Discussion DO NOT COPY, DISTRIBUTE, OR DISSEMINATE.

Size: px
Start display at page:

Download "Discussion DO NOT COPY, DISTRIBUTE, OR DISSEMINATE."

Transcription

1 Cybersecurity Time for Action February 26, 2015 BLUF Government information and the nation s infrastructure remain at serious risk to cyberattacks, and recent legislation in Congress does little to address the problems. Despite over $12 billion in annual federal funding for cybersecurity, the prevalence and magnitude of cyberattacks have increased significantly in recent years. The Administration and Congress have failed to keep pace with the persistent threat as few cyber-related bills have been passed since At the same time, the absence of a comprehensive national cybersecurity strategy has left the national cybersecurity apparatus rudderless. These issues combined with poor understanding of cybersecurity, failing private-public partnerships, and poor incentives to combat the threat, have left the nation vulnerable. Although momentum to address cybersecurity issues has increased, Congress and the Administration s actions so far have not been promising. Issues The major issues that have left the nation vulnerable to cybersecurity attacks include: Ineffective Strategy: Cybersecurity is a complex and evolving issue, requiring coordinated leadership and persistent attention. Currently, no single agency is in charge of coordinating the government s cyberrelated initiatives. The lack of a lead executive agent, combined with the lack of a national cybersecurity strategy has created a large, often redundant bureaucracy that still has gaps. Piecemeal Policies: The Administration and Congress take a piecemeal approach to cybersecurity, producing legislation and policies that only address near-term cyber issues. This shortsightedness underlines a lack of a holistic understanding of cyberthreats and the role they must play in cybersecurity. Failing Public-Private Partnerships: The private sector s distrust of the government over legal and liability concerns has impeded information sharing efforts aimed at strengthening cybersecurity. Reported Federal Cyber Incidents and FISMA spending 80,000 $16 70,000 $14 60,000 $12 50,000 $10 40,000 $8 30,000 $6 20,000 $4 10,000 $2 0 FY06 FY07 FY08 FY09 FY10 FY11 FY12 FY13 FY14 FY15* FISMA Spending (Right Axis) Incidents Reported to US-CERT by Federal Agencies (Left Axis) * FY15 and FY16 funding based on presidential budget requests Source: GAO Analysis of US-CERT, CRS Report on Cybersecurity Issues and Challenges FY16* $0 Billions of Dollars Number of Incidents Over the past 8 years the number of information security incidents reported by federal agencies to the U.S. Computer Emergency Readiness Team increased by 1,121 percent. At the same time, funding for the Federal Information Security Management Act (FISMA) more than doubled in the past eight years before experiencing cuts from the FY13 sequester.

2 2 Discussion Ineffective Strategy: Cybersecurity is the act of protecting information and communications technology (ICT) and their contents. However, protection has been lacking recently with major breeches of both public and private ICT systems, including the Veteran Affair s data network, Anthem Blue Cross accounts database, and DOD s Central Command s Twitter account to name just a few. The viability of information security is being questioned and Congress and the Administration have renewed their focus on cyber issues. The current FY16 proposed budget increases cybersecurity spending once again by $1 billion but despite the large spending, the federal government is handicapped by its lack of direction and strategy. Currently, the U.S. government does not have a comprehensive cybersecurity strategy despite numerous strategy documents published over the last decade. Additionally, there is no single document that synthesizes applicable laws or policies in order to provide a comprehensive description of priorities, responsibilities, and milestones. Moreover, there is a lack of continuity in current policies. For example, the 2003 National Strategy to Secure Cyberspace does not refer to the 2000 National Plan for Information Systems although they address similar issues. Evolution of Cybersecurity Strategy and Policy There is no single document that comprehensively defines U.S. cybersecurity strategy. Various documents contributing to the national strategy have either revised priorities or delegated new responsibilities to organizations. On the legislative side, there was a 12-year gap between the 2002 Federal Information Security Management Act and the four bills passed by the 113 th Congress in late The existing strategy documents lack key elements including; milestones and performance measures, cost justifications and resource allocations, roles and responsibilities, and linkage to other key documents, such as the National Security Strategy (NSS). The Government Accountability Office (GAO) argues that the absence of accountability and oversight mechanisms within the strategy documents has contributed to the shortcomings of agency cybersecurity risk management processes. The federal cybersecurity apparatus, as a result, has also become more complex over the last decade with no clear delineation of roles and responsibilities that have emerged over the years. For example, much of the criticism towards the White House s establishing the National Cyberthreat Intelligence Integration Center (CTIIC) is that its threat information-sharing role is already being filled by a number of existing organizations, including the National Cybersecurity and Communications Integration Center (NCCIC). At the same time, the 113 th Congress passed a bill that instructed the NCCIC to share potential threats with private companies, which overlaps with the new CTIIC s responsibilities.

