U.S. Department of Homeland Security Protective Security Coordination Division
|
|
- Buck Newman
- 6 years ago
- Views:
Transcription
1 U.S. Department of Homeland Security Protective Security Coordination Division Pete Owen, Protective Security Advisor Brief to CA-NV-AWWA March 31, 2010
2 Goal for this afternoon The National Infrastructure Protection Plan The Role of the Protective Security Coordination Division How we can help members of the CA-NV-AWWA 2
3 The National Infrastructure Protection Plan
4 HSPD-7, the National Infrastructure Protection Plan, and the Water Sector-Specific Plan 4
5 Critical Infrastructure and Key Resources Critical Infrastructure : Agriculture and Food Key Resources Commercial Facilities Commercial Nuclear Reactors, Materials, and Waste Dams Government Facilities Banking and Finance Chemical Critical Manufacturing Defense Industrial Base Water Emergency Services Energy Information Technology Nat l Monuments & Icons Postal and Shipping Public Health & Healthcare Telecommunications Transportation Systems 5
6 CI in the Water Sector Raw Water Supply, Storage & Transmission Water Treatment Facilities Treated Water Storage & Distribution Systems Treated Water Monitoring Systems & Distribution Control Centers Wastewater Treatment Facilities Dam Sector: Reservoir Dam Projects 6
7 Sector Partnership Model Critical infrastructure protection and resiliency are the shared responsibilities of Federal, State, local, tribal, and territorial governments, regional coalitions, and the owners and operators of the Nation s CIKR NIPP outlines their roles & responsibilities Also describes the information-sharing environment & communications
8 Example: Water Sector Lead Federal Agency: Environmental Protection Agency SCC: Water Sector Coordinating Council (WSCC) WSCC mission: To serve as a policy, strategy, and coordination mechanism and recommend actions to reduce and eliminate significant homeland security vulnerabilities to the water sector through interactions with the Federal government.
9 NIPP Risk Management Framework
10 Security Goals for the Water Sector Sustain protection of public health and the environment. Recognize and reduce risks. Maintain a resilient infrastructure. Increase communication, outreach, and public confidence.
11 The Role of the Protective Security Coordination Division
12 PSCD Programs Everything we do is voluntary Everything we do is free We do everything in partnership with state & local agencies Everything we collect is safeguarded PCII
13 PSCD Programs and Initiatives Office for Bombing Prevention (OBP) DHS lead for bombing prevention activities Seeks to reduce the Nation s risk to terrorist bombing attacks Vulnerability Assessments Branch (VAB) Conducts vulnerability assessments in partnership with Federal, State, local, and private sector security partners to prevent, deter, and mitigate the risk of a terrorist attack. Field Operations Branch (FOB) Protective Security Advisors (PSAs) in all 50 States and 1 Territory
14 DHS Office of Bombing Prevention Coordinates national efforts Analyzes IED incidents worldwide Analyzes counter-ied requirements and capabilities Promotes information sharing and IED awareness and vigilance TRIPWire
15 Bomb-Making Material Awareness Program (BMAP) Developed in partnership with FBI Focus of DHS effort is training and equipping state and local law enforcement and fire fighters. Local officers conduct outreach to commercial retailers, service providers, and chemical distributors & wholesalers. Educates private sector on suspicious behavior, hazardous materials, precursor chemicals, and other bombmaking information.
