Integrated Cyber Defense Working Group (ICD WG) Introduction
|
|
- Charleen Parrish
- 6 years ago
- Views:
Transcription
1 Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative Commons Attribution 4.0 International License.
2 Agenda Today s Goals What is Integrated Cyber Defense (ICD)? Background Overview Information Sharing and Automation ICD WG Purpose and Goals Strategy Overall Plan Next Steps Community Actions Next ICD WG
3 Today s Goals To kick off the ICD WG To define the group s purpose and plan To communicate about the effort to the larger community
4 Background National Security Presidential Directive 54/Homeland Security Presidential Directive 23 established the Comprehensive National Cybersecurity Initiative (CNCI), with 12 sub-initiatives CNCI Initiative #5 (CNCI-5) called for increased connections between Federal Cyber Centers to create cyber shared situational awareness In 2012, CNCI-5 was recast by the Administration as the Enhance Shared Situational Awareness (ESSA) Initiative machine-speed sharing became an increased focus ESSA provided one of the cyber community s only mechanisms for future-looking, operational collaboration; it has facilitated: Development and implementation of requirements-based community-wide capabilities Development and adoption of processes and standards across DHS, DOD, DOJ, the IC, and the DOE 4
5 National Roles and Responsibilities ( Bubble Chart )
6 Background Information Sharing Architecture (ISA) Developed by the Enhance Shared Situational Awareness (ESSA) participants as a framework to guide investments in shared and organizational capability The ISA Framework was designed to establish a construct for multi-partner sharing and delineated capability and information needs for collaboration across multiple domains It defined seven cybersecurity functions that encompass cybersecurity activities performed by a particular organization It also defined seven categories of information, called Enduring Functional Exchanges (EFEs), which are exchanged on an ongoing basis to enhance SSA and enable integrated operational response The ISA Framework defined a list of technical needs, that established the baseline for developing capabilities being implemented today, that enable real-time cyber information sharing
7 (U) Former ESSA Coordination Forums (U) Inter-organizational Coordination Group (ICG) (U) Strategic Management and policy level coordination across the ISA (U) Establishes IPTs, WG, and coordinating policies among the members (U) Implementation Working Group (IWG) (U) An interagency and inter-organizational body that will develop and coordinate the execution of the plan for the realization of the ISA. (U) Policy Working Group (PWG) - (U) Will Identify and solve functional policy requirements necessary to resolve policy issues that impede net-speed cybersecurity information sharing among ISA participants and their partners
8 ESSA Producing the Foundation December 2010 Published and delivered to the community and ODNI the Information Sharing Architecture (ISA): Framework April 2011 As-Is Definition and Assessment of current information sharing activities among Centers October 2013 ISA: Shared Situational Awareness Requirements Document v2.1 (Mission, Technology, and Information) released ESSA funds initial STIX/TAXII development February 2014 ISA: Access Control Specification (ACS) version 1.1 released April 2014 ISA: Technical Implementation Plan v2.0 released September 2016 ESSA stands down; full transition to DHS, Shared Capability Providers (SCPs), and community
9 ICD Overview ICD Overview
10 Integrated Cyber Defense Overview Integrated Cyber Defense Extensible and flexible integration of cyber defense capabilities across all levels (platform, service, system, enterprise, multi-enterprise) that: Enables rapid insertion of emerging solutions Measurably reduces timeline for cyber defense operations Measurably increases the effectiveness of cyber defense operations Endures in capability while allowing changes in hardware, software, and services Extends across both traditional and emerging environments
11 Relationship Between Cyber Threat Information Sharing and Active Cyber Defense Automation Increased Cyber Threat Information Sharing Sightings Intelligence Industry-driven Automated Sharing Automated Indicator Sharing (AIS) ESSA Malware Storefront STIX Advanced Autoimmunity Threat Intelligence Platforms (TIP) Increase in Shared Information Increased Active Cyber Defense Automation Deduplication Security Orchestration Products SOC Automation Increased Automation Indicator Sightings Automated Indicator Generation Analytics-based IT Automation Refined Information Sharing To Further Advance Automated Capabilities IACD An increase in the volume and types of Cyber Threat Information Sharing both enable and require Active Cyber Defense Automation.