3 3 Simplified Illustration of Federal Agency Cybersecurity Roles The illustration provides an extremely simplified illustration of broad roles and responsibilities of agencies involved in cybersecurity. However, numerous overlaps in roles and responsibilities exist that are not represented. Source: CRS, Cybersecurity Issues and Challenges Piecemeal Policies: Since the 111 th Congress, many cyber bills have been introduced but they all have experienced logjams with controversies over roles and responsibilities between agencies, the federal government, and state governments. As a result, policy has lagged behind the very threats it is meant to address. Until December 2014, the last cybersecurity bill to be enacted was the Federal Information Security Management Act (FISMA) in To pass bills, Congress has adopted a step-by-step approach rather than tackle a comprehensive and more controversial cybersecurity bill. The result is that the four bills passed late last year addressed only near-term cyber issues (preventing disasters and espionage, reducing impact of attacks, improving inter and intra-sector collaboration, and clarifying roles and responsibilities), and they fail to address the long-term challenges of cyberthreats. New legislation needs to be flexible and forward looking, recognizing that technology outpaces the legislative processes. As they stand today, the proposed cyber-related bills in the 114 th Congress do not address long-term challenges. In order to address the long-term challenges, policy must address (1) cybersecurity Research and Development (R&D) to affect the design of ICT, (2) cybercrime penalties that can influence the structure of

4 4 incentives, (3) a framework that may improve consensus about cybersecurity, and (4) federal initiatives in cloud computing and other components of cyberspace that may help shape the evolution of cybersecurity. Current Legislation Federal Information Security Management Act (FISMA) 2002 FISMA Modernization Act 2014 Cybersecurity Workforce Assessment Act 2014 National Cybersecurity Protection Act 2014 Cybersecurity Enhancement Act Description Defines a comprehensive framework to protect government information, operations, and assets against cyber threats. Requires the National Institute of Standards and Technology to develop minimum information security standards and guidelines and for each agency to develop procedures to detecting, reporting, and responding to security incidents. Revises FISMA 2002 and clarifies roles and responsibilities for overseeing and implementing agencies information security program. Requires DHS to assess its cybersecurity workforce and develop a strategy for addressing workforce gaps. Codifies DHS National Cybersecurity and Communications Integration Center (NCCIC) as the nexus of cyber and communications integration for federal government, intelligence community, and law enforcement. Authorizes the Department of Commerce, through the National Institute for Standards and Technology, to facilitate and support the development of voluntary standards to reduce cyber risks to critical infrastructure. Proposed Legislation Terrorism Prevention and Critical Infrastructure Protection Act Cyber Defense National Guard Act Safe and Secure Federal Websites Act Cybersecurity Education and Federal Workforce Enhancement Act Cyber Privacy Fortification Act Cyber Threat Sharing Act Cyber Intelligence Sharing and Protection Act of 2015 Description Codifies Presidential Policy Directive 21 to improve critical infrastructure security and resilience. Requires the Director of National Intelligence to conduct a study on the feasibility of establishing a Cyber Defense National Guard. Prohibits a federal agency from deploying a personally identifiable information website until a certification is submitted to Congress that demonstrates that the website is fully functional and secure. Establish an Office of Cybersecurity Education and Awareness Branch within the DHS to strengthen the agency s capacity to attract and retrain highly trained computer and information security professionals. Amends federal criminal code to provide criminal penalties for intentional failures to provide required notices of security breach involving sensitive personally identifiable information. Codifies mechanisms for enabling cybersecurity threat indicator sharing between private and government entities. Provides for the sharing of certain cyber threat intelligence and cyberthreat information between intelligence community and cybersecurity entities. Public-Private Partnerships: Public-private partnerships have been emphasized in cybersecurity strategy documents as far back as the Clinton administration. Greater information sharing can increase the size and quality of cybersecurity products and make cyberspace more secure, reduce redundant efforts, and make dollars spent on cybersecurity more effective. However, efforts have been continuously stymied by private sector unwillingness, weak government incentives, lack of enforcement regimes, and imprecise guidelines. Part of the challenges to public/private collaboration is the perceived legal and economic barriers to information sharing. After a cyber incident, firms may be reluctant to release information, as the admission would benefit their competitors. Firms and industry groups are wary of violating privacy or anti-trusts laws that may harm their brand with consumers. At the same time, public-private partnerships have been mostly onesided to date. The Department of Homeland Security s (DHS) NCCIC, responsible for such collaboration, has been primarily the recipient rather than the facilitator of information. A number of failed bills proposed by the

