U.S. Department of Homeland Security Protective Security Coordination Division

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "U.S. Department of Homeland Security Protective Security Coordination Division"

Transcription

1 U.S. Department of Homeland Security Protective Security Coordination Division Pete Owen, Protective Security Advisor Brief to CA-NV-AWWA March 31, 2010

2 Goal for this afternoon The National Infrastructure Protection Plan The Role of the Protective Security Coordination Division How we can help members of the CA-NV-AWWA 2

3 The National Infrastructure Protection Plan

4 HSPD-7, the National Infrastructure Protection Plan, and the Water Sector-Specific Plan 4

5 Critical Infrastructure and Key Resources Critical Infrastructure : Agriculture and Food Key Resources Commercial Facilities Commercial Nuclear Reactors, Materials, and Waste Dams Government Facilities Banking and Finance Chemical Critical Manufacturing Defense Industrial Base Water Emergency Services Energy Information Technology Nat l Monuments & Icons Postal and Shipping Public Health & Healthcare Telecommunications Transportation Systems 5

6 CI in the Water Sector Raw Water Supply, Storage & Transmission Water Treatment Facilities Treated Water Storage & Distribution Systems Treated Water Monitoring Systems & Distribution Control Centers Wastewater Treatment Facilities Dam Sector: Reservoir Dam Projects 6

7 Sector Partnership Model Critical infrastructure protection and resiliency are the shared responsibilities of Federal, State, local, tribal, and territorial governments, regional coalitions, and the owners and operators of the Nation s CIKR NIPP outlines their roles & responsibilities Also describes the information-sharing environment & communications

8 Example: Water Sector Lead Federal Agency: Environmental Protection Agency SCC: Water Sector Coordinating Council (WSCC) WSCC mission: To serve as a policy, strategy, and coordination mechanism and recommend actions to reduce and eliminate significant homeland security vulnerabilities to the water sector through interactions with the Federal government.

9 NIPP Risk Management Framework

10 Security Goals for the Water Sector Sustain protection of public health and the environment. Recognize and reduce risks. Maintain a resilient infrastructure. Increase communication, outreach, and public confidence.

11 The Role of the Protective Security Coordination Division

12 PSCD Programs Everything we do is voluntary Everything we do is free We do everything in partnership with state & local agencies Everything we collect is safeguarded PCII

13 PSCD Programs and Initiatives Office for Bombing Prevention (OBP) DHS lead for bombing prevention activities Seeks to reduce the Nation s risk to terrorist bombing attacks Vulnerability Assessments Branch (VAB) Conducts vulnerability assessments in partnership with Federal, State, local, and private sector security partners to prevent, deter, and mitigate the risk of a terrorist attack. Field Operations Branch (FOB) Protective Security Advisors (PSAs) in all 50 States and 1 Territory

14 DHS Office of Bombing Prevention Coordinates national efforts Analyzes IED incidents worldwide Analyzes counter-ied requirements and capabilities Promotes information sharing and IED awareness and vigilance TRIPWire

15 Bomb-Making Material Awareness Program (BMAP) Developed in partnership with FBI Focus of DHS effort is training and equipping state and local law enforcement and fire fighters. Local officers conduct outreach to commercial retailers, service providers, and chemical distributors & wholesalers. Educates private sector on suspicious behavior, hazardous materials, precursor chemicals, and other bombmaking information.

16 DHS Vulnerability Assessments Buffer-Zone Protection Program Computer Based Assessment Tool + Site Assist Visit Regional Resiliency Assessment Enhanced Critical Infrastructure Protection visit Detail Man-hours

17 Protective Security Advisors (PSAs) PSA Locations Anchorage Seattle Bismarck Helena Portland Minneapolis Portland Williston Pierre Manchester Boise Milwaukee Buffalo Cheyenne Omaha Des Moines Boston Detroit Grand Rapids Albany Chicago Cleveland Pittsburgh Harrisburg Salt Lake City Denver Springfield Indianapolis Sacramento Topeka Kansas City St. Louis Northeast Philadelphia Cincinnati Dover Louisville Baltimore Washington, D.C. Charlestown San Francisco Richmond Norfolk Nashville Las Vegas Albuquerque Raleigh Memphis Oklahoma City Little Rock Los Angeles Phoenix Birmingham San Diego Atlanta Mid-Atlantic Columbia Jackson El Paso Denton Dallas Mobile Baton Rouge Houston New Orleans Tallahassee San Antonio Honolulu Gulf Coast Guam Texas Tampa Florida New Haven Newark New York City Providence U.S. Virgin Islands Miami San Juan