16 DHS Vulnerability Assessments Buffer-Zone Protection Program Computer Based Assessment Tool + Site Assist Visit Regional Resiliency Assessment Enhanced Critical Infrastructure Protection visit Detail Man-hours
17 Protective Security Advisors (PSAs) PSA Locations Anchorage Seattle Bismarck Helena Portland Minneapolis Portland Williston Pierre Manchester Boise Milwaukee Buffalo Cheyenne Omaha Des Moines Boston Detroit Grand Rapids Albany Chicago Cleveland Pittsburgh Harrisburg Salt Lake City Denver Springfield Indianapolis Sacramento Topeka Kansas City St. Louis Northeast Philadelphia Cincinnati Dover Louisville Baltimore Washington, D.C. Charlestown San Francisco Richmond Norfolk Nashville Las Vegas Albuquerque Raleigh Memphis Oklahoma City Little Rock Los Angeles Phoenix Birmingham San Diego Atlanta Mid-Atlantic Columbia Jackson El Paso Denton Dallas Mobile Baton Rouge Houston New Orleans Tallahassee San Antonio Honolulu Gulf Coast Guam Texas Tampa Florida New Haven Newark New York City Providence U.S. Virgin Islands Miami San Juan
18 PSAs Who we are Link to DHS infrastructure protection resources Risk assessment Information sharing Incident support 18
19 Who We Are Not Grant administrators Regulators or inspectors Law enforcement 19
20 How We Assess Risk Risk is a function of Consequences Vulnerability & Threat DHS and our state partners: Identify and prioritize CIKR according to consequences Perform detailed vulnerability assessments of CIKR Assess threats 20
21 How We Share Information Push intelligence & best practices to our local partners Conduct intelligence analysis Regionally at the fusion center Reach-back to DHS Participate in hazard mitigation planning Provide local context to DHS Coordinate security training and exercises 21
22 Critical Infrastructure Information Act of 2002 Protects PCII from The Freedom of Information Act (FOIA), State and local disclosure laws, and Use in civil litigation PCII cannot be used for regulatory purposes PCII can only be accessed in accordance with strict safeguarding and handling requirements 22
23 What PSAs do as the Infrastructure Liaison during an incident or special event Conduct liaison for CIKR between DHS, state & local agencies + the private sector at the field level. Recommend CIKR priorities to the Unified Coordination Group. Provides situational awareness on CIKR to the incident managers. Support prioritization of response and restoration efforts. Leverage private-sector relationships to support response and recovery efforts. 23
24 How we can help members of the CA-NV-AWWA
25 Assessing Risk: Infrastructure Surveys aka Enhanced Critical Infrastructure Protection (ECIP) Helps DHS build the national risk picture Provides comparison to similar facilities Based on consistent, objective criteria
26 Vulnerability Dashboard Facility and Sector Protective Measures Index Physical Security Overall Random Security Measures
27 Assessing Risk: Buffer Zone Protection Program (BZPP) An infrastructure protection grant program targeted to first responders. Builds terrorism prevention and protection capabilities through planning and equipment acquisition by local law enforcement and first responders. Develops protective measures that make it more difficult for terrorists to conduct surveillance or launch attacks from the immediate vicinity of CIKR.
28 Assessing Risk: Site Assistance Visits (SAVs) Conducted with federal, state, and local government agencies, and CIKR owners/ operators. Identifies CIKR dependencies, interdependencies, resiliency characteristics, and regional capability gaps. Increases owner/operator awareness of vulnerabilities and provides options for enhancing protective measures. Provides detailed reports to private sector partners used to make security enhancements.