5 5 113 th Congress dealt with these obstacles to information sharing. The Cybersecurity Intelligence Sharing and Protection Act (CISPA) of 2014, the Cybersecurity Information Sharing Act (CISA), and the Cybersecurity Information Sharing Tax Credit Act aim to increase information sharing through legal protection and economic incentives. However, all three proposals failed due to continued concerns with privacy and debate over mandatory information sharing. Characteristics of Public Sector Reactive to media and current events Stove-piped ICT systems Cannot communicate well across agencies Level of expertise varies across agencies Heavily regulated information Characteristics of Private Sector Requires financial motivations to act Agile in developing and testing technology Structural advantage dealing with cyberattacks Level of expertise varies across sectors Heavily guarded information The lack of information sharing legislation has spurred the administration to act. In 2013, the administration signed Executive Order and Presidential Policy Directive 21 to address cybersecurity of critical infrastructure through voluntary public/private collaboration and the use of existing regulatory authorities. This month, the White House also announced another executive order that protects private companies from voluntary public disclosure. The administration will also establish the Cyber Threat Intelligence Integration Center (CTIIC) that will coordinate intelligence across various agencies and determine whether it can be shared with the private sector. However, these efforts have been met with some criticism. Google, Yahoo, and Facebook, which had received public backlash for provided the government with data, continue to boycott government sponsored security-sharing forums, believing liability protections are inadequate. At the same time, the CTIIC has come under fire for being redundant and that efforts should focus on improving the existing framework for reporting and sharing information. The private sector is likely to continue their efforts independent of federal government, such as Facebook s new Threat Exchange service. Whether the government is able to convince top tech firms (e.g. Apple, Cisco, FireEye, Google, Intel, Palo Alto Networks) to collaborate with the NCCIC and participate in new cybersecurity initiatives will be indicative of progress in addressing the liability and incentive problems associated with information sharing. At the same time, improvements in hardware security by Cisco, Intel, and Furthermore, cyber hygiene or simple practices that diminish risks of unauthorized access needs to proliferate in addition to advances in end point collection capabilities, improvements in database storage and retrieval, and advances in automated countermeasures. While these improvements are not panacea to cyber threats, they are low hanging fruits that can provide defense in depth against cyber attacks. However, although the White House is likely to remain at the forefront of new federal cyber initiatives, without a national cybersecurity strategy and complementary legislative actions, these initiatives will have limited impact and the nation will remain vulnerable to the evolving threat. Glossary of terms used CISA Cybersecurity Information Sharing Act CISPA Cybersecurity Information Sharing and Protection Act CTIIC Cyber Threat intelligence Integration Center DHS Department of Homeland Security DNI Director of National Intelligence FISMA Federal Information Security Management Act ICT Information and Communications Technology NCCIC National Cybersecurity and Communications Integration Center NIST National Institute of Standards and Technology

