 2, 2012 Providence RI.

The Integrated Food Safety System. IFPTI AFDO Pre-Conference Workshop June 2, 2012 Providence RI. The Integrated Food Safety System IFPTI AFDO Pre-Conference Workshop June 2, 2012 Providence RI. The Integrated Food Safety System IFPTI proposed course Provide awareness and understanding of what an integrated

More information

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Disaster Acronyms and Glossary

Disaster Acronyms and Glossary ACE Area Coordination Exercises Disaster Acronyms and Glossary ASTM (ASTM Standard 2413) ASTM is an international organization that establishes standards and norms. Standard 2413 is a guide for standard

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015 Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report November 19, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario QD3 results

More information

Valérie Andrianavaly European Commission DG INFSO-A3

Valérie Andrianavaly European Commission DG INFSO-A3 Security and resilience in the Information Society: towards a CIIP policy in the EU Valérie Andrianavaly European Commission DG INFSO-A3 valerie.andrianavaly@ec.europa.eu Network and information security:

More information

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 Earn up to 16 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are you confident in

More information

NCCIC/ICS-CERT Year in Review National Cybersecurity and Communications Integration Center/ Industrial Control Systems Cyber Emergency Response Team

NCCIC/ICS-CERT Year in Review National Cybersecurity and Communications Integration Center/ Industrial Control Systems Cyber Emergency Response Team NCCIC/ICS-CERT Year in Review National Cybersecurity and Communications Integration Center/ Industrial Control Systems Cyber Emergency Response Team FY 215 What s Inside Welcome 1 NCCIC/ICS-CERT Introduction

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Department of Homeland Security Science & Technology

Department of Homeland Security Science & Technology Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T

More information

Smart Systems, Resilient Regions

Smart Systems, Resilient Regions Smart Systems, Resilient Regions Tuesday, May 20, 2014 #smartsystems Wi-Fi: MPC Guest Password: mpcwireless metroplanning.org @metroplanners Siemens Building Technologies Division MATTHIAS REBELLIUS metroplanning.org

More information

Vulnerability Disclosure

Vulnerability Disclosure Vulnerability Disclosure Rita Wells National SCADA Test Bed DoE-OE September 09, 2008 Department of Energy-Office of Electricity Delivery and Energy Reliability: National SCADA Test Bed Program Mission

More information

Disaster Management (DM) Program Overview

Disaster Management (DM) Program Overview Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Strategies for Maritime Cyber Security Leveraging the Other Modes

Strategies for Maritime Cyber Security Leveraging the Other Modes Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems

More information

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, 2017 14TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS 1 Fact vs. Myth Let s Play: Fact vs. Myth The FDA is the federal entity

More information

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection

H2020 Opportunities in the Area of Security and Critical Infrastructure Protection H2020 Opportunities in the Area of Security and Critical Infrastructure Protection Angelo MARINO Head of Unit Security Research AIIC General Assembly Rome, 26/10/2013 NOT LEGALLY BINDING Outline The context:

More information

Cyber Hygiene: A Baseline Set of Practices

Cyber Hygiene: A Baseline Set of Practices [DISTRIBUTION STATEMENT A] Approved for public Cyber Hygiene: A Baseline Set of Practices Matt Trevors Charles M. Wallen Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Copyright

More information

IMPROVING NETWORK SECURITY

IMPROVING NETWORK SECURITY IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

Industrial Control Systems November 18, 2015

Industrial Control Systems November 18, 2015 Industrial Control Systems November 18, 2015 ABOUT SANS - TRAINING SANS provides intensive, hands-on, immersion training Highest quality 70+ courses covering basic security skills to cutting edge topics

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

January 19, 2009 January 26, 2009 February 2, 2009 February 9, 2009 February 16, Avg. Time on Site 00:02:46 Site Avg: 00:02:30 (10.

January 19, 2009 January 26, 2009 February 2, 2009 February 9, 2009 February 16, Avg. Time on Site 00:02:46 Site Avg: 00:02:30 (10. www.dataflurry.com Keywords Feb 11, 2009 - Feb 18, 2009 Comparing to: Site Visits 200 200 100 100 January 19, 2009 January 26, 2009 February 2, 2009 February 9, 2009 February 16, 2009 Search sent 935 total

More information

Emergency Response and Communication. Focus On Change 2017

Emergency Response and Communication. Focus On Change 2017 Emergency Response and Communication Focus On Change 2017 Common Acronyms F.A.C. AWWA ENSO FlaWARN ERP ESF R&R SEOC FEMA FDEP DEM GATOR Florida Administrative Code American Water Works Association El Nino

