Cyber Partnership Blueprint: An Outline

Size: px
Start display at page:

Download "Cyber Partnership Blueprint: An Outline"

Transcription

1 Approved for Public Release; Distribution Unlimited The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright , The MITRE Corporation. All rights reserved.

2 i Blueprint Outline: Cyber Exchange (Version 0.85) Contents Scope... 1 Blueprint Overview... 1 Lessons Learned & Challenges... 1 Business View... 1 Overview... 1 Understanding the Landscape... 1 Understanding the Potential Players... 1 Determining Industry Mix and Identifying Potential Participants... 1 Identifying Potential Organizing and Operating Entities... 2 Understanding Other Cybersecurity Players... 2 Articulating Differentiators and Value Proposition... 2 Developing an Approach for Reaching Out to Key Players... 2 Developing an Initial Charter for the Cyber Partnership... 2 Conducting the Pilot... 2 Recruiting Charter Members... 2 Developing and Executing Initial Participation Agreement... 2 Establishing Platforms for Sharing... 2 Start Sharing... 3 Transitioning to Operations... 3 Developing a Business Plan... 3 Partnership Overview... 3 Market Analysis... 3 Sharing Activities and Tools... 3 Operations... 3 Organization... 3 Finance... 3 Think Ahead... 3 Establish Timeline and Milestones... 3 List of References... 3 Operational View... 3 Overview... 3

3 ii Blueprint Outline: Cyber Exchange (Version 0.85) Establishing a Membership Model... 3 Types and Roles... 3 Eligibility... 4 Charter Members... 4 Establishing a Trust Framework... 4 Developing Non-Disclosure Agreement... 4 Finding Trusted Intermediaries... 4 Developing Member Trust... 4 Establishing a Sharing Model... 4 Developing a Sharing Incentive Framework... 4 Developing Rules of Behavior... 4 Defining Organizational Interactions... 4 Face-to-Face... 4 Virtual... 4 Technical Exchanges... 5 Executive Sessions... 5 Developing a Communications and Outreach Plan... 5 Defining Metrics... 5 Establishing a Timeline and Milestones... 5 Thinking Ahead... 5 List of References... 5 Infrastructure View... 5 Overview... 5 Establishing a Model for Sharing Cyber Threat Information... 5 Hub-and-Spoke... 5 Post-to-All... 5 Federated... 5 Hybrid... 5 Defining What You Are Sharing... 5 Developing Requirements for Sharing Tools... 5 Portal... 6 Collaboration... 6

4 Threat Repository... 6 Establishing Norms for Representing Threat Information... 6 Providing Secure Architecture for Sharing... 6 Thinking Ahead... 6 Establishing a Timeline and Milestones... 6 List of References... 6 iii

5 Scope The Cyber Partnership Blueprint ( Blueprint ) is a building plan for how an entity (public or private) can establish and operate a consortium (cyber partnership) for sharing unclassified cyber threat information. This outline will guide a series of online posts on Blueprint for Cyber Threat Sharing that will constitute the Blueprint. Brief notes appear under the various sections that describe the content that will be fleshed out in the Blueprint series. Those online posts will be periodically compiled into a single standalone Blueprint document. Blueprint Overview The major elements in the Blueprint are: Lessons Learned & Challenges: Do s and Don ts that make or break a cyber partnership. Business View: The foundation for getting a partnership up and running. Operational View: The foundation for sustaining effective operations. Infrastructure View: Establishing an enabling IT infrastructure. The Blueprint is augmented by examples of typical products (e.g., trust frameworks, non-disclosure agreements) that are needed to help form and sustain a cyber partnership. Lessons Learned & Challenges Lessons learned and challenges represent the Do s and Don ts and potential pitfalls that will help guide a cyber partnership s successful development and operations. These pointers, and the rest of the Blueprint, are shaped by MITRE s experiences over the years as a member of several sharing consortia. The lessons learned and challenges will be articulated in one of the posts in the Blueprint for Cyber Threat Sharing series. Business View Overview The business view explains why a business point of view is necessary; outlines a high-level perspective; and provides options for establishing and operating a cyber partnership. Understanding the Landscape This section outlines how each cyber security partnership should be set up to meet the specific needs of the region(s) or group it serves. Understanding the Potential Players Determining Industry Mix and Identifying Potential Participants 1