6 6 NEPTUNE ADVISORY Scott Ellison Kevin Jiang Patrick McCarthy, CFA David Schopler th Street SE Washington, DC scott@neptuneasc.com kevin@neptuneasc.com patrick@neptuneasc.com schop@neptuneasc.com This report is proprietary to Neptune Advisory and is intended for the exclusive use of the recipient and its employees and should not be copied or further distributed, circulated, disseminated, or discussed. Neptune Advisory does not provide advice, reports, or analyses regarding securities and this report should not be understood as performing any analysis or making any judgment or giving any opinion, judgment or other information pertaining to the nature, value, potential or suitability of any particular investment. This report is based upon information believed to be reliable at the time it was prepared. However, Neptune Advisory cannot guarantee the accuracy or correctness of any judgment, opinion or other information contained in this report. Neptune Advisory, its partners, employees or agents have no obligation to correct, update, or revise this report or advise or inform recipient should Neptune Advisory or any of its partners, employees or agents determine that any judgment, opinion, or other information contained in this report is inaccurate or incorrect or should Neptune Advisory or any of its partners, employees or agents change their view as to any judgment, opinion or other information expressed herein. Neptune Advisory, its partners, employees and agents shall have no liability to you or any third party claiming through you with respect to your use of this report or for any errors of transmission. Partners and employees of Neptune Advisory or their family members may own securities or other financial interest of, or have other relationships or financial ties to, of one or more of the issuers discussed herein.

7 7 BlackArch Partners Third Party Independent Research Disclaimer: This constitutes a research report prepared by an independent third party research provider. BlackArch has not reviewed the accuracy of this report. Any opinions expressed herein are statements of judgment on the date of the report and are subject to future change without notice. Neither this information nor any opinions expressed herein are a solicitation to purchase or sell any securities, and nothing contained in this report is or should be construed as investment advice. This information contains forward looking predictions that are subject to certain risks and uncertainties which could cause actual results to differ materially from those currently anticipated or projected. BlackArch provides this information to its clients in an effort to provide comprehensive information of a broad range of possible opportunities. Any questions regarding this report or its contents must be addressed to your BlackArch Representative.

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

Cybersecurity and Data Privacy

Cybersecurity and Data Privacy DECEMBER 2015 NO. 2 Cybersecurity and Data Privacy Landmark Cybersecurity Legislation Included in Omnibus Package Action Item: Congress included the Cybersecurity Act of 2015 (the Act ) in the Consolidated

More information

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity Why is the NIST framework important? GOH Seow Hiong Executive Director, Global Policy & Government Affairs, Asia Pacific

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414 The Cybersecurity Act of 2012, S. 3414, has not been the subject of a legislative hearing and has skipped regular order. HSGAC has not marked

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

Smart Grid Update. Christopher J. Eisenbrey. Director, Business Information Edison Electric Institute (EEI)

Smart Grid Update. Christopher J. Eisenbrey. Director, Business Information Edison Electric Institute (EEI) 1 Smart Grid Update Christopher J. Eisenbrey Director, Business Information Edison Electric Institute (EEI) The Council of State Governments (CSG) April 26, 2012 Edison Electric Institute (EEI) The Edison

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow

Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow NIST and the Government Role in the U.S. Standards System Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow 1 Discussion Outline NIST Overview Government Role National Technology

More information

Cyber Security: Exploring the Human Element

Cyber Security: Exploring the Human Element Cyber Security: Exploring the Human Element Summary of Proceedings Cyber Security: Exploring the Human Element Institute of Homeland Security Solutions March 8, 2011 National Press Club Introduction A

More information

CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY. October 2016

CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY. October 2016 CYBER INSURANCE MARKET WATCH SURVEY EXECUTIVE SUMMARY October 2016 Summary The Council of Insurance Agents & Brokers (The Council) is pleased to release its third biannual Cyber Insurance Market Watch

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

-Eight types of cyber data, (Sec. 708(7))

-Eight types of cyber data, (Sec. 708(7)) WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

Draft Resolution for Committee Consideration and Recommendation

Draft Resolution for Committee Consideration and Recommendation Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist July 15, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity: Legislation,

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Ensuring System Protection throughout the Operational Lifecycle

Ensuring System Protection throughout the Operational Lifecycle Ensuring System Protection throughout the Operational Lifecycle The global cyber landscape is currently occupied with a diversity of security threats, from novice attackers running pre-packaged distributed-denial-of-service