18 PSAs Who we are Link to DHS infrastructure protection resources Risk assessment Information sharing Incident support 18

19 Who We Are Not Grant administrators Regulators or inspectors Law enforcement 19

20 How We Assess Risk Risk is a function of Consequences Vulnerability & Threat DHS and our state partners: Identify and prioritize CIKR according to consequences Perform detailed vulnerability assessments of CIKR Assess threats 20

21 How We Share Information Push intelligence & best practices to our local partners Conduct intelligence analysis Regionally at the fusion center Reach-back to DHS Participate in hazard mitigation planning Provide local context to DHS Coordinate security training and exercises 21

22 Critical Infrastructure Information Act of 2002 Protects PCII from The Freedom of Information Act (FOIA), State and local disclosure laws, and Use in civil litigation PCII cannot be used for regulatory purposes PCII can only be accessed in accordance with strict safeguarding and handling requirements 22

23 What PSAs do as the Infrastructure Liaison during an incident or special event Conduct liaison for CIKR between DHS, state & local agencies + the private sector at the field level. Recommend CIKR priorities to the Unified Coordination Group. Provides situational awareness on CIKR to the incident managers. Support prioritization of response and restoration efforts. Leverage private-sector relationships to support response and recovery efforts. 23

24 How we can help members of the CA-NV-AWWA

25 Assessing Risk: Infrastructure Surveys aka Enhanced Critical Infrastructure Protection (ECIP) Helps DHS build the national risk picture Provides comparison to similar facilities Based on consistent, objective criteria

26 Vulnerability Dashboard Facility and Sector Protective Measures Index Physical Security Overall Random Security Measures

27 Assessing Risk: Buffer Zone Protection Program (BZPP) An infrastructure protection grant program targeted to first responders. Builds terrorism prevention and protection capabilities through planning and equipment acquisition by local law enforcement and first responders. Develops protective measures that make it more difficult for terrorists to conduct surveillance or launch attacks from the immediate vicinity of CIKR.

28 Assessing Risk: Site Assistance Visits (SAVs) Conducted with federal, state, and local government agencies, and CIKR owners/ operators. Identifies CIKR dependencies, interdependencies, resiliency characteristics, and regional capability gaps. Increases owner/operator awareness of vulnerabilities and provides options for enhancing protective measures. Provides detailed reports to private sector partners used to make security enhancements.

29 Assessing Risk: Automated Critical Asset Management System (ACAMS) Originally developed by LAPD as Archangel Now administered and funded by DHS Conducted by state in partnership with fusion centers and local law enforcement Not all states & local agencies use this Facilitates emergency planning + response Helps assess consequence + vulnerability

30 Cyber Assessments Cyber Security Evaluation Tool (CSET) A desktop software tool For both control systems and business/enterprise systems Guides the user through a step-bystep process Assesses cyber systems and network security practices against recognized industry standards Cyber Resiliency Review A technical assist visit Assesses key process areas of cyber security management Facilitated Q&A that identifies and substantiates cyber security performance To learn more: or

31 Information Sharing Resources HSIN TRIPwire Infragard Best practices Training

32 Homeland Security Information Network Secure and trusted web-based platform Sensitive But Unclassified (SBU) information Used by federal, state, local, tribal, private sector Request membership via to or

33 TRIPWire (Technical Resource for Incident Prevention) Secure, online information-sharing network Current terrorist bombing tactics, techniques, and procedures, including improvised explosive device (IED) design and emplacement. Access through HSIN Critical Sectors Community Portal

34 Infragard A partnership between the FBI and the private sector. An association of businesses, academic institutions, state and local law enforcement agencies, and others Dedicated to sharing information and intelligence to prevent hostile acts against the United States

35 Sharing Best Practices Common Vulnerabilities Potential Indicators of Terrorist Activity Protective Measures Active Shooter material Bombing prevention material All available on TRIPwire

36 Training Resources Surveillance Detection 3-day course Developing, applying, & employing surveillance detection protective measures Developing a surveillance detection plan Protective Measures 2-day course Provide executives & employees with the knowledge to identify vulnerabilities & select appropriate protective measures for their facility 36