6 Identifying Potential Organizing and Operating Entities Understanding Other Cybersecurity Players Articulating Differentiators and Value Proposition Developing an Approach for Reaching Out to Key Players Developing an Initial Charter for the Cyber Partnership Establish Missions, Goals, and Objectives Define Principles and Values Develop Concept of Operations Blueprint Outline: Cyber Exchange (Version 0.85) Conducting the Pilot A pilot can be used to jump start cyber threat information sharing with a small group (3-7 organizations) of early adopters while more formal plans and operations are being developed. A pilot represents a proof-of-concept that allows participants to see for themselves the value of sharing information. It provides practical experiences that will inform the cyber partnership s full operational capability. The pilot informs, and is conducted in parallel with, Developing a Business Plan. Recruiting Charter Members Initial Contact Recruiting Meetings Developing and Executing Initial Participation Agreement Key Elements of the Participation Agreement Comments of Achieving Agreement Establishing Platforms for Sharing Annual Event Cyber Technical Exchanges Executive Sessions Establish Portal Security Operations Center Incident Response Vulnerability Assessments Training 2

7 Research and Development Start Sharing Transitioning to Operations This section describes how to transition from the initial operational capability established during the pilot phase to full and sustained operations. Developing a Business Plan The business plan sets the direction for the cyber partnership going forward and also establishes processes and models that ensure that the partnership can exist as an efficient and financially sound entity. The business plan is developed based on what is learned from understanding the landscape and conducting the pilot. The business plan should be a living document that continues to change as the cyber partnership evolves. Partnership Overview Market Analysis Sharing Activities and Tools Operations Organization Finance Think Ahead This describes the elements to consider for long-term strategic operations. Establish Timeline and Milestones This describes a basic timeline and milestones for establishing an initial operational capability. List of References Operational View Overview The operational view builds on the lessons learned and products from the business view to more formally defining the processes needed to sustain the operation and evolution of a consortium for cyber threat information sharing. Establishing a Membership Model This describes the characteristics, advantages, and challenges of different compositions of members in a consortium. Types and Roles 3

8 Sector Regional Cross-Domain Government Universities Industry Non-Profit Eligibility Entry Vetting Approval Sanctions Charter Members Establishing a Trust Framework This describes the functional requirements of a framework that facilitates developing trust among members so that sharing valued cyber threat information can occur. Developing Non-Disclosure Agreement Finding Trusted Intermediaries Developing Member Trust Establishing a Sharing Model This describes the functional requirements for a model that facilitates the process of sharing cyber threat information. Developing a Sharing Incentive Framework Developing Rules of Behavior Defining Organizational Interactions This describes the functional requirements for several styles of organizational interactions among a sharing consortium s members and leadership. Interactions with external stakeholders are also addressed. Face-to-Face Virtual 4

9 Technical Exchanges Executive Sessions Developing a Communications and Outreach Plan This describes the functional requirements for a communications plan to internally engage with consortium members and externally engage with stakeholders. Defining Metrics This describes the functional requirements for success measurements. Establishing a Timeline and Milestones This describes a basic timeline and milestones for maintaining operations. Thinking Ahead This describes the elements to consider for long-term strategic operations. List of References Infrastructure View Overview The infrastructure view leverages lessons learned and products from both the business and operational views to mature the technical products and IT infrastructure needed to sustain a sharing consortium s long-term operation and evolution. Establishing a Model for Sharing Cyber Threat Information This describes different types of models for sharing cyber threat information. Hub-and-Spoke Post-to-All Federated Hybrid Defining What You Are Sharing This describes the different types of threat information that is typically shared and how to represent that information in a structured manner suitable for both automated and cyber analyst ingestion. Developing Requirements for Sharing Tools This provides the functional requirements of a core set of software tools and capabilities that facilitate sharing. 5

10 Portal Collaboration Threat Repository Establishing Norms for Representing Threat Information This describes the role of cyber standards in sharing cyber threat information. Providing Secure Architecture for Sharing This describes the elements and functional requirements for the secure automated exchange of cyber threat information among the consortium members. Thinking Ahead This describes the elements to consider for long-term strategic operations. Establishing a Timeline and Milestones This describes a basic timeline and milestones for long-term strategic operations. List of References 6

