Manufacturing Cybersecurity Cooperative Overview

Similar documents
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Hearing Voices: The Cybersecurity Pro s View of the Profession

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

Strengthening Capacity in Cyber Talent sans.org/cybertalent

IT Consulting and Implementation Services

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

to Enhance Your Cyber Security Needs

Which Side Are You On?

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Changing the Game: An HPR Approach to Cyber CRM007

What It Takes to be a CISO in 2017

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Immersion Academy Annual Report 2018

BHConsulting. Your trusted cybersecurity partner

Cyber Attacks & Breaches It s not if, it s When

Build Your Zero Trust Security Strategy With Microsegmentation

WINNING THE WAR FOR CYBER TALENT

The U.S. Manufacturing Extension Partnership - MEP

Incorporating Hunt Teams To Defend Your Enterprise

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

To Audit Your IAM Program

TRUE SECURITY-AS-A-SERVICE

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

SOLUTION BRIEF Virtual CISO

Building the Cybersecurity Workforce. November 2017

White Paper. View cyber and mission-critical data in one dashboard

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

BHConsulting. Your trusted cybersecurity partner

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Best Practices in Securing a Multicloud World

THE POWER OF TECH-SAVVY BOARDS:

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services

IT SECURITY FOR NONPROFITS

Best Practices in ICS Security for System Operators

SOC for cybersecurity

Immersion Academy Annual Report 2017

GDPR Update and ENISA guidelines

Background FAST FACTS

Securing Your Digital Transformation

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Electrical Solutions

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Hacking and Cyber Espionage

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

2018 Trends in Hosting & Cloud Managed Services

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Advanced Concepts & