DEFENSE LOGISTICS AGENCY

Similar documents
DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Cybersecurity Overview

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

NW NATURAL CYBER SECURITY 2016.JUNE.16

Cyber Resilience. Think18. Felicity March IBM Corporation

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

DoD Strategy for Cyber Resilient Weapon Systems

AMRDEC CYBER Capabilities

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

The Perfect Storm Cyber RDT&E

The U.S. Coast Guard s Role in Cybersecurity

Cybersecurity in Acquisition

It s all about Trust! Public-Private Shared Cyber Threat Situational Capability National Pilot in Hawaii

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Why you should adopt the NIST Cybersecurity Framework

Critical Infrastructure Sectors and DHS ICS CERT Overview

Supplier Training Excellence Program

DISA Cybersecurity Service Provider (CSSP)

CALIFORNIA CYBERSECURITY TASK FORCE

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

PIPELINE SECURITY An Overview of TSA Programs

Federal Information Sharing Resources for Small and Midsize Businesses

Statement for the Record

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

The Office of Infrastructure Protection

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

DHS Cybersecurity: Services for State and Local Officials. February 2017

HPH SCC CYBERSECURITY WORKING GROUP

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Industry role moving forward

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Cyber Attacks & Breaches It s not if, it s When

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

align security instill confidence

Space Cyber: An Aerospace Perspective

Cybersecurity Test and Evaluation

Office of Infrastructure Protection Overview

The Office of Infrastructure Protection

Implementing Executive Order and Presidential Policy Directive 21

FAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Forecast to Industry Program Executive Office Mission Assurance/NetOps

National Policy and Guiding Principles

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

The NIST Cybersecurity Framework

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Task Force Cyber Secure

The Role of the ISACs in Critical Infrastructure Resilience Presented by Steve Lines Executive Director Defense Industrial Base Information Sharing

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Next Generation Enterprise Network- Recompete (NGEN-R) Industry Day

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Region Snapshot Regions I and II

TEL2813/IS2621 Security Management

Section One of the Order: The Cybersecurity of Federal Networks.

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

INFORMATION ASSURANCE DIRECTORATE

Water Information Sharing and Analysis Center

I n t e g r i t y - S e r v i c e - E x c e l l e n c e

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

Information Warfare Industry Day

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Cyber Security Challenges

ISAO SO Product Outline

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

National Initiative for Cybersecurity Education

Election Infrastructure Security: The How and Why of It

NATIONAL ELECTRIC GRID SECURITY AND RESILIENCE ACTION PLAN

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Framework for Improving Critical Infrastructure Cybersecurity

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

SDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND

Control Systems Cyber Security Awareness

Department of Defense. Installation Energy Resilience

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Cyber T&E Standards Panel

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Integrated C4isr and Cyber Solutions

Transcription:

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Resilience Integration Mr. Linus Baker DLA Information Operations Director, Cybersecurity 1

Mission Assurance/Cybersecurity Concern Indicators In line with the DOD s Cyber Strategy.DLA s primary cyberspace mission is 1) Provide integrated cyberspace capabilities in support of DLA s global logistics mission; and 2) Defend DLA s cyberspace operating environment-cyber terrain landscape that enables critical business processes Thousands of non-it suppliers contributing to the operational resilience of DLA s global supply chain operations 9 Supply Chains all with extended non-it vendor reliant or operated IT/OT dependencies and enabling capabilities beyond the.mil domain Concerns with the lack of opacity in some operationally critical demand signals linked to CONUS/OCONUS logistics operations extending to vendors

Cyber Resilience Integration Initiative Cyber Program Management Office Cyber Resilience Integration Plan Key Cyber Terrain Enhance Workforce Awareness and Education Collaborating with key Commercial Suppliers/Defense Industrial Base (DIB) Partners Opportunities to partner with DOD organizations in enhancing our Cyber Resilience Integration capability ISAC/ISAO Measuring Cyber Risk and Operational Readiness of DLA Supply Chains USTRANSCOM U.S. Navy DISA Binding Bi-lateral Cybersecurity Requirements Cyber Laws, Policy, Directives, & Instructions

Cyber Resilience achieved through a DLA Cybersecurity Framework Workforce Identify People Recover Governance Protect Processes Customers Technology Respond Detect Suppliers

Mission Assurance - Cyber Resilience Cyber Terrain: Those physical and logical elements of the cyber domain that enable mission essential warfighting functions Cyber Resilience Integration: Defining the Key Cyber Terrain and Operational Risks to DLA s Core Supply Chain Mission Partnering with Industry to Increase Information Sharing and Decrease Cybersecurity Vulnerabilities Merging Cyber Resiliency and Mission Assurance Best Practices to Obtain Operational Resilience Operational Technology (OT): Centralizing Programmatic Control of OT (e.g., ICS, SCADA) Assets under the CIO for Increased Cybersecurity Contingency Planning & IT COOP: Aligning Contingency Planning and IT COOP Efforts to Broader Cyber Resilience Strategy Prioritizing Supply Chain Criticality: Operationally Critical Contractor s/supplier s IT Infrastructure Security Postures Energy/Fuels Pipeline Control systems, Refinery Control Systems, Fuel Transport Systems Medical/Subsistence Prime Vendors Land Systems e.g., LTC Tire Production Cyber Resilience Mitigation Strategies: Upfront Cybersecurity Engagement in Acquisition Processes Alternate Business Process Planning IT Contingency Planning 3 rd Party Assessments Collaborative Information/Cyber Threat Intel Exchanges w/industry

Establishing and Securing DLA s Key Cyber Terrain Agency level coordination with Enterprise Process Owners and Supply Chain Owners to Identify Key DLA Cyber Assets that Directly Support DLA s Critical Business Processes Focus Critical Business Processes, Mission Essential Functions/Tasks & the identification of Critical Suppliers Establishment of DLA s Key Cyber Terrain Subsequently identifying & prioritizing Cyberrelated risk to DLA s global logistics mission Analyze DLA Key Cyber Assets - Determine Critical Infrastructure related assets and Mission Essential Task related assets

Partnerships - Information Sharing/Collaboration Defense Industrial Base Collaboration Information Sharing Environment (DCISE) Information Sharing and Analysis Organizations (IASOs) Information Sharing and Analysis Centers (ISACs): Defense Industrial Base ISAC Maritime Security ISAC Supply Chain ISAC Surface Transportation ISAC Cyber Information Sharing and Collaboration Program FBI Infragard DHS Cyber Security Evaluation Tool/NSA GRASSMARLIN

Key Defense Industrial Base Partners Defining Cyber Defense Standards Assurance of Key Terrain in Cyberspace Prioritize supply chain related risks and address applicable cybersecurity concerns with industry partners Security control implementation Blue Team/Penetration Testing 3 rd Party Assessors DFARS Clauses/Contractual Requirements

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY 10