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security The CIS Security Metrics & Benchmarking Service Clint Kreitner The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a not-for-profit public-private partnership

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014 2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating

More information

Summary of Consultation with Key Stakeholders

Summary of Consultation with Key Stakeholders Summary of Consultation with Key Stakeholders Technology and Communications Sector Electronic Manufacturing Services & Original Design Manufacturing Software & IT Services Hardware Semiconductors Telecommunication

More information

Achieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting)

Achieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting) Achieving & Measuring the Value of Cyber Threat Information Sharing Lindsley Boiney, Clem Skorupka (presenting) The MITRE Corporation 2018 International Information Sharing Conference McLean, VA 2 Acknowledgements

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships. Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships May 17, 2016 Overview Regional Overview Project Overview Background and

More information

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

California State Updates. Presenter: David A. Minch, President & COO, HealthShare Bay Area

California State Updates. Presenter: David A. Minch, President & COO, HealthShare Bay Area California State Updates Presenter: David A. Minch, President & COO, HealthShare Bay Area 1 Trust is the Foundation for Health Data Exchange Patients must trust the Providers to hold their data securely,

More information

Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved?

Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved? Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved? Use cases, best practice and examples for successful implementations 1 Agenda Overview of The

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Introduction This note sets out a business model for a Global Platform

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary For Immediate Release September 23, 2014 EXECUTIVE ORDER - - - - - - - CLIMATE-RESILIENT INTERNATIONAL DEVELOPMENT By the authority vested in me as President

More information

Integrated Cyber Defense Working Group (ICD WG) Introduction

Integrated Cyber Defense Working Group (ICD WG) Introduction Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015

The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 The Africa Utilities Telecom Council Johannesburg CC, South Africa 1 st December, 2015 Utilities Telecom Council Global Focus on Utility Information and Communications Technology (ICT) Formed more than

More information

DHS Election Task Force Updates. Geoff Hale, Elections Task Force

DHS Election Task Force Updates. Geoff Hale, Elections Task Force 1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

FERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC

FERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC : ERO Performance and Initiatives June 4, 2015 Chairman Bay, Commissioners, and fellow panelists, I appreciate the opportunity to address the topics identified for the third panel of today s important

More information

University of Texas Arlington Data Governance Program Charter

University of Texas Arlington Data Governance Program Charter University of Texas Arlington Data Governance Program Charter Document Version: 1.0 Version/Published Date: 11/2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE OF THIS DOCUMENT... 3 1.2 SCOPE...

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Conducting a Self-Assessment of a Long-Term Archive for Interdisciplinary Scientific Data as a Trustworthy Digital Repository

Conducting a Self-Assessment of a Long-Term Archive for Interdisciplinary Scientific Data as a Trustworthy Digital Repository Conducting a Self-Assessment of a Long-Term Archive for Interdisciplinary Scientific Data as a Trustworthy Digital Repository Robert R. Downs and Robert S. Chen Center for International Earth Science Information

More information

Private Sector Clearance Program (PSCP) Webinar

Private Sector Clearance Program (PSCP) Webinar Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance

More information

Critical Infrastructure Protection Committee Strategic Plan

Critical Infrastructure Protection Committee Strategic Plan Critical Infrastructure Protection Committee Strategic Plan 2013-2016 CIPC Executive Committee 5/14/2013 3353 Peachtree Road NE Suite 600, North Tower Atlanta, Georgia 30326 404-446-2560 www.nerc.com Table

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

MEDICAL DEVICE CYBERSECURITY: FDA APPROACH

MEDICAL DEVICE CYBERSECURITY: FDA APPROACH MEDICAL DEVICE CYBERSECURITY: FDA APPROACH CYBERMED SUMMIT JUNE 9TH, 2017 SUZANNE B. SCHWARTZ, MD, MBA ASSOCIATE DIRECTOR FOR SCIENCE & STRATEGIC PARTNERSHIPS CENTER FOR DEVICES AND RADIOLOGICAL HEALTH

More information

MDISS Webinar. Medical Device Vulnerability Intelligence Program for Evaluation and Response (MD-VIPER)