More information

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City 1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the

More information

Cybersecurity, Trade, and Economic Development

Cybersecurity, Trade, and Economic Development Cybersecurity, Trade, and Economic Development G7 ICT Priorities: Technology, Innovation, and the Global Economy UNCTAD E-Commerce Week Danielle Kriz Senior Director, Global Policy Palo Alto Networks April

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security

More information

Cybersecurity: CRS Experts

Cybersecurity: CRS Experts July 23, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42619 T he following table provides names and contact information

More information

Security Takes Center Stage

Security Takes Center Stage Security Takes Center Stage Rajesh De Partner Chair, Global Cybersecurity & Data Privacy Practice +1 202 263 3366 rde@mayerbrown.com June 7, 2016 Cyber Attacks Are Increasing in Cost and Frequency Breaches

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

The Value of Bipartisanship

The Value of Bipartisanship About Vectis Vectis At Vectis Strategies we understand how to successfully and properly apply leverage in public relations, government stretch from the corridors of power in Washington, DC to international

More information

Robert Holleyman, President and CEO, BSA The Software Alliance

Robert Holleyman, President and CEO, BSA The Software Alliance Testimony Bolstering US Cybersecurity Robert Holleyman, President and CEO, BSA The Software Alliance Testimony before the US House of Representatives, Committee on the Judiciary, Subcommittee on Crime,

More information

Cybersecurity Information Sharing Legislation

Cybersecurity Information Sharing Legislation Government entities and private-sector organizations in the United States now have a common framework that encourages the sharing of cybersecurity threat information among each other, thanks to new federal

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

Election Infrastructure Security: The How and Why of It

Election Infrastructure Security: The How and Why of It Election Infrastructure Security: The How and Why of It Minnesota County Auditor Election Training Conference May 3, 2018 Contents Election Infrastructure Security Overview Cyber and Physical Security

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 17, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

Bridging The Gap Between Industry And Academia

Bridging The Gap Between Industry And Academia Bridging The Gap Between Industry And Academia 14 th Annual Security & Compliance Summit Anaheim, CA Dilhan N Rodrigo Managing Director-Smart Grid Information Trust Institute/CREDC University of Illinois

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Canadian Anti-Spam Legislation (CASL)

Canadian Anti-Spam Legislation (CASL) Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS The purpose of this document is to assist and guide U of R employees regarding their obligations under the Canadian Anti-Spam Legislation

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Cybersecurity and Information Sharing: Comparison of H.R and H.R as Passed by the House

Cybersecurity and Information Sharing: Comparison of H.R and H.R as Passed by the House Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House Eric A. Fischer Senior Specialist in Science and Technology Stephanie M. Logan Research Assistant June

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

GAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed

GAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed GAO United States Government Accountability Office Report to Congressional Requesters October 2010 CYBERSPACE POLICY Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations,

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

March 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience

March 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience This document is scheduled to be published in the Federal Register on 03/25/2016 and available online at http://federalregister.gov/a/2016-06901, and on FDsys.gov March 21, 2016 MEMORANDUM FOR THE HEADS

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist October 21, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

CYBER INSURANCE: MANAGING THE RISK

CYBER INSURANCE: MANAGING THE RISK CYBER INSURANCE: MANAGING THE RISK LEON FOUCHE PARTNER & NATIONAL CYBERSECURITY LEAD BDO AUSTRALIA MEMBER OF THE GLOBAL CYBERSECURITY LEADERSHIP GROUP ii CYBER INSURANCE: MANAGING THE RISK There s no doubt

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Bad Idea: Creating a U.S. Department of Cybersecurity

Bad Idea: Creating a U.S. Department of Cybersecurity December 2018 Bad Idea: Creating a U.S. Department of Cybersecurity Suzanne Spaulding and Mieke Eoyang A lack of cybersecurity can have serious consequences the theft of money or data, an interruption

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats www.pwc.co.uk/informationsecurity The Cyber Savvy CEO Getting to grips with today s growing cyber-threats Unprecedented opportunities The cyber domain is a world of opportunity yet media coverage of attacks

More information