American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

Similar documents
Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Cybersecurity Overview

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Framework for Improving Critical Infrastructure Cybersecurity

Incident Response Services

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

The NIST Cybersecurity Framework

Business continuity management and cyber resiliency

Overview of the Federal Interagency Operational Plans

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Maritime Bulk Liquids Transfer Cybersecurity Framework Profile

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

The Impact of Cybersecurity, Data Privacy and Social Media

Office of Infrastructure Protection Overview

Member of the County or municipal emergency management organization

Why you should adopt the NIST Cybersecurity Framework

Cyber Resilience. Think18. Felicity March IBM Corporation

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

National Policy and Guiding Principles

The Office of Infrastructure Protection

Cyber Security & Homeland Security:

Cybersecurity Risk Management:

Heavy Vehicle Cyber Security Bulletin

Cybersecurity for Health Care Providers

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Forensics and Active Protection

You ve been breached: Now What? Minnesota s Data Breach Preparation and Notification for Electronic Data

CYBER RESILIENCE & INCIDENT RESPONSE

NW NATURAL CYBER SECURITY 2016.JUNE.16

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Cloud and Cyber Security Expo 2019

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Securing an IT. Governance, Risk. Management, and Audit

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

National Level Exercise 2018 After-Action Findings

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

Responsible Care Security Code

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

HPH SCC CYBERSECURITY WORKING GROUP

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

PIPELINE SECURITY An Overview of TSA Programs

Cyber Security Incident Report

NGA Governor s Energy Advisors Energy Policy Institute Resiliency Panel

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018

Cyber Risks in the Boardroom Conference

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

Port Facility Cyber Security

Department of Homeland Security Updates

FEMA Region III Cyber Security Program

Chapter 1. Chapter 2. Chapter 3

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

The Office of Infrastructure Protection

Make IR Effective with Risk Evaluation and Reporting

Sage Data Security Services Directory

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Acalvio Deception and the NIST Cybersecurity Framework 1.1

Cyber Security Technologies

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

The Office of Infrastructure Protection

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Emerging Issues: Cybersecurity. Directors College 2015

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

The Office of Infrastructure Protection

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

DHS Cybersecurity: Services for State and Local Officials. February 2017

Cyber and information security applicable for the maritime sector

ISAO SO Product Outline

You ve Been Hacked Now What? Incident Response Tabletop Exercise

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

Business Continuity Planning

DHS Cybersecurity Services and Resources

RUAG Cyber Security Understand Cyber. Protect Values.

LESSONS LEARNED IN DEVELOPING CYBERSECURITY FRAMEWORK (CSF) PROFILES WITH INDUSTRY AND THE U.S. COAST GUARD (USCG)

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Cybersecurity The Evolving Landscape

Security Management Seminar

Homeland Security Perspectives: Oregon Fire District Directors Association October 25, 2018

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

DHS Emergency Services Sector Presents Tools and Resources for First Responders. June 1, pm ET

Cybersecurity and Nonprofit

Resiliency & Maritime Security Preparedness Planning

Directive on security of network and information systems (NIS): State of Play

Bradford J. Willke. 19 September 2007

Cybersecurity for the Electric Grid

The Office of Infrastructure Protection

Transcription:

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment July 20, 2017 DECIDEPLATFORM.COM

The new Reality of Cyber Security (since 2003) Destructive Cyber attacks against private sector critical infrastructure will occur The threat is from sophisticated actors well organized and resourced These threats will compromise our ability to operate critical infrastructure Even the most secure networks can/will be compromised Critical infrastructure must be able to withstand a first punch, before national security assets arrive Our critical infrastructure is highly inter-connected and interdependent, we must be prepared to respond and recover. 2

USCG focused the NIST Cybersecurity Framework 8 Mission Objectives 1. Maintain Personnel Safety 2. Maintain Environmental Safety 3. Maintain Operational Security 4. Maintain Preparedness 5. Maintain Quality of Product 6. Meet HR Requirements 7. Pass Required Audits/Inspections 8. Obtain Timely Vessel Clearance Source - US Coast Guard Cybersecurity Framework Profiles (CFP) for Maritime Bulk Liquids Transfer (MBLT) mission area profile of 8 Mission Objectives Defines Preparedness 3

Why do we Exercise? 4

Live Exercises Provide Real-Time Education and Feedback Organization behavior is an important and often missing element of an incident response plan. Customize best-fit plans to the decision Makers tasked to execute it. Calculate response in the context of individual plans against various threat scenarios. Identify specific information that provides confidence to the organization. Respond to events more quickly and effectively. Lower overall cost of failure prevention and Reduce probability of failure risk. 5

Practice Response: Response RS.RP Planning Response processes and procedures are executed and maintained, to ensure timely response to detected cyber security events. Does your organization have a plan? Is it current? Has it been tested? Does it take into account all organization roles: Leadership, Legal, Ops, PR, Compliance, Business continuity, IT/Infosec? When is it activated? Who s in charge? 6

Practice Response Communications: RS.CO-1 Personnel know their roles and order of operations RS.CO-2 Events are reported consistent with established criteria RS.CO-3 Information is shared consistent with response plans Does your incident response plan consider malware and ransomware? Who is in-charge? Who do you call for support? Do you have preplanned relationships with support organizations? What is your obligation to report? Do you inform your Board, employees, customers, supply chain partners? 7

Supply Chain / Value Chain Highly Inter-Connected Systems Greater reliability on technology with more partners in the Supply Chain Risk is created at the seams between organizations Share risk across our partners We must practice to response and recovery across the supply chain!

Practice Response Coordination: RS.CO-4: Coordination with stakeholders RS.CO-5: Voluntary Information Sharing occurs with external partners to achieve broader cybersecurity situational awareness. Are you alone or this part of a larger event? How did other organizations respond? Do you tell your stakeholders you are compromised? What information do you share with stakeholders? Are you receiving information sharing reporting? Have you established a relationship with local law enforcement? FBI, Coast Guard, Port Authority? 9

Practice Response Analysis: Response Analysis Notifications are investigated Impact of Incident is understood Forensics are performed Incidents are categorized consistent with Plans Response Mitigation Incident Contained Incident mitigated New vulnerabilities are understood Response Improvement After Action Analysis Lessons learned, Processes and Response Strategies Updated Are tactics, techniques, and procedures (TTPs) in place to respond based on severity of event? Have you determined how different events will impact personnel and operations? Do you have capabilities to perform internal forensics? Or existing external relationships with forensic services? Do you continuity of business plans can you continue to operate in the face of degraded systems? How are you going to fight through the crisis? How do we get better? 10

Thank you Contact us: Phil Susmann, President NUARI susmann@norwich.edu (802) 485 2213 https://decideplatform.com/