Private Sector Clearance Program (PSCP) Webinar
|
|
- Elaine Owen
- 6 years ago
- Views:
Transcription
1 Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison
2 Agenda History NERC CIPC Private Sector Clearance Program (PSCP) Guidebook ESCC Clearance Handbook Requirements to Obtain Clearance Responsibilities of a Clearance Holder Initial and Annual Security Training Report of Foreign Travel (ipsecurity@hq.dhs.gov) Changes, Deactivation, and Termination of a clearance How to use your clearance 2 RELIABILITY ACCOUNTABILITY
3 History of PSCP 1998, Presidential Decision Directive/NSC (PDD) 63 PDD 63 Develops the framework for information sharing Encourages the formation of ISACs. The Electricity Sector chose NERC to run the ES ISAC 2002 Department of Homeland Security (DHS) 2003, Homeland Security Presidential Directive (HSPD) 7 Framework for Information Sharing between US Government and Private Sector Government Coordinating Council (GCC) and Sector Coordinating Councils (SCC) 3 RELIABILITY ACCOUNTABILITY
4 History of PSCP 2010 Executive Order Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities Assigns DHS Office of the Chief Security Officer (OCSO) responsibility for DHS security programs DHS Office of Infrastructure Protection (IP) established the Private Sector Clearance Program (PSCP) for critical infrastructure Ensure that select critical infrastructure private sector owners, operators, and industry representatives may be processed for security clearances. 4 RELIABILITY ACCOUNTABILITY
5 History of PSCP 2013, EO 13636, Improving Critical Infrastructure Cybersecurity DHS IP is responsible for identifying appropriate private sector stakeholders who are in a position to enhance the DHS infrastructure security and resilience mission It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Expedite clearances for select group of critical infrastructure 5 RELIABILITY ACCOUNTABILITY
6 NERC CIPC PSCP Guidebook Objectives Review the U.S. Government requirements applicable to our industry Examine protocols for granting private sector clearances Develop recommendations on security clearances for industry Develop a model for industry to use in determining which personnel should seek a security clearance 6 RELIABILITY ACCOUNTABILITY
7 NERC CIPC PSCP Guidebook Findings Industry SMEs provide valuable operational context to classified discussions Need for consistent process for identifying appropriate individuals for clearance Maturing information sharing process from one way briefings to a collaboration between government industry experts Need for a better understanding of the clearance process Need for active participation by clearance holders in classified discussions Need for additional TS SCI clearances 7 RELIABILITY ACCOUNTABILITY
8 NERC CIPC PSCP Guidebook Recommendations Inform government of the value that industry SMEs bring to classified discussions Use the clearance model to identify and validate industry nominees on a functional basis Use the ES ISAC to facilitate the selection process Encourage nominees to use the guidance to expedite processing of clearance applications Encourage nominees to use the guidance to meet their obligations as clearance holders Advocate for more TS SCI clearances for key industry personnel 8 RELIABILITY ACCOUNTABILITY
9 NERC CIPC PSCP Guidebook Clearances NERC FUNCTIONAL ENTITY REGISTRATION TYPE RC BA TO TOP TSP GOP GO DP IC Tota l Granting D/A (DOE, DHS, etc.) Cyber Security Jane Doe* 1 D/A AREA OF EXPERTISE Physical Security Operations Executive John Doe* Jane Smith* John Smith* Jim Example^ Jane Example^ 3 D/A 1 D/A 1 D/A Clearance Total RELIABILITY ACCOUNTABILITY
10 Clearances by Sector 10 RELIABILITY ACCOUNTABILITY
11 ESCC Clearance Handbook Granting of security clearances to select industry representatives facilitates access to classified information to better enable risk informed decision making; assists in determining the content, structure, and types of information most useful to critical infrastructure owners, operators, and industry representatives; and allows greater participation in the protection of critical infrastructure and the security of the homeland. 11 RELIABILITY ACCOUNTABILITY
12 ESCC Clearance Handbook Codifies the DHS and ESCC PSCP liaison relationship Gives justifications needed to obtain a clearance Responsibilities of a Clearance Holder Non disclosure agreements Initial and Annual Security Training Significant Life Changes Report of Foreign Travel Changes, Deactivation, and Termination of a clearance How to Use the Clearance 12 RELIABILITY ACCOUNTABILITY
13 ESCC PSCP liaison An ESCC Liaison position has been established to help facilitate the efficient processing of security clearances for the Electricity Subsector. Communicate on a regular basis with the IP (SOPD) Electricity Liaison Team Assist in the pre vetting of clearance requests, Managing the flow and maintaining awareness of the status of clearances in process, and Assist in providing more detailed justification for the requested clearance and priority of the application. 13 RELIABILITY ACCOUNTABILITY
14 ESCC PSCP liaison The pre vetting process is an informal check and balance process, The ESCC Liaison verifies a nominee s place of employment, position within the utility or organization, and reviews the nomination s justification. Priority is given to senior level positions of an organization or a designee of the Chief Executive Officer (CEO) or CSO, SMEs, and members of the critical information sharing forums and associations 14 RELIABILITY ACCOUNTABILITY
15 ESCC PSCP liaison Note: Applications require utility senior management approval; without this approval, applications will likely be returned to the nominee for further justification after the first review. Note: A nominee is strongly encouraged to submit an or letter on official company letterhead from their Security Coordinator, Company Senior Manager, or Chief Security Officer (CSO) approving the nominee for a security clearance. This correspondence should include the name of the utility and the senior manager s name, contact number, and address. 15 RELIABILITY ACCOUNTABILITY
16 Nomination Stage The DHS/IP Electricity Liaison team ) and Protective Security Advisors (PSAs), are the primary nominators for the Electricity Subsector. Private sector individuals, organizations, or associations may not initiate nominations or self nominate, may recommend an individual for nomination to an approved Nominator. An eligible nominee must be an employee not a contractor or consultant Start by filing out DHS Form RELIABILITY ACCOUNTABILITY
17 DHS Form RELIABILITY ACCOUNTABILITY
18 Clearance Processing 18 RELIABILITY ACCOUNTABILITY
19 eqip Application Process Once the nominee s Personal Identifiable Information (PII) is obtained, the IP Security Office will enter the information into eqip, a secure government portal for investigation processing of the required online security questionnaire. Note: The nominee must complete his or her security questionnaire in eqip within 45 days of initiation, or he or she will be inactivated and may be removed from consideration. Upon initiation of and OCSO background investigation DHS may grant an interim Secret clearance Interim Secret clearances are typically granted in seven days The average timeline for the full security clearance process is approximately two to three months 19 RELIABILITY ACCOUNTABILITY
20 Non-Disclosure Agreements Non Disclosure Agreements Complete a Classified Information Nondisclosure Agreement (SF 312) Complete a DHS Non Disclosure Agreement (DHS Form ) Review Statement of Understanding Relative to the Protection of Classified National Security Information and sign letter of acknowledgement Safeguarding Classified Information A cleared individual is responsible for safeguarding all classified information that he/she has accessed in accordance with the terms of the SF RELIABILITY ACCOUNTABILITY
21 Security Training Initial and Annual Security Training To maintain a clearance, the cleared individual must complete both initial and annual refresher security training. The annual refresher security training is administered by the PSCP Administrator, who will notify clearance holders via when the training is due. PSCP participants should notify the DHS/IP PSCP Administrator (PSCP@hq.dhs.gov ) or the Electricity Liaison team (electricityliaisons@hq.dhs.gov) of any change to their address so that it can be updated. 21 RELIABILITY ACCOUNTABILITY
22 Reporting Significant Life Events A cleared individual must report significant life events to IP Security Office (ipsecurity@hq.dhs.gov) Name Marital Status Citizenship changes Adverse information, such as Recent arrests, criminal charges (including charges that are dismissed), citations, tickets, summons or detentions by Federal, State, or other law enforcement authorities for violations of law within or outside of the U.S. (Traffic violations for which a fine of up to $300 was imposed need not be reported, unless the violation was alcohol or drugrelated) 22 RELIABILITY ACCOUNTABILITY
23 Reporting Significant Life Events Alcohol or drug related problems Personal or business related bankruptcy filing Loss or compromise of classified information Any unofficial contact with foreign nationals If a member of the individual s immediate family is a citizen or resident of a foreign country Any potential employment or service with a foreign government, organization, entity or interest If a cleared individual is aware of any security violation he/she or another cleared individual have committed, then he/she shall promptly report the violation to IP Security (ipsecurity@hq.dhs.gov). 23 RELIABILITY ACCOUNTABILITY
24 Report of Foreign Travel All foreign travel, both business and leisure, should be reported in advance of departure. Contact IP Security to obtain a Notification of Foreign Travel Form. For foreign travel not reported in advance, the form should still be completed and submitted to IP Security. 24 RELIABILITY ACCOUNTABILITY
25 Report of Foreign Travel 25 RELIABILITY ACCOUNTABILITY
26 Deactivation of a clearance DHS will deactivate a clearance for any of the following reasons: Failure to complete annual security refresher training Change in employment (a new DHS Form 9014 must be submitted to reactivate) Change in Name Change in citizenship No access to classified information for more than one (1) year 26 RELIABILITY ACCOUNTABILITY
27 Termination of Need to Know Upon leaving his/her position of employment and/or no longer retaining a need to know with regards to classified information, the cleared individual shall contact IP Security (ipsecurity@hq.dhs.gov) and the PSCP Administrator (PSCP@hq.dhs.gov) to commence the debriefing process and removal from the program. 27 RELIABILITY ACCOUNTABILITY
28 How to use your clearance Reach out to their local PSAs, Fusion Centers ( Federal Bureau of Investigation Field Offices, Secret Service Offices, and other Federal partners Introduce yourselves and provide subject matter expertise as required This strengthens the public private partnership, Gives awareness of points of contact at secured facilities and dates of classified meetings or briefings of interest Permanent Certification, or perm cert, allows a person who is cleared through one U.S. Federal Department or Agency to have his/her clearance passed to another U.S. Federal Department or Agency for a period of up to one year. 28 RELIABILITY ACCOUNTABILITY
29 How to use your clearance Developing Unclassified Documents and Tearlines Integrate threat analysis efforts with the ES ISAC to develop industry guidance and alerts The bidirectional sharing of information can help the federal partners evaluate intelligence data and provide feedback on industry issues of concern Individuals cleared at the appropriate level may also have greater awareness of, and potentially access to, tools and technologies that will enhance the information sharing process. 29 RELIABILITY ACCOUNTABILITY
30 How to use your clearance Cybersecurity Risk Information Sharing Program (CRISP) National Cyber Investigative Joint Task Force The joint meetings between the ESCC and Government Executives to develop strategic level policy Electricity industry representatives may provide assistance during national incident response operations. 30 RELIABILITY ACCOUNTABILITY
