TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017

Similar documents
Cybersecurity Overview

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Cybersecurity Auditing in an Unsecure World

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

NW NATURAL CYBER SECURITY 2016.JUNE.16

Designing and Building a Cybersecurity Program

Standard Development Timeline

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

Sneak Peak at CIS Critical Security Controls V 7 Release Date: March Presented by Kelli Tarala Principal Consultant Enclave Security

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Why you should adopt the NIST Cybersecurity Framework

Cyber Security Incident Report

Ontario Energy Board Cyber Security Framework

Framework for Improving Critical Infrastructure Cybersecurity

K12 Cybersecurity Roadmap

External Supplier Control Obligations. Cyber Security

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

MITIGATE CYBER ATTACK RISK

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Standard CIP 007 4a Cyber Security Systems Security Management

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

TSC Business Continuity & Disaster Recovery Session

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

The NIST Cybersecurity Framework

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Australian Energy Sector Cyber Security Framework. Frequently Asked Questions FINAL V1-0

The NIS Directive and Cybersecurity in

Data Security and Privacy Principles IBM Cloud Services

Bringing Cybersecurity to the Boardroom Bret Arsenault

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP Cyber Security Systems Security Management

SECURITY & PRIVACY DOCUMENTATION

Business Continuity Management Standards A Side-by-Side Comparison

Consolidation Committee Final Report

Emerging Issues: Cybersecurity. Directors College 2015

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cybersecurity and the Marine Transportation System.

Certified Information Security Manager (CISM) Course Overview

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cyber Resilience. Think18. Felicity March IBM Corporation

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

FDIC InTREx What Documentation Are You Expected to Have?

Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist

AUTHORITY FOR ELECTRICITY REGULATION

Structuring Security for Success

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Industrial Control System Cyber Security

Grid Security & NERC

Bradford J. Willke. 19 September 2007

Security Standards for Electric Market Participants

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Cybersecurity Roadmap: Global Healthcare Security Architecture

The Common Controls Framework BY ADOBE

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

IPM Secure Hardening Guidelines

Information Security Incident Response Plan

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Network and Information Security Directive

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

CYBER SECURITY POLICY REVISION: 12

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

TAN Jenny Partner PwC Singapore

THE TRIPWIRE NERC SOLUTION SUITE

Industry role moving forward

John Snare Chair Standards Australia Committee IT/12/4

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Information Security Incident Response Plan

Incident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

Project Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Global Statement of Business Continuity

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Critical Infrastructure Protection Version 5

Canada Life Cyber Security Statement 2018

Heavy Vehicle Cyber Security Bulletin

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION ) ) ) COMMENTS OF THE LARGE PUBLIC POWER COUNCIL

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Security Hygiene. Be in a defensible position. Be cyber resilient. November 8 th, 2017

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

The Evolving Threat to Corporate Cyber & Data Security

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

2015 HFMA What Healthcare Can Learn from the Banking Industry

Improving Cybersecurity through the use of the Cybersecurity Framework

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Transcription:

TACOMA PUBLIC UTILITIES CYBERSECURITY PROGRAM NIAC WORKSHOP JUNE 2017

AGENDA TPU Cybersecurity Program Overview Document Management & Program Governance Compliance Driven Best Practices Protect, Detect, and Recover The Future Challenges Information Sharing June 23, 2017 2

TPU CYBER SECURITY ORGANIZATION TPU Cyber Stewards Committee 3

MATURITY MODEL* Current State Dedicating resources within UTS to Cybersecurity Program started, but governance driven primarily from regulatory obligations Event detection and response exists largely for CIP Ad-hoc interaction with change, problem, & incident management Cyber Security Maturity Level 2 Electric & Utility Benchmark 3.8 TPU Maturity Target - 4 Future State Leverage NIST Framework for High, Medium, and Low Cybersecurity Activities Monitoring & reporting on key security metrics to all levels of management UTS Cybersecurity organization well established Able to rapidly tailor security controls as required * Source: Gartner, Inc. ITScore 4

GOAL A TPU-wide approach to policy management A common document taxonomy, standard templates and naming conventions A central location to store policy and related documents A work flow driven process to propagate documents for review, approval, and disposition June 23, 2017 5

TAXONOMY Policy (management statements) Standards (specific mandatory controls) Plans & Guidelines (recommendations / best practices) Procedures (step by step instructions) City & TPU Executive Management Management Execution

COMPLIANCE DRIVEN BEST PRACTICES: PROTECT Protect Reducing our Risk of Exposure System hardening Removing unnecessary applications Anti-malware/Patching Standardization of equipment, architecture, and configurations Access Control Multi-factor Authentication Role Based Access Physical Security Role Based Access Monitoring Recording 7

COMPLIANCE DRIVEN BEST PRACTICES : DETECT Detect Network Intrusion Detection System (IDS) Full Packet Capture on our boundary Security Information and Event Monitoring (SIEM) Logging and Analysis Log Correlation 84% of organizations that had a security breach had evidence of that breach in their log files -- 2013 Data Breach Investigations Report 8

COMPLIANCE DRIVEN BEST PRACTICES : RECOVER Recover Backups Distributed Backup solution Off-site Storage Cloud Ready Disaster Recovery Multi-site Model Incident Response Plans Annual Testing 9

WHAT DOES THE FUTURE LOOK LIKE Leverage Efforts and Capabilities Resulting from Compliance Policy, Standards and Guidelines Expand Scope and Assess using an Industry Framework Develop, Implement, and Measure a Training and Awareness Program Hire, Train, and Retain our Technical Workforce 10

CHALLENGES Organizational Change Management Major Technology Transformation Programs taking off before Cybersecurity is Formally Integrated in Project Delivery Tools, Processes, and Procedures must be Automated City IT & TPU Maturity, Synchronization of Efforts, Communication Formalizing Risk Acceptance to Information Management We are not alone June 23, 2017 11

INFORMATION SHARING Local Partners: Snohomish PUD Seattle City Light Chelan County PUD Washington State Fusion Center Washington Air and Army National Guard Washington State Agencies and Office of Cybersecurity University of Washington (Seattle and Tacoma) National Partners: Large Public Power Counsel Cyber Security Task Force (LPPC CSTF) FBI Cyber Taskforce Industrial Control System Cyber Emergency Response Team (ICS- CERT) Washington State Air National Guard 262 nd Network Warfare Squadrons Electric Subsector Information Sharing and Analysis Center (ES- ISAC) Multi State Information Sharing and Analysis Center (MS-ISAC) And Many More June 23, 2017 12

QUESTIONS 13