29 Assessing Risk: Automated Critical Asset Management System (ACAMS) Originally developed by LAPD as Archangel Now administered and funded by DHS Conducted by state in partnership with fusion centers and local law enforcement Not all states & local agencies use this Facilitates emergency planning + response Helps assess consequence + vulnerability
30 Cyber Assessments Cyber Security Evaluation Tool (CSET) A desktop software tool For both control systems and business/enterprise systems Guides the user through a step-bystep process Assesses cyber systems and network security practices against recognized industry standards Cyber Resiliency Review A technical assist visit Assesses key process areas of cyber security management Facilitated Q&A that identifies and substantiates cyber security performance To learn more: CSET@dhs.gov or
31 Information Sharing Resources HSIN TRIPwire Infragard Best practices Training
32 Homeland Security Information Network Secure and trusted web-based platform Sensitive But Unclassified (SBU) information Used by federal, state, local, tribal, private sector Request membership via to or
33 TRIPWire (Technical Resource for Incident Prevention) Secure, online information-sharing network Current terrorist bombing tactics, techniques, and procedures, including improvised explosive device (IED) design and emplacement. Access through HSIN Critical Sectors Community Portal
34 Infragard A partnership between the FBI and the private sector. An association of businesses, academic institutions, state and local law enforcement agencies, and others Dedicated to sharing information and intelligence to prevent hostile acts against the United States
35 Sharing Best Practices Common Vulnerabilities Potential Indicators of Terrorist Activity Protective Measures Active Shooter material Bombing prevention material All available on TRIPwire
36 Training Resources Surveillance Detection 3-day course Developing, applying, & employing surveillance detection protective measures Developing a surveillance detection plan Protective Measures 2-day course Provide executives & employees with the knowledge to identify vulnerabilities & select appropriate protective measures for their facility 36
37 The Department of Homeland Security Control Systems Security Program is offering a one-day introductory training course covering control systems cybersecurity challenges facing the nation s critical infrastructure. The course discusses the importance of securing control systems, how cyber attacks can be launched, and concepts for implementing mitigation strategies. Participants will also gain an understanding of how to start improving the cyber security posture of their control system networks. Specific topics will include: Protecting control systems from cyber attacks and why they are susceptible Risks and potential consequences of cyber attacks Common vulnerabilities in industrial control systems System exposures to attacks, various attack scenarios, and associate mitigation strategies Control System Security Program products and services available to asset owners. When: May 5, :00 a.m. to 5:00 p.m. Training Course Introduction to Industrial Control Systems Cybersecurity Where: Saddleback Church, 1 Saddleback Way, Lake Forest, CA Who may attend: Priority registration will be given to control system and IT professionals associated with operations of critical infrastructure assets in all sectors. Cost: The course is offered at no cost. Travel and accommodations are the responsibility of each participant. Registration: Contact Pete Owen, DHS Protective Security Advisor at peter.owen@dhs.gov. May 5, 2010
38 Questions? Brian Keith Los Angeles CA Donald Ray Los Angeles CA Frank Calvillo Sacramento CA Peter Owen San Diego CA Richard Sierze San Francisco CA Richard Stribling San Francisco CA Gonzalo Cordova Las Vegas NV
Office of Infrastructure Protection Overview
Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationJune 5, 2018 Independence, Ohio
June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga
More informationWeapons of Mass Destruction Directorate Federal Bureau of Investigation
Methodologies to address a WMD threat 6th Annual International Symposium Biosecurity and Biosafety: future trends and solutions Milan, Italy 4-6 November 2015 Weapons of Mass Destruction Directorate Federal
More informationHOMELAND SECURITY INFORMATION NETWORK. Information Analysis and Infrastructure Protection (IAIP)
HOMELAND SECURITY INFORMATION NETWORK Information Analysis and Infrastructure Protection (IAIP) September 27, 2004 Information Sharing & Collaboration Secretary Ridge is enlisting the support of the entire
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationReview of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107
Review of Alcoholic Beverage Outlet Camera Requirements in 50 Largest U.S. Cities and Comparison to Ordinance #32,107 On December 1 st, Councilmember Head introduced Ordinance #32,107, a 22 page ordinance
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationApril 2009 Unclassified // For Official Use Only
Protective Security Advisor Analyst April 2009 Mission Office of Infrastructure Protection (IP): Lead the coordinated national effort to reduce the risk to our critical infrastructures and key resources
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationFood and Agriculture Sector Criticality Assessment
Food and Agriculture Sector Criticality Assessment William Krueger Food and Agriculture Sector Specialist DHS - Office of Infrastructure Protection Partnerships and Outreach Division & Research Fellow
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationRegion Snapshot Regions I and II
STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Regions I and II The
More informationFree or Reduced Air from Select Gateways for 1st & 2nd guest on reservation
UPDATED AS OF OCTOBER 9, 2018 Free or Reduced Air from Select Gateways for 1st & 2nd guest on reservation Booking Window: 10/3/18-10/31/18 11:59pm EST Offer Valid on Select Sailings & Categories See Terms
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team
ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2012 What s Inside Welcome 1 Organization 3 Outreach 4 Industrial Control Systems Joint Working Group 5 Advanced Analytical
More informationRegion Snapshot Region IV
STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region IV The State,
More informationSouth Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises
STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region VIII The State,
More informationEnergy Assurance Plans
Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationAll-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011
All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 Copyright 2009 American Water Works Association Copyright 2011 American Water Works Association Security
More informationThe J100 RAMCAP Method
The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationCONNECTING NETWORKS, CONNECTING PEOPLE
SOLUTIONS PORTFOLIO CONNECTING NETWORKS, CONNECTING PEOPLE At PAETEC, we believe technology should bring people together. Whether you re connecting via copper, fiber, or wireless, it s all communications.