31 References NERC CIPC Personnel Security Clearance Task Force (PSCTF) Report: 0Task%20Force%20PSCTF%20201/Personnel%20Security%20Clearances%2 0Task%20Force%20Report.pdf DHS Form 9014: ESCC Security Clearance Handbook: Coming Soon 31 RELIABILITY ACCOUNTABILITY
32 Questions? Nathan Mitchell ESCC Clearance Liaison
Personnel Security Clearance Task Force (PSCTF) Report Discussion DRAFT
Personnel Security Clearance Task Force (PSCTF) Report Discussion DRAFT 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com 1 of 22 Table of Contents Table of Contents...
More informationElectricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013
Electricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013 Purpose and Scope The purpose of the Electricity Sub-Sector Coordinating Council (ESCC) is to facilitate and support
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Regional Resiliency Assessment Program 2015 State Energy Risk Assessment Workshop April
More informationERO Enterprise IT Projects Update
ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT
More informationInformation Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure
This document is scheduled to be published in the Federal Register on 07/18/2017 and available online at https://federalregister.gov/d/2017-15068, and on FDsys.gov 9110-9P P DEPARTMENT OF HOMELAND SECURITY
More informationStandards. Howard Gugel, Director of Standards Board of Trustees Meeting February 11, 2016
Standards Howard Gugel, Director of Standards Board of Trustees Meeting February 11, 2016 Balancing Authority Reliability-based Controls Reliability Benefits Data requirements for Balancing Authority (BA)
More informationCritical Infrastructure Protection Committee Strategic Plan
Critical Infrastructure Protection Committee Strategic Plan 2013-2016 CIPC Executive Committee 5/14/2013 3353 Peachtree Road NE Suite 600, North Tower Atlanta, Georgia 30326 404-446-2560 www.nerc.com Table
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationGrid Security & NERC
Grid Security & NERC Janet Sena, Senior Vice President, Policy and External Affairs Southern States Energy Board 2017 Associate Members Winter Meeting February 27, 2017 Recent NERC History Energy Policy
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationCritical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.
Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships May 17, 2016 Overview Regional Overview Project Overview Background and
More informationIndustry Webinar. Project Modifications to CIP-008 Cyber Security Incident Reporting. November 16, 2018
Industry Webinar Project 2018-02 Modifications to CIP-008 Cyber Security Incident Reporting November 16, 2018 Agenda Presenters Standard Drafting Team NERC Staff - Alison Oswald Administrative Items Project
More informationSTANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season
STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationFERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC
: ERO Performance and Initiatives June 4, 2015 Chairman Bay, Commissioners, and fellow panelists, I appreciate the opportunity to address the topics identified for the third panel of today s important
More informationProject Physical Security Directives Mapping Document
Document Background In Order No. 802 (final order on CIP-014-1 Physical Security), issued on November 20, 2014, FERC directed NERC to remove the term widespread from Reliability Standard CIP-014-1 or,
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More information2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY
2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY The New Jersey Office of Homeland Security and Preparedness () offers internships to a select group of applicants. These are part-time, unpaid internships for
More informationBriefing to National Association of Regulatory Utility Commissioners
Critical Infrastructure Threat Information Sharing Framework Briefing to National Association of Regulatory Utility Commissioners February 12, 2017 The Info Sharing Problem 2 Because I m a Government Employee
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationGrid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016
Grid Security & NERC Council of State Governments The Future of American Electricity Policy Academy Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 1965 Northeast blackout
More informationFederal Information Sharing Resources for Small and Midsize Businesses
Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationPresidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationCompliance Monitoring and Enforcement Program Technology Project Update
Compliance Monitoring and Enforcement Program Technology Project Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee
More informationIndustry role moving forward
Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013
More informationHPH SCC CYBERSECURITY WORKING GROUP
HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationOPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith
OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationNERC Staff Organization Chart 2015 Budget
NERC Staff Organization Chart President and CEO (Dept. 2100) Executive Assistant (Dept. 2100) Associate Director, Member Relations and MRC Secretary (Dept. 2100) Senior Vice President and Chief Reliability
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationCommittee on National Security Systems. CNSS Policy No. 14 November 2002
Committee on National Security Systems CNSS Policy No. 14 November 2002 National Policy Governing the Release of Information Assurance (IA) Products and Services to Authorized U.S. Persons or Activities
More informationIntroduction to HSIN Basics (HSIN 101)
Introduction to HSIN Basics (HSIN 101) What is HSIN? Learning Objectives What are Mission Advocates? How is HSIN used? What are HSIN features? How to join HSIN? What are HSIN Document Management Best Practices?
More informationElection Infrastructure Security: The How and Why of It
Election Infrastructure Security: The How and Why of It Minnesota County Auditor Election Training Conference May 3, 2018 Contents Election Infrastructure Security Overview Cyber and Physical Security
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationWelcome Mike Kraft, MRO SAC Member
11/16/2016 Welcome Mike Kraft, MRO SAC Member Basin Electric Power Cooperative Please submit questions to the meeting moderator. Questions will be answered at the end of the webinar. NOTICE The is an industry
More informationPresented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I)
PSMO-I Personnel Security Update July 2016 Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate Adjudicate
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationUNITED STATES OFFICE OF PERSONNEL MANAGEMENT
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationProject Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives
Project 2014-02 - Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Violation Risk Factor and Justifications The tables
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationSouth Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises
STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region VIII The State,
More informationLive Webinar: Best Practices in Substation Security November 17, 2014
Live Webinar: Best Practices in Substation Security November 17, 2014 1 Agenda & Panelists Welcome & Introduction - Allan Wick, CFE, CPP, PSP, PCI, CBCP Enterprise Security Manager-CSO Tri-State Generation
More informationAskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST
AskPSMO-I For audio, dial: 1-888-946-3805 Enter participant code: 8672177 Security Violations Zaakia Bailey Defense Security Service October 28, 2014 1:30 PM EST Dashboard Announcements SWFT JPAS OPM PSMO-I
More informationCybersecurity: Federalism as Defense-in-Depth
SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:
More informationCritical Infrastructure Partnership
Critical Infrastructure Partnership Overview Chris Boyer AVP Global Public Policy December 11, 2017 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV
More informationOffice of Infrastructure Protection Overview
Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team
ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2012 What s Inside Welcome 1 Organization 3 Outreach 4 Industrial Control Systems Joint Working Group 5 Advanced Analytical
More informationCyber Security Incident Report
Cyber Security Incident Report Technical Rationale and Justification for Reliability Standard CIP-008-6 January 2019 NERC Report Title Report Date I Table of Contents Preface... iii Introduction... 1 New
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationIncident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014
Incident Requirements and Process Clarification Disposition and FAQ 11/27/2014 Table of Contents 1. Incident Requirements and Process Clarification Disposition... 3 2. Incident Requirements and Process
More informationNational Infrastructure Resilience
National Infrastructure Resilience James Kish Electric Infrastructure Security Council (EIS C) California Utilities Emergency Association June 22, 2017 jim.kish@eiscouncil.org 1 Discussion Outline What
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationProtecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors
Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program
More informationTexas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13
Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Physical Enterprise Physical Enterprise Monitoring is the monitoring of the physical and environmental controls that
More informationPrivacy Impact Assessment for the National Cyber Security Division Joint Cybersecurity Services Pilot (JCSP) DHS/NPPD-021.
for the National Cyber Security Division Joint Cybersecurity Services Pilot (JCSP) DHS/NPPD-021 January 13, 2012 Contact Point Brendan Goode Director, Network Security Deployment National Cyber Security
More informationDonor Countries Security. Date
PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information
More informationMeredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018
Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Overview POSITION STATEMENTS Position Statements Purpose To document and analyze policy and/or standardized surveillance
More information2011 North American SCADA & Process Control Summit March 1, 2011 Orlando, Fl
Beyond Compliance Greg Goodrich Supervisor, Enterprise Security New York Independent System Operator 2011 North American SCADA & Process Control Summit March 1, 2011 Orlando, Fl Roles of the NYISO Reliable
More informationJim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas
Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas Facts expressed in this presentation are Facts Opinions express in this presentation are solely my own The voices I
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More information