37 The Department of Homeland Security Control Systems Security Program is offering a one-day introductory training course covering control systems cybersecurity challenges facing the nation s critical infrastructure. The course discusses the importance of securing control systems, how cyber attacks can be launched, and concepts for implementing mitigation strategies. Participants will also gain an understanding of how to start improving the cyber security posture of their control system networks. Specific topics will include: Protecting control systems from cyber attacks and why they are susceptible Risks and potential consequences of cyber attacks Common vulnerabilities in industrial control systems System exposures to attacks, various attack scenarios, and associate mitigation strategies Control System Security Program products and services available to asset owners. When: May 5, :00 a.m. to 5:00 p.m. Training Course Introduction to Industrial Control Systems Cybersecurity Where: Saddleback Church, 1 Saddleback Way, Lake Forest, CA Who may attend: Priority registration will be given to control system and IT professionals associated with operations of critical infrastructure assets in all sectors. Cost: The course is offered at no cost. Travel and accommodations are the responsibility of each participant. Registration: Contact Pete Owen, DHS Protective Security Advisor at May 5, 2010

38 Questions? Brian Keith Los Angeles CA Donald Ray Los Angeles CA Frank Calvillo Sacramento CA Peter Owen San Diego CA Richard Sierze San Francisco CA Richard Stribling San Francisco CA Gonzalo Cordova Las Vegas NV

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

Weapons of Mass Destruction Directorate Federal Bureau of Investigation

Weapons of Mass Destruction Directorate Federal Bureau of Investigation Methodologies to address a WMD threat 6th Annual International Symposium Biosecurity and Biosafety: future trends and solutions Milan, Italy 4-6 November 2015 Weapons of Mass Destruction Directorate Federal

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Florida Reliability Coordinating Council (FRCC) Critical Infrastructure Protection (CIP)

More information

Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107

Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107 Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107 On December 1 st, Councilmember Head introduced Ordinance #32,107, a 22 page ordinance

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2012 What s Inside Welcome 1 Organization 3 Outreach 4 Industrial Control Systems Joint Working Group 5 Advanced Analytical

More information

All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011

All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 Copyright 2009 American Water Works Association Copyright 2011 American Water Works Association Security

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

The J100 RAMCAP Method

The J100 RAMCAP Method The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

IBM ServicePac Warranty Service Upgrade (WSU)

IBM ServicePac Warranty Service Upgrade (WSU) IBM Maintenance Services ServicePac for Warranty and Maintenance Options IBM ServicePac Warranty Service Upgrade (WSU) Supported Products January 24, 2012 IBM ServicePac Warranty Service Upgrade Post-warranty

More information

Critical Infrastructure Resilience

Critical Infrastructure Resilience Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the

More information

National Cyber Incident Response - Architectural Concepts

National Cyber Incident Response - Architectural Concepts CSIRT Contributions to National Cyber Incident Response: An Architectural Perspective with U.S. Examples Bradford J. Willke Team Lead, Information Security Assessment & Evaluation Survivable Enterprise

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

DHS Emergency Services Sector Presents Tools and Resources for First Responders. June 1, pm ET

DHS Emergency Services Sector Presents Tools and Resources for First Responders. June 1, pm ET DHS Emergency Services Sector Presents Tools and Resources for First Responders June 1, 2017 1-2 pm ET Agenda Introduction Overview of the NISC Emergency Services Sector (ESS) Resources and Tools for Emergency

More information

The Confluence of Physical and Cyber Security Management

The Confluence of Physical and Cyber Security Management The Confluence of Physical and Cyber Security Management GOVSEC 2009 Samuel A Merrell, CISSP James F. Stevens, CISSP 2009 Carnegie Mellon University Today s Agenda: Introduction Risk Management Concepts

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships. Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships May 17, 2016 Overview Regional Overview Project Overview Background and

More information

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014 2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating

More information

Critical Infrastructure Assessment

Critical Infrastructure Assessment Critical Infrastructure Assessment Everyday the products and services that support our standard of living flow, almost seamlessly, to and from our homes, communities, and government. Making this possible

More information

Increase uptime with a faster, more reliable, connection

Increase uptime with a faster, more reliable, connection FIXED WIRELESS SELLING GUIDE Key takeaways It s survivable: you ll see improved uptime and redundancy Increase uptime with a faster, more reliable, connection It s cost-efficient: you can specify, and

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Federal Information Sharing Resources for Small and Midsize Businesses

Federal Information Sharing Resources for Small and Midsize Businesses Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

Secure Destruction Service Overview and Update. Mailer Participation and Enrollment Requirements