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationDepartment of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Protective Security Advisor Program Efforts to Build Effective Critical Infrastructure Partnerships: OIG-11-12 November 2010 Office ofillspector
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Mystic REPC October 23, 2018 The
More informationNeeds and Challenges Funding assistance Training Partnership capabilities and sustainment. Implement Risk Management
STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region III The State,
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Hometown Security Overview Minnesota Festivals and Events Association 5 November, 018
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationCritical Infrastructure Resilience
Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationDepartment of Homeland Security Customs and Border Protection. Center of Excellence and Expertise
Department of Homeland Security Customs and Border Protection Centers Pharmaceuticals, of Excellence Health and and Chemicals Expertise Center of Excellence and Expertise 1 2 What are Centers of Excellence
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationIntelligence Support to Critical Infrastructure Protection Table of Contents
Intelligence Support to Critical Infrastructure Protection Table of Contents Purpose and Overview... 2 Introduction... 2 Defining Critical Infrastructure... 5 Identifying the Decisions Makers... 8 Critical
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationDHS Supply Chain Activity: Cross-Sector Supply Chain Working Group and Strategy on Global Supply Chain Security
DHS Supply Chain Activity: Cross-Sector Supply Chain Working Group and Strategy on Global Supply Chain Security Josha Jordan U.S. Department of Homeland Security National Protection and Programs Directorate
More informationModeling Internet Application Traffic for Network Planning and Provisioning. Takafumi Chujo Fujistu Laboratories of America, Inc.
Modeling Internet Application Traffic for Network Planning and Provisioning Takafumi Chujo Fujistu Laboratories of America, Inc. Traffic mix on converged IP networks IP TRAFFIC MIX - P2P SCENARIO IP TRAFFIC
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Regional Resiliency Assessment Program 2015 State Energy Risk Assessment Workshop April
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationSBC Investor Update. Merrill Lynch Global Communications Investor Conference March 16, 2004
SBC Investor Update Merrill Lynch Global Communications Investor Conference March 16, 2004 Randall Stephenson Senior Executive Vice President and Chief Financial Officer Cautionary Language Concerning
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationIBM ServicePac Warranty Service Upgrade (WSU)
IBM Maintenance Services ServicePac for Warranty and Maintenance Options IBM ServicePac Warranty Service Upgrade (WSU) Supported Products January 24, 2012 IBM ServicePac Warranty Service Upgrade Post-warranty
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationUtilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard
Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence
More informationWater Resources Planning Models of Collaboration
Water Resources Planning Models of Collaboration Michael P. Fallon, PE, SES SWD Programs Director/U.S. Army Corps of Engineers Alaska San Francisco Portland Seattle Sacramento Walla Walla South Pacific
More informationElection Infrastructure Security: The How and Why of It
Election Infrastructure Security: The How and Why of It Minnesota County Auditor Election Training Conference May 3, 2018 Contents Election Infrastructure Security Overview Cyber and Physical Security
More informationEmergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:
Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense
More informationNational Cyber Incident Response - Architectural Concepts
CSIRT Contributions to National Cyber Incident Response: An Architectural Perspective with U.S. Examples Bradford J. Willke Team Lead, Information Security Assessment & Evaluation Survivable Enterprise
More informationWorking Draft Supplemental Tool: Connecting to the NICC and NCCIC Draft October 21, 2013
3000 Supplemental Tool: Connecting to the NICC and NCCIC 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationPublic and Private Interdependencies Filling a Gap in Most Continuity Plans
Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement
More informationDHS Emergency Services Sector Presents Tools and Resources for First Responders. June 1, pm ET
DHS Emergency Services Sector Presents Tools and Resources for First Responders June 1, 2017 1-2 pm ET Agenda Introduction Overview of the NISC Emergency Services Sector (ESS) Resources and Tools for Emergency
More informationFlorida Regional Domestic Security Task Forces
Florida Regional Domestic Security Task Forces North Florida North East Florida North West Florida Tampa Bay Citrus, Sumter, Hernando, Pasco, Pinellas, Hillsborough, Polk and Hardee Counties Central Florida
