Federal Information Sharing Resources for Small and Midsize Businesses

Similar documents
Department of Homeland Security Updates

DHS Cybersecurity: Services for State and Local Officials. February 2017

Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST)

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Cybersecurity Overview

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Election Infrastructure Security: The How and Why of It

U.S. Department of Homeland Security Office of Cybersecurity & Communications

The Office of Infrastructure Protection

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

ISAO SO Product Outline

The Office of Infrastructure Protection

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

California Cybersecurity Integration Center (Cal-CSIC)

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.

The Office of Infrastructure Protection

National Policy and Guiding Principles

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Media Kit. California Cybersecurity Institute

The Office of Infrastructure Protection

PIPELINE SECURITY An Overview of TSA Programs

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Private Sector Clearance Program (PSCP) Webinar

Office of Infrastructure Protection Overview

OAS Cybersecurity Capacity Building Efforts

Critical Infrastructure Sectors and DHS ICS CERT Overview

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Information Collection Request: The Department of Homeland. Security, Stakeholder Engagement and Cyber Infrastructure

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

Briefing to National Association of Regulatory Utility Commissioners

HPH SCC CYBERSECURITY WORKING GROUP

The National Network of Fusion Center: Where We Have Been and Where We are Going

Grid Security & NERC

CALIFORNIA CYBERSECURITY TASK FORCE

DHS Emergency Services Sector Presents Tools and Resources for First Responders. June 1, pm ET

Water Information Sharing and Analysis Center

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Statement for the Record

Region Snapshot Regions I and II

MDISS Webinar. Medical Device Vulnerability Intelligence Program for Evaluation and Response (MD-VIPER)

South Dakota Utah Wyoming Needs and Challenges Funding assistance Training Federal program enhancements Exercises

FEMA Region III Cyber Security Program

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

DEFENSE LOGISTICS AGENCY

Legal, Ethical, and Professional Issues in Information Security

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

GridEx IV Initial Lessons Learned and Resilience Initiatives

POSITION DESCRIPTION

Electric Power Industry s Approach to Grid Security

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Commonwealth Cyber Declaration

RCISC_11014 Prospect Brochure_V3.indd 1

Medical Device Cybersecurity: FDA Perspective

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Partnering With Law Enforcement to. Combat Cybercrime

Region Snapshot Region IV

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

NATIONAL INFORMATION SHARING STRATEGY

CYBER SOLUTIONS & THREAT INTELLIGENCE

Needs and Challenges Funding assistance Training Partnership capabilities and sustainment. Implement Risk Management

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

G7 Bar Associations and Councils

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

The National Initiative for Cybersecurity Education (NICE) The NICE Workforce Framework, NIST SP , Overview October 4, 2017

DHS Supply Chain Activity: Cross-Sector Supply Chain Working Group and Strategy on Global Supply Chain Security

An Overview of DHS s Role and Missions. James McCament Chief of Legislative Affairs, USCIS

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

The Office of Infrastructure Protection

White Paper. View cyber and mission-critical data in one dashboard

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

National Counterterrorism Center

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Examining Cooperative Strategies through Cyber Exercises

BEFORE THE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE SUBCOMMITTEE ON ENERGY

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018

DHS Cybersecurity Services and Resources

June 5, 2018 Independence, Ohio

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Implementing Executive Order and Presidential Policy Directive 21

Robert Holleyman, President and CEO, BSA The Software Alliance

Effective Cyber Incident Response in Insurance Companies

Welcome Mike Kraft, MRO SAC Member

Transcription:

Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017

Reggie McKinney C3 Voluntary Program Manager, DHS 2

Information Sharing Landscape Active Automated Indicator Sharing Cyber Information Sharing & Collaboration Program Enhanced Cybersecurity Services Collaborative Professional Organizations ISACs & ISAOs Educational Networking Cybersecurity Events Alerts & Bulletins Webinars us cert.gov/ccubedvp 3

Federal Information Sharing Resources for Small and Midsize Businesses Introduction Reggie McKinney, C 3 Voluntary Program Manager, DHS Program Presentations Small Business Administration (SBA) Jack Bienko, Deputy Director for Entrepreneurship Education SMB Information and Analysis Organization (SMB isao) Bonnie Moss, Executive Director Federal Bureau of Investigation (FBI) Marcus Joachim, Supervisory Special Agent U.S. Secret Service Matt Chevraux, Assistant Special Agent in Charge, Office of Investigations, Cyber Strategy and Outreach Q&A Closing Reggie McKinney 4

KC[2 BL[1 Jack Bienko Deputy Director for Entrepreneurship Education, SBA 5

Slide 5 KC[2 BL[1 Jack is going slidesless! Kellenbarger, Christopher [USA], 10/18/2017 He will be giving a brief overview of the profile of an SMB, some research SBA has been doing, and cover SBDCs. Bodre, Laura [USA], 10/19/2017