Secure Destruction Service Overview and Update. Mailer Participation and Enrollment Requirements 1 Agenda Secure Destruction Service Overview and Update Mailer Participation and Enrollment Requirements Next Steps 2 Each year USPS returns over 1.2 billion pieces of Undeliverable-As- Addressed (UAA)

More information

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE SAFER CITIES. THRIVING COMMUNITIES. Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation s security and stability. 16

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

Chapter 1. Chapter 2. Chapter 3

Chapter 1. Chapter 2. Chapter 3 Contents Preface ix Chapter 1 Terrorism 1 Terrorism in General 2 Definition of Terrorism 3 Why Choose Terrorism 4 Goals of Terrorists 5 Selection of Targets and Timing of Attacks 6 Perpetrators 7 Weapons

More information

Updates to the NIST Cybersecurity Framework

Updates to the NIST Cybersecurity Framework Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

How to Order and Use Penalty Mail Stamps and Stationery

How to Order and Use Penalty Mail Stamps and Stationery How to Order and Use Penalty Mail Stamps and Stationery Publication 350 Transmittal Letter 3 A. Explanation. This publication provides procedures for U.S. Government agencies to requisition and use penalty

More information

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating

More information

2018 National Homeland Security Conference Preliminary Conference Agenda

2018 National Homeland Security Conference Preliminary Conference Agenda The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Washington State: Energy Sector Specific Plan for CIP Letter of Concurrence

Washington State: Energy Sector Specific Plan for CIP Letter of Concurrence Letter of Concurrence The following statement is from a Letter of Concurrence from the Chairs of the national Energy Sector Coordinating Councils including: The national Government Coordinating Council,

More information

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center OVERALL RESULTS E-Crime Watch Survey: 2005 Field Dates: 3/3/05 3/14/05 Total completed surveys: 819 Margin of Error: +/- 3.4% NOTE TO EDITOR For the purpose of this survey, electronic crime, intrusion,

More information

GIS Projects at the National Incident Management Systems and Advanced Technologies (NIMSAT) Institute

GIS Projects at the National Incident Management Systems and Advanced Technologies (NIMSAT) Institute 25 th Annual Louisiana Remote Sensing and GIS Workshop GIS Projects at the National Incident Management Systems and Advanced Technologies (NIMSAT) Institute N. Raju Gottumukkala, Ph.D. Rusti Liner, M.S.

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY 2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Professional in Critical Infrastructure Protection

Professional in Critical Infrastructure Protection Professional in Critical Infrastructure Protection The world is rapidly changing. Our critical infrastructure is at risk on many fronts. Key services that were once taken for granted are now being affected

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer

Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer Joseph L. Smith, PSP Director / Senior Vice President Kenneth W. Herrle, P.E., CPP, PMP Senior Engineer Applied Research Associates, Inc. www.ara.com 601-638-5401 Architectural Graphic Standards 12 th

More information

Atron Service Level Agreement

Atron Service Level Agreement Atron Solutions LLC. Service Level Agreement (SLA) I. Overview This SLA will be governed by Atron standard Master Service Agreement (MSA). The MSA is posted under the Terms and Conditions link at www.atronsolutions.com/msa.pdf.

More information

Critical Infrastructure Protection (CIP)

Critical Infrastructure Protection (CIP) Critical Infrastructure Protection (CIP) John Hoyt Department of Homeland Security Science and Technology (S&T) Directorate john.hoyt@dhs.gov (202) 401-3467 September 11, 2003 The Nation s Infrastructure

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN:

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN: 2014-2017 Her Majesty the Queen in Right of Canada, 2014 Cat. No.: PS4-66/2014E-PDF ISBN: 978-1-100-23291-1 ii Table of contents 1. Introduction....3 What we have learned and what has changed...3 2. A

More information

Network Progress. Steve Cotter Rob Vietzke Network Services FMM 2006 / Chicago

Network Progress. Steve Cotter Rob Vietzke Network Services FMM 2006 / Chicago Network Progress Steve Cotter Rob Vietzke Network Services FMM 2006 / Chicago Outline The Community Design Workshop Follow-on Calls with Connectors Network Planning & Design Phase Network Build Phase Outline

More information

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework From the Trenches: Lessons learned from using the NIST Cybersecurity Framework Greg Witte Sr. Cybersecurity Engineer G2, Inc. Greg.Witte@G2-inc.com Tom Conkle Cybersecurity Engineer G2, Inc. Tom.Conkle@G2-inc.com

More information

ICS-CERT Year in Review

ICS-CERT Year in Review ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2014 National Cybersecurity and Communications Integration Center What s Inside Welcome 1 ICS-CERT Introduction 2 ICS-CERT

More information

The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing

The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing Analysis Center DIB ISAC December 18, 2014 Why ISACs?