12 ICD Working Group ICD Working Group
13 ICD WG Purpose and Goals Definition A common forum to discuss, question, and strategize cross-cutting technical evolution and migration Purpose To create and communicate a single, cohesive vision of common technology and information needs To work with Departments/Agencies to further advance AIS and IACD, and potentially other associated federal infrastructure Goals Produce community-accepted guidance for technical implementation of capabilities that enable automated defensive actions and cybersecurity information sharing
14 Overall ICD WG Plan Identify the hard technical challenges Lay out the order based on dependencies Summarize each challenge and invite feedback and input from the IACD Community Allows for input from vendor and private communities Establish focus groups for each challenge Identify POCs to lead Identify participants Define products and schedule Report plan and progress back to ICD WG Leverage ICD WG for review and comment Finalize products
15 Next Steps Next Steps
16 Actions to Community Identify ICD WG POCs from Federal Departments and Agencies Work within your organization to identify candidate challenges that should be worked by the ICD WG
17 Next ICD WG Meeting November 14, 2017 Plan the working group s activities List of candidate technical challenges What are the common hard challenges to solve? Prioritize based on urgency and interdependencies What do we look at first? Establish first focus group Draft the charter outline for review and comments Describe the gap this WG is meant to fill Lay out who we are and why we are here Establish expectations for: Scope and Time Constraints Activities Membership Reporting/Deliverables
18 Questions or Concerns? Back-up Slides
19 Backup Slides Back-up Slides
20 ICD WG Meeting Logistics Repository of Materials Shared online working space OMB MAX Meeting Schedule Nominally every 6-8 weeks Roster primary/alternates/support staff Listserv for managing large membership roster Establish Prioritization Process Establish Review and Comments Process
21 Potential Candidate Challenges Tiered Trust Markings Feed Management Scoring IACDaaS De-duplication / Echo Chamber Sightings COA Sharing Onboarding Revocation What else?
22
Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationUpdates to the NIST Cybersecurity Framework
Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationExecutive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI
Executive Order 13636 & Presidential Policy Directive 21 Ed Goff, Duke Energy Melanie Seader, EEI Agenda Executive Order 13636 Presidential Policy Directive 21 Nation Infrastructure Protection Plan Cybersecurity
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationFood and Agriculture Sector Criticality Assessment
Food and Agriculture Sector Criticality Assessment William Krueger Food and Agriculture Sector Specialist DHS - Office of Infrastructure Protection Partnerships and Outreach Division & Research Fellow
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationThe U.S. National Spatial Data Infrastructure
June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationAchieving a Secure and Resilient Cyber Ecosystem: A Way Ahead
Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead January 2016 Continuing to strengthen the security and resilience of our nation s critical infrastructure in partnership with you Our Responsibilities
More informationThe US National Near-Earth Object Preparedness Strategy and Action Plan
The US National Near-Earth Object Preparedness Strategy and Action Plan Briefing to SMPAG Lindley Johnson Program Executive / Planetary Defense Officer Science Mission Directorate NASA HQ October 18, 2018
More informationAdvanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018
Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationCybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment
Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationCurrent Research and Standards for Security Automation An overview of US Government efforts to support and promote security automation
Automation An overview of US Government efforts to support and promote security automation Charles Schmidt About Me Current Research and Standards for Security Charles Schmidt 18 years at MITRE supporting