MDISS Webinar. Medical Device Vulnerability Intelligence Program for Evaluation and Response (MD-VIPER) Welcome to today s NH-ISAC & MDISS Webinar Medical Device Vulnerability Intelligence Program for Evaluation and Response (MD-VIPER) 1 Agenda Everyone Denise Anderson Speaker Name Speaker Institution Topic

More information

State of South Carolina Interim Security Assessment

State of South Carolina Interim Security Assessment State of South Carolina Interim Security Assessment Deloitte & Touche LLP Date: October 28, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is

More information

(60 min) California State Updates

(60 min) California State Updates (60 min) California State Updates Presenters: 30 min Speranza Avram, CEO, CalHIPSO: EHR status & uptake in CA 20 min David A. Minch, President & COO, HealthShare Bay Area: HIE status 10 min Questions 1

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

HPH SCC CYBERSECURITY WORKING GROUP

HPH SCC CYBERSECURITY WORKING GROUP HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership

More information

Memorandum of Understanding between the Central LHIN and the Toronto Central LHIN to establish a Joint ehealth Program

Memorandum of Understanding between the Central LHIN and the Toronto Central LHIN to establish a Joint ehealth Program Memorandum of Understanding between the Central LHIN and the Toronto Central LHIN to establish a Joint ehealth Program Purpose This Memorandum of Understanding (MOU) defines the terms of a joint ehealth

More information

Medical Device Cybersecurity: FDA Perspective

Medical Device Cybersecurity: FDA Perspective Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology Awareness as a Cyber Security Vulnerability Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology Background TSA Cyber Security Awareness and Outreach (CSAO)

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Enabling Collaboration for Digital Preservation

Enabling Collaboration for Digital Preservation Enabling Collaboration for Digital Preservation ipres 2009, San Francisco Martha Anderson The Library of Congress .trust and reciprocity lengthen the shadow of the future. Axelrod,The Evolution of Cooperation,1984.

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing 2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing Powered by the Retail ISAC, A Division of the R-CISC Overview Last October,

More information

Track 1 // Collaboration & Partnerships

Track 1 // Collaboration & Partnerships Track 1 // Collaboration & Partnerships 1.1 Designate Single Point of Contact to serve as an consistent entry point for companies seeking to deploy in San Francisco. There is often a lack of trust and

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO Kristen Baldwin, OUSD(AT&L)/DS

DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO Kristen Baldwin, OUSD(AT&L)/DS DoD Software Assurance Initiative Mitchell Komaroff, OASD (NII)/DCIO Kristen Baldwin, OUSD(AT&L)/DS Agenda Background Software Assurance Definition Guiding Principles for SwA DoD SwA Strategy Elements»

More information

DLA Energy Panel: Energy Resiliency and Assurance

DLA Energy Panel: Energy Resiliency and Assurance DLA Energy Panel: Energy Resiliency and Assurance U.S. Air Force Office of Energy Assurance Mr. Shawn Bennett, Senior Advisor 12 April 2017 Installation Energy Is Mission Critical AVIATION ~5,517 Aircraft

More information

SECURITY INCIDENT MANAGEMENT. Solution Primer. Jenn Black. Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv

SECURITY INCIDENT MANAGEMENT. Solution Primer. Jenn Black. Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv SECURITY INCIDENT MANAGEMENT Solution Primer Jenn Black Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv Introduction Today, the capability to respond effectively to

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD)

Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal Analytics Database (CLAD) Randall Sandone, CCISO Executive Director Critical Infrastructure Resilience Institute rsandone@illinois.edu Cyber Secure Dashboard Cyber Insurance Portfolio Analysis of Risk (CIPAR) Cyber insurance Legal

More information

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Public Power Forward Challenges & Opportunities

Public Power Forward Challenges & Opportunities Public Power Forward Challenges & Opportunities SUE KELLY President & CEO American Public Power Association 2015 ElectriCities of NC Annual Conference August 7, 2015 APPA Members 1400+ public power utilities

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

Be Like Water: Applying Analytical Adaptability to Cyber Intelligence

Be Like Water: Applying Analytical Adaptability to Cyber Intelligence SESSION ID: HUM-W01 Be Like Water: Applying Analytical Adaptability to Cyber Intelligence Jay McAllister Senior Analyst Software Engineering Institute Carnegie Mellon University @sei_etc Scuttlebutt Communications