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationBusiness Continuity: How to Keep City Departments in Business after a Disaster
Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and
More informationAwareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology
Awareness as a Cyber Security Vulnerability Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology Background TSA Cyber Security Awareness and Outreach (CSAO)
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationCritical Infrastructure
Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationS&T Stakeholders Conference
S&T Stakeholders Conference Risk-Informed Requirements Process Col. Merrick Krause, USAF (Ret.) Director Infrastructure Analysis & Strategy Division U.S. Department of Homeland Security June 2-5, 2008
More informationEnergy Benchmarking Commercial Buildings. Cities that support or require energy benchmarking of commercial buildings
Energy Benchmarking Commercial Buildings Cities that support or require energy benchmarking of commercial buildings Large Cities (250,000+ people) Madison WI 250,000 We are working on a voluntary program.
More informationCritical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.
Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships May 17, 2016 Overview Regional Overview Project Overview Background and
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationDepartment of Homeland Security Science and Technology Directorate
Department of Homeland Security Science and Technology Directorate Overview Presented to the Transportation Research Board Infrastructure and Geophysical Division Science and Technology Directorate Department
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationCRITICAL INFRASTRUCTURE AND KEY RESOURCES
AGRICULTURE AND FOOD SECTOR The Agriculture and Food Sector has the capacity to feed and clothe people well beyond the boundaries of the nation. The sector is almost entirely under private ownership and
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationAAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018
AAPA Smart Ports Cyber Management for Ports Panel Small Port Cyber Security Workshops March 6, 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Port Infrastructure Development More
More information2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014
2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating
More informationNATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC
NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable
More informationSubcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Good morning Chairwoman Clarke, Ranking Member Lungren, and distinguished
Mr. Craig Conklin Director, Sector-Specific Agency Executive Management Office Department of Homeland Security Before the House Committee on Homeland Security Subcommittee on Emerging Threats, Cybersecurity,
More informationMember of the County or municipal emergency management organization
EMERGENCY OPERATIONS PLAN SUUPPORT ANNEX B PRIVATE-SECTOR COORDINATION Coordinating Agency: Cooperating Agencies: Chatham Emergency Management Agency All Introduction Purpose This annex describes the policies,
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe Role of ISACs in Protecting Critical Infrastructure. Denise Anderson Chair National Council of ISACs. Agenda
The Role of ISACs in Protecting Critical Infrastructure Denise Anderson Chair National Council of ISACs Agenda What is Critical Infrastructure? Public/Private Partnership Framework What is an ISAC? Descriptions
More informationCritical Infrastructure Assessment
Critical Infrastructure Assessment Everyday the products and services that support our standard of living flow, almost seamlessly, to and from our homes, communities, and government. Making this possible
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationSharing of Information & Intelligence on the Importation & Transportation of Food
Sharing of Information & Intelligence on the Importation & Transportation of Food Dr. Sharon Thompson, Director Center for Agriculture & Food Security & Preparedness University of Tennessee College of
More informationSTANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season
STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators
More informationFederal Information Sharing Resources for Small and Midsize Businesses
Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017
More informationRegional Resilience: Prerequisite for Defense Industry Base Resilience
Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership
More informationTransportation Security Risk Assessment
Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction
More informationThe Value of Bipartisanship
About Vectis Vectis At Vectis Strategies we understand how to successfully and properly apply leverage in public relations, government stretch from the corridors of power in Washington, DC to international
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More information