More information

The Corporate Security Review (CSR) Program September 11, 2008

The Corporate Security Review (CSR) Program September 11, 2008 The Corporate Security Review (CSR) Program September 11, 2008 Transportation Sector Network Management Highway and Motor Carrier Security Division Corporate Security Review Background Spring 2003 TSA

More information

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME Brian Michael Jenkins Research Associate Mineta Transportation Institute January 14, 2002 Contemporary

More information

Ministry of the Environment. Ministry of the Environment Emergency Management Program

Ministry of the Environment. Ministry of the Environment Emergency Management Program Ministry of the Environment Emergency Management Program Process Safety Loss Management Symposium October 18, 2005 Toronto Gary Zikovitz Emergency Management Program Coordinator Ministry of the Environment

More information

Public Power Forward Challenges & Opportunities

Public Power Forward Challenges & Opportunities Public Power Forward Challenges & Opportunities SUE KELLY President & CEO American Public Power Association 2015 ElectriCities of NC Annual Conference August 7, 2015 APPA Members 1400+ public power utilities

More information

Cybersecurity for Health Care Providers

Cybersecurity for Health Care Providers Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

DHS Science & Technology Directorate

DHS Science & Technology Directorate DHS Science & Technology Directorate Maritime Security Science &Technology, Trends and Challenges AAPA Port Security Seminar and Exposition Miami, FL July 19, 2012 Anh Duong Director Borders & Maritime

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

ACE Corporate Plan. Mission. Vision

ACE Corporate Plan. Mission. Vision ACE Corporate Plan 2017 2019 Mission ACE promotes the interests of over 450 UK consultancy and engineering companies delivering professional services in the natural and built environment employing over

More information

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI)

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI) icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 A Growing, Global Company Since 1969 Global professional, technology and marketing services

More information

MoCA Access: Multi-Gigabit & Beyond. Sponsored By

MoCA Access: Multi-Gigabit & Beyond. Sponsored By MoCA Access: Multi-Gigabit & Beyond Sponsored By Optimize your experience today Enable popups within your browser. Turn on your system s sound to hear the streaming presentation. Questions? Submit them

More information

DHS FEMA Region IX Response Operations

DHS FEMA Region IX Response Operations DHS FEMA Region IX Response Operations FEMA Region IX Jurisdictions RMI (USAID) 2300 miles CNMI 3700 miles Guam 3700 miles Region IX HQ Oakland, CA Arizona, California and Nevada NORTHCOM FSM (USAID) 2500-4200

More information

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

Homeland Security Graduate Programs

Homeland Security Graduate Programs Homeland Security Graduate Programs TA B L E O F C O N T E N T S Online Homeland Security Graduate Programs 3 Cyber Threat Analytics and Prevention 10 Homeland Security Base Program 4 5 Information Security

More information

Communications and Electric Power Sectors:

Communications and Electric Power Sectors: Communications and Electric Power Sectors: Need for Common Situation Awareness and Tools DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid October 25, 2010 Daniel C. Hurley, Jr. Director,

More information

Moving Data through Early Planning into Design and Operations

Moving Data through Early Planning into Design and Operations Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

UNCOMPRESSED UHD VIDEO STREAMING OVER MULTIPLE VIRTUAL PATHS DYNAMICALLY CONFIGURED BY OPENFLOW/SDN SWITCHES

UNCOMPRESSED UHD VIDEO STREAMING OVER MULTIPLE VIRTUAL PATHS DYNAMICALLY CONFIGURED BY OPENFLOW/SDN SWITCHES UNCOMPRESSED UHD VIDEO STREAMING OVER MULTIPLE VIRTUAL PATHS DYNAMICALLY CONFIGURED BY OPENFLOW/SDN SWITCHES Tatsuya Fujii, Julio Ibarra, Matt Zekauskas and Iara Machado NTT Network Innovation Labs, Florida

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS THE ROLE OF STATE AND LOCAL JURISDICTIONS IN IDENTIFYING AND PROTECTING CRITICAL INFRASTRUCTURE by Chris Christopoulos, Jr. December 2013 Thesis Co-Advisors:

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

APPAREL, FOOTWEAR, AND TEXTILE CENTER

APPAREL, FOOTWEAR, AND TEXTILE CENTER APPAREL, FOOTWEAR, AND TEXTILE CENTER WHAT CENTERS PROVIDE Account Based Processing 2 Single Point of Contact 3 Increased Industry Knowledge 4 Increased Industry Compliance 5 Uniformity 6 Transparency

More information

Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants.

Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants. National Association of Accessibility Consultants Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants. Membership The National

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

How to be cyber secure A practical guide for Australia s mid-size business

How to be cyber secure A practical guide for Australia s mid-size business How to be cyber secure A practical guide for Australia s mid-size business Introduction The digital age has bred opportunity for mid-size business. From ecommerce to social media, agile organisations have

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the

More information