More information

EMVO FMD Workshop Brussels 13. December 2016

EMVO FMD Workshop Brussels 13. December 2016 EMVO FMD Workshop Brussels 13. December 2016 State of Play EMVS and connected Systems Markus Gerigk, Andreas Walter dd/mm/yyyy Content Introduction Trust and Team Building Systems Implementation Conclusion

More information

South Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises

South Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises STATE, LOCAL, TRIBAL, AND TERRITORIAL GOVERNMENT COORDINATING COUNCIL REGIONAL CONSORTIUM COORDINATING COUNCIL Regional Overview of Critical Infrastructure Programs Region Snapshot Region VIII The State,

More information

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre From Hyogo to Sendai Anoja Seneviratne Disaster Management Centre Milestone Event in the Year 2015 New York in September 2015 to World Conference define voluntary on Disaster Risk Sustainable Reduction

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

Information Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011

Information Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011 Information Technology Information Sharing and Analysis Center First Symposium Barcelona, Spain Feb. 2, 2011 About Us Non Profit, US Corporation established in 2000 and operational in 2001 Fully funded

More information

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne Schwartz, Assoc. Dir., CDRH, FDA Denise Anderson, MBA, President,

More information

National Cyber Security Strategy (NCS) Toolkit

National Cyber Security Strategy (NCS) Toolkit National Cyber Security Strategy (NCS) Toolkit Let s create a toolkit to help states to develop or improve their national cyber security strategies Examples of Topics To Be Addressed The role, objectives

More information

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Regional Resilience: Prerequisite for Defense Industry Base Resilience Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership

More information

DoD Software Assurance (SwA) Update

DoD Software Assurance (SwA) Update DoD Software Assurance (SwA) Update Systems and Software Technology Conference May 2, 2006 Ms. Kristen Baldwin OUSD(AT&L)/Defense Systems kristen.baldwin@osd.mil Briefing Agenda Problem Definition Vision

More information

WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES

WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES WRI ROSS CENTER FOR SUSTAINABLE CITIES 2 Supporting partners to create local solutions by adapting,

More information

Preparatory process of the second High-level United Nations Conference on South-South Cooperation

Preparatory process of the second High-level United Nations Conference on South-South Cooperation United Nations A/72/711 General Assembly Distr.: General 29 January 2018 Original: English Seventy-second session Agenda item 24 (b) Operational activities for development: South-South cooperation for

More information

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, 2017 14TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS 1 Fact vs. Myth Let s Play: Fact vs. Myth The FDA is the federal entity

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

Mr. Games, Thank you. Kent Landfield McAfee, LLC. [Attachment Copied Below]

Mr. Games, Thank you. Kent Landfield McAfee, LLC. [Attachment Copied Below] From: Landfield, Kent Date: Mon, Apr 10, 2017 at 4:05 PM Subject: Intel and McAfee Comments on Draft Update of the Framework for Improving Critical Infrastructure Cybersecurity To: "cyberframework@nist.gov"

More information

IT Modernization In Brief

IT Modernization In Brief IT Modernization In Brief WHAT YOU NEED TO KNOW Quick tips & facts about IT modernization from GovLoop Executive Summary Today, IT modernization the continuous updating of IT and technology infrastructure

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus Cybersecurity governance in Europe Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus ska@unipi.gr Elements of a national cybersecurity strategy Set the vision,

More information

Office of Acquisition Program Management (OAPM)

Office of Acquisition Program Management (OAPM) Office of Acquisition Program Management (OAPM) Ron Gallihugh Assistant Administrator Airport Consultants Council July 18, 2017 Acquisition Reform Historically, Transportation Security Administration (TSA)

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

Creating a Corporate Taxonomy. Internet Librarian November 2001 Betsy Farr Cogliano

Creating a Corporate Taxonomy. Internet Librarian November 2001 Betsy Farr Cogliano Creating a Corporate Taxonomy Internet Librarian 2001 7 November 2001 Betsy Farr Cogliano 2001 The MITRE Corporation Revised October 2001 2 Background MITRE is a not-for-profit corporation operating three

More information

April 17, Ronald Layne Manager, Data Quality and Data Governance

April 17, Ronald Layne Manager, Data Quality and Data Governance Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need April 17, 2015 Ronald Layne Manager, Data Quality and

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information