More information

Active and Effective Water Security Programs. Be Informed Be Alert Be Ready

Active and Effective Water Security Programs. Be Informed Be Alert Be Ready Active and Effective Water Security Programs A Summary Report of the National Drinking Water Advisory Council Recommendations on Water Security Be Informed Be Alert Be Ready Offi ce of Water (4601M) EPA

More information

Technology Advances in FEMA Response and Recovery to Disasters

Technology Advances in FEMA Response and Recovery to Disasters Technology Advances in FEMA Response and Recovery to Disasters Homeland Security in Action: Air * Space * Maritime Conference and Showcase Robert J. Fenton, Jr. Director, Disaster Assistance Division Acting

More information

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials + NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National

More information

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of

More information

RESILIENT UTILITY COALITION OF SOUTH FLORIDA

RESILIENT UTILITY COALITION OF SOUTH FLORIDA RESILIENT UTILITY COALITION OF SOUTH FLORIDA RUC MISSION The Resilient Utility Coalition seeks to advance utility infrastructure resiliency efforts in South Florida and provide essential value to its members

More information

Terrorism Prevention. April 13, 2011 Michael J. McMullen Program Manager

Terrorism Prevention. April 13, 2011 Michael J. McMullen Program Manager Terrorism Prevention Exercise Program (TPEP) Training & Exercise Conference April 13, 2011 Michael J. McMullen Program Manager Agenda Mission TPEP and Baseline Capabilities Current Offerings TPEP Service

More information

Dams Sector Cybersecurity Program Guidance

Dams Sector Cybersecurity Program Guidance Dams Sector Cybersecurity Program Guidance 2016 Acknowledgments This document was developed with input, advice, and assistance from the Dams Sector Cybersecurity Working Group and council members of the

More information

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE

Countermeasures Assessment & Security Experts, LLC. 110 Quigley Boulevard Airport Park New Castle, DE Countermeasures Assessment & Security Experts, LLC 110 Quigley Boulevard Airport Park New Castle, DE 19720 302-322-9600 9/9/2010 1 20-59(28) IS AN INTRODUCTORY REFERENCE DOCUMENT 2 3 CHAPTER 1: FIGURE

More information

GridEx IV Initial Lessons Learned and Resilience Initiatives

GridEx IV Initial Lessons Learned and Resilience Initiatives GridEx IV Initial Lessons Learned and Resilience Initiatives LeRoy T. Bunyon, MBA, CBCP Sr. Lead Analyst, Business Continuity 2017 GridEx IV GridEx is a NERC-sponsored, North American grid resilience exercise

More information

Monthly Cyber Threat Briefing

Monthly Cyber Threat Briefing Monthly Cyber Threat Briefing January 2016 1 Presenters David Link, PM Risk and Vulnerability Assessments, NCATS Ed Cabrera: VP Cybersecurity Strategy, Trend Micro Jason Trost: VP Threat Research, ThreatStream

More information

Resiliency and the Need for Re-Thinking our Water Infrastructure. Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015

Resiliency and the Need for Re-Thinking our Water Infrastructure. Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015 Resiliency and the Need for Re-Thinking our Water Infrastructure Andrew Bielanski U.S. Environmental Protection Agency June 25, 2015 Presentation Goals & Focus Define What is Meant by Resiliency Explain

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defense, and public safety agencies face challenges and threats that

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au

More information

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express

Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express SOLUTION WHITE PAPER Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express www.earthlink.com November 2015 Private connections

More information

Events Oracle Arena & McAfee Coliseum

Events Oracle Arena & McAfee Coliseum MARCH 2 Golden State vs. Portland Trail Blazers Oracle Arena 5-9 Disney on Ice-Princess Wishes Oracle Arena 12 Golden State vs. Toronto Raptors Oracle Arena 15 Golden State vs. Memphis Grizzlies McAfee

More information

Municipal Networks. Don Berryman. Executive Vice President & President, Municipal Networks

Municipal Networks. Don Berryman. Executive Vice President & President, Municipal Networks Municipal Networks Don Berryman Executive Vice President & President, Municipal Networks 1 Executive Summary EarthLink is the leader in this fast growing market Most feasible last mile technology Product

More information

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS)

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) U.S. Department of Homeland Security Information Sharing and Services Office (IS 2 O) Office of the Chief Information Officer

More information

Energy Audits Municipal and Commercial Buildings. Cities that routinely conduct energy audits for municipal buildings and operations.