More informationGAO CYBERSECURITY. Key Challenges Need to Be Addressed to Improve Research and Development. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters June 2010 CYBERSECURITY Key Challenges Need to Be Addressed to Improve Research and Development GAO-10-466 June 2010
More informationFive-Year Strategic Plan
Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationGAO CYBERSPACE POLICY. Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
GAO United States Government Accountability Office Report to Congressional Requesters October 2010 CYBERSPACE POLICY Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations,
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Hunting The Network Hunting is employed to proactively look for indicators of an active threat or exploitation
More informationAn Overview of TOGAF Version 9.1
An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6
More informationProposed Regional ehealth Strategy ( )
Proposed Regional ehealth Strategy (2014-2020) Strategic Area 1: Policy & Strategy Strategic Area 2: Tools & Methods Strategic Area 3: Collaboration & Partnership Strategic Area 4: Human Resource Development
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationNational Infrastructure Protection Plan (NIPP) Transportation Sector Specific Plan (TSSP) and The TSSP R&D Working Group
National Infrastructure Protection Plan (NIPP) Transportation Sector Specific Plan (TSSP) and The TSSP R&D Working Group AASHTO Special Committee on Transportation Security & The National Cooperative Highway
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Host Intrusion The Host Intrusion employs a response to a perceived incident of interference on a host-based system
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationIndustry role moving forward
Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationImproving Cybersecurity through the use of the Cybersecurity Framework
Improving Cybersecurity through the use of the Cybersecurity Framework March 11, 2015 Tom Conkle G2, Inc. Agenda Cybersecurity Framework Why it was created What is it Why it matters How do you use it 2
More informationForensics and Biometrics Enterprise Reference Architecture (FBEA)
Forensics and Biometrics Enterprise Reference (FBEA) Overview and Summary Information (AV-1) Final Draft Version 2.6 Aug 2016 Version History Version# Date Page(s) Changed Change Description 1.0 Feb 2016
More informationUtilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard
Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence
More informationClick to edit Master title style
Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative
More informationFirst Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.
First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between
More informationS&T Stakeholders Conference
S&T Stakeholders Conference Risk-Informed Requirements Process Col. Merrick Krause, USAF (Ret.) Director Infrastructure Analysis & Strategy Division U.S. Department of Homeland Security June 2-5, 2008
More informationHELLO, MOSCOW. GREETINGS, BEIJING. ADDRESSING RISK IN YOUR IT SUPPLY CHAIN
SESSION ID: PNG-F01 HELLO, MOSCOW. GREETINGS, BEIJING. ADDRESSING RISK IN YOUR IT SUPPLY CHAIN MODERATOR: Edward Brindley Principal Deputy, DCIO/CS in DoD-CIO Mr. Don Davidson Deputy Director, Cyber Security
More informationAchieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting)
Achieving & Measuring the Value of Cyber Threat Information Sharing Lindsley Boiney, Clem Skorupka (presenting) The MITRE Corporation 2018 International Information Sharing Conference McLean, VA 2 Acknowledgements
More informationBird of a Feather Automated Responses
Bird of a Feather Automated Responses Energy-Sec Summit 2017 13 Th Security and Compliance www.inl.gov August 2017 INL s Position Nationally A network of 17 DOE national labs DOE s lead lab for nuclear
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationDoD Software Assurance (SwA) Update
DoD Software Assurance (SwA) Update Systems and Software Technology Conference May 2, 2006 Ms. Kristen Baldwin OUSD(AT&L)/Defense Systems kristen.baldwin@osd.mil Briefing Agenda Problem Definition Vision
More informationDomestic Nuclear Detection Office (DNDO) DNDO Overview
Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global
More informationJoint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?
21 st Annual National Defense Industrial Association Systems and Mission Engineering Conference Joint Federated Assurance Center (JFAC): 2018 Update Thomas Hurt Office of the Under Secretary of Defense
More informationCyber Maryland 2017: Continuous Innovation and Cyber Incident Response
Cyber Maryland 2017: Continuous Innovation and Cyber Incident Response Thursday 10/12/17 Michael Misumi, CIO Johns Hopkins University Applied Physics Lab (APL) University Affiliated Research Center Sponsors
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Boundary and The Network Boundary and for an Enterprise is essential; it provides for an understanding of
More informationNational Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017
National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationIntegrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting
Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting January 30, 2007 1 Agenda ICLN Background Information Network Coordinating Group Accomplishments Responsible Federal
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationMedical Device Vulnerability Management
Medical Device Vulnerability Management MDISS / NH-ISAC Process Draft Dale Nordenberg, MD June 2015 Market-based public health: collaborative acceleration Objectives Define a trusted and repeatable process
More informationProposed Capability-Based Reference Architecture for Real-Time Network Defense
Proposed Capability-Based Reference Architecture for Real-Time Network Defense 16 November 2015 DISTRIBUTION STATEMENT A - APPROVAL FOR PUBLIC RELEASE: DISTRIBUTION IS UNLIMITED Based on work funded by
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity May 2017 cyberframework@nist.gov Why Cybersecurity Framework? Cybersecurity Framework Uses Identify mission or business cybersecurity dependencies
More informationLong-Term Power Outage Response and Recovery Tabletop Exercise
1 Long-Term Power Outage Response and Recovery Tabletop Exercise After Action Report [Template] The After-Action Report/Improvement Plan (AAR/IP) aligns exercise objectives with preparedness doctrine to
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationIdentity Management (IdM) is a crosscutting focus area for DHS
DHS & Identity Management Anil John Telephone: (443) 778-0612 Email: anil.john@jhuapl.edu 1 Identity Management (IdM) is a crosscutting focus area for DHS Enabling Homeland Capabilities EHC #1: Cross-Agency
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to
More informationFedRAMP: Understanding Agency and Cloud Provider Responsibilities
May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration
More informationIMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE
Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationERO Enterprise IT Projects Update
ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationUnited States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS
United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS UTILITY CYBER SECURITY INITIATIVE (UCSI) CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2) ASSESSMENT FOR THE
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationANSI Homeland Security Standards Panel (ANSI-HSSP) Open Forum for Standards Developers
ANSI Homeland Security Standards Panel (ANSI-HSSP) Presented by Dan Bart Co-Char, ANSI-HSSP 1 Overview Will address the following ANSI-HSSP items: Rationale Mission Structure Selected accomplishments Looking
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Physical Enterprise Physical Enterprise Monitoring is the monitoring of the physical and environmental controls that
More informationDepartment of Defense. Installation Energy Resilience
Department of Defense Installation Energy Resilience Lisa A. Jung DASD (Installation Energy) OASD(Energy, Installations and Environment) 19 June 2018 Installation Energy is Energy that Powers Our Military
More informationElection Infrastructure Security: The How and Why of It
Election Infrastructure Security: The How and Why of It Minnesota County Auditor Election Training Conference May 3, 2018 Contents Election Infrastructure Security Overview Cyber and Physical Security
More informationAligning Agency Cybersecurity Practices with the Cybersecurity Framework
POINT OF VIEW Aligning Agency Cybersecurity Practices with the Cybersecurity Framework Leveraging Gigamon to Align Cybersecurity Budgets with Desired Business Outcomes 2013-2017 Gigamon. All rights reserved.
More informationDHS Election Task Force Updates. Geoff Hale, Elections Task Force
1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationBiometric Standards for DoD Operational Requirements
Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric
More informationFederal & NASA IPv6 Updates
Federal & NASA IPv6 Updates LinkedIn Headquarters Sunnyvale, CA Kevin L. Jones NASA IPv6 Transition Manager April 26, 2017 December 1, 2016 September 28, 2010 OMB Memo USG IPv6 Implementation Goals 1.
More informationDHS Automated Information Sharing (AIS) Program
DHS Automated Information Sharing (AIS) Program 2018 Infoblox Inc. All rights reserved. Page 1 of 5 2018 Infoblox Inc. All rights reserved. DHS Automated Information Sharing (AIS) Program Infoblox AIS
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationInformation Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure
This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY
More information