Bonnie Moss Executive Director, SMB isao 6

MISSION Our mission at the SMB isao exists to form a community for advancing all aspects of cybersecurity, technology, business and organizational resiliency, and security standards through the sharing of threat intelligence. It is our goal to help bolster the cybersecurity posturing of small, micro, and mid sized businesses across the Nation to get a step ahead of cyber attacks instead of simply responding. 7

OUR SERVICE We passionately care about the SMB community We embrace the Information Sharing Community Model as envisioned by the ISAO SO We have created an information sharing community specifically designed for the SMB owner. We aim to increase cyber threat awareness and cybersecurity education for the SMB market OUR VALUE Affordable membership An avenue to report breaches anonymously Access to critical cyber threat alerts Forum for SMB owners to chat anonymously about cybersecurity threats or concerns Integration of data from industry sources and USG reports with data feeding into member reports Special offers to Members from our Partners 8

Our Model Supported by generous donors and sponsors Subscription based membership Housed at the ISAO Cyber Support Center Integrated website with Member Portal SMB Enterprise, a Member Monthly Report Partners Portal 9

Questions: Please utilize the Q&A or reach out to me Bonnie Moss Director, SMB isao www.smbisao.com info@smbisao.com 833 SMB SAFE 10

Marcus Joachim Supervisory Special Agent, FBI Office of Private Sector (OPS) 11

OPS OPS was established in 2014 and serves as the FBI s primary liaison with the American business community. OPS aligns and coordinates key FBI outreach programs to create a unified approach to working with private sector companies. 12

Domestic Security Alliance Council (DSAC) Private public sector partnership Membership is held by company Most members are Fortune 500/1000 level Nearly 500 member companies Governed by an Executive Working Group URL: www.dsac.gov 13

INFRAGARD Public Private partnership between FBI and individual members of the private sector. Foster Collaboration and information sharing that enhances collective ability to address threats to the U.S. Benefits Direct Engagement with the FBI, other government agencies, and private sector experts at local level. Members only web portal; access to latest FBI intelligence products www.infragard.org 14

Private Sector Coordinators (PSC) Mission To protect our nation s economy by strengthening FBI relationships with the American Private Sector. Primary POC for local interaction with the FBI. PSCs are located at every Field Office. 15

Matt Chevraux Assistant Special Agent in Charge Office of Investigations, Cyber Strategy and Outreach, U.S. Secret Service 16

United States Secret Service Electronic Crime Task Forces R. Matthew Chevraux Assistant Special Agent in Charge Office of Investigations Cyber Strategy and Outreach October 31, 2017

Electronic Crime Task Forces (ECTFs) Electronic Crimes Task Forces 40 Worldwide Trusted Partnerships Between Law Enforcement, Private Sector & Academia 4,000 Private Sector Partners 2,500 Federal, State, & Local Law Enforcement Partners 350 Academic Partners Coordinated Investigations, Information Sharing, Technical Expertise, and Training 18

USSS ECTF: Principles for Success Respond quickly to cyber crimes incidents by coordinating people and equipment assets. Liaison with our trusted partners through quarterly meetings and other means of real time information sharing. Emphasize prevention for both our protective and investigative missions through preparation, education and training. Response Information Sharing Prevention 19

ECTF Priorities: Core Violations Title 18, USC 1029 & 1030 High dollar loss/community impact Organized groups/multi defendant Transnational and multi district investigations Identify new technology and schemes 20

USSS ECTF: Locations 21

USSS ECTF: Cyber and Operational Resilience Tabletop Exercise Series Exercise Objectives Exercise information sharing processes and response actions before, during, and after an incident. Enhance shared understanding of how response to a significant cyber incident is likely to unfold, and set the stage for process improvement efforts. Explore what technical assistance is likely to be needed during an incident and how it can be delivered. Test the processes and review the playbooks that will be used to maintain and/or rebuild trust and confidence between the firm and their stakeholders. 22

Q&A How does information sharing differ for an SMB, as compared to a larger organization? What roadblocks might they face? What considerations must be made? 23

Q&A What can someone in the audience do today to step up their information sharing capabilities or get connected to an information sharing organization? 24

Q&A How can government and business work together to provide greater information sharing offerings to the SMB community? 25

Q&A Questions from the audience? 26

Thank you for joining us! Reggie McKinney, C 3 Program Manager, DHS https://www.us cert.gov/ccubedvp Jack Bienko, Deputy Director for Entrepreneurship Education, SBA https://www.sba.gov/ Bonnie Moss, Executive Director, SMB ISAO https://smbisao.com/ Marcus Joachim, Supervisory Special Agent, FBI www.infragard.org Matt Chevraux, Assistant Special Agent in Charge, U.S. Secret Service https://www.secretservice.gov/ 27