Energy Audits Municipal and Commercial Buildings. Cities that routinely conduct energy audits for municipal buildings and operations. Energy Audits Municipal and Commercial Buildings Cities that routinely conduct energy audits for municipal buildings and operations. Large Cities Austin 949,587 Los Angeles 4,030,904 Portland 639,863 San

More information

MassMutual Business Continuity Disclosure Statement

MassMutual Business Continuity Disclosure Statement MassMutual Business Continuity Disclosure Statement Overview Resiliency is a high priority at Massachusetts Mutual Life Insurance Company ( MassMutual or the Company ). To that end, significant investments

More information

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity

More information

Statement for the Record. Rand Beers Under Secretary National Protection and Programs Directorate Department of Homeland Security

Statement for the Record. Rand Beers Under Secretary National Protection and Programs Directorate Department of Homeland Security Statement for the Record Rand Beers Under Secretary National Protection and Programs Directorate Department of Homeland Security Before the Committee on Homeland Security Subcommittee on Cybersecurity,

More information

DOE s Roles and Responsibilities for Energy Sector Cybersecurity

DOE s Roles and Responsibilities for Energy Sector Cybersecurity Written Testimony of Under Secretary Mark Menezes U.S. Department of Energy Before the Subcommittee on Energy Committee on Energy and Commerce U.S. House of Representatives March 14, 2018 Introduction

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department

More information

2018 National Homeland Security Conference Preliminary Conference Agenda

2018 National Homeland Security Conference Preliminary Conference Agenda The National Homeland Security Association is proud to announce the following agenda of the National Homeland Security Conference. This Conference continues to be the premiere comprehensive homeland security

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Grid Security & NERC

Grid Security & NERC Grid Security & NERC Janet Sena, Senior Vice President, Policy and External Affairs Southern States Energy Board 2017 Associate Members Winter Meeting February 27, 2017 Recent NERC History Energy Policy

More information

Contents. 2 postal bulletin (6-4-09) Contents

Contents. 2 postal bulletin (6-4-09) Contents Front Cover 2 postal bulletin 22260 (6-4-09) Contents Contents POLICIES, PROCEDURES, AND FORMS UPDATES Manuals DMM Revision: Changes to the Requirements for Mailing Cigarette Lighters..........................

More information

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) ) ) COMMENTS OF THE LARGE PUBLIC POWER COUNCIL

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) ) ) COMMENTS OF THE LARGE PUBLIC POWER COUNCIL UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION Cyber Security Incident Reporting Reliability Standards ) ) ) Docket Nos. RM18-2-000 AD17-9-000 COMMENTS OF THE LARGE PUBLIC POWER

More information

Disaster Acronyms and Glossary

Disaster Acronyms and Glossary ACE Area Coordination Exercises Disaster Acronyms and Glossary ASTM (ASTM Standard 2413) ASTM is an international organization that establishes standards and norms. Standard 2413 is a guide for standard

More information

ACR 2 Solutions Compliance Tools

ACR 2 Solutions Compliance Tools ACR 2 Solutions Compliance Tools What s all the noise about the Cyber Security Framework? The Cyber Security Framework Airs Conference May 2017 About ACR 2 Solutions your NIST experts ACR2 is a developer

More information

Infrastructure Interdependencies Tabletop Exercise BLUE CASCADES. Final Report. Executive Summary

Infrastructure Interdependencies Tabletop Exercise BLUE CASCADES. Final Report. Executive Summary Infrastructure Interdependencies Tabletop Exercise BLUE CASCADES Held June 12, 2002 in Welches, OR Final Report Executive Summary July 17, 2002 BLUE CASCADES Infrastructure Interdependencies Exercise Final

More information

U.S. Chemical Sector Cyber Security Strategy Edition. Chemical Sector Cyber Security Program

U.S. Chemical Sector Cyber Security Strategy Edition. Chemical Sector Cyber Security Program Strategy Document U.S. Chemical Sector Cyber Security Strategy 2006 Edition Chemical Sector Cyber Security Program Prepared by the Chemical Sector Cyber Security Program Steering Team September 2006 U.S.

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

Global Security Operation Center GSOC

Global Security Operation Center GSOC Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity May 2017 cyberframework@nist.gov Why Cybersecurity Framework? Cybersecurity Framework Uses Identify mission or business cybersecurity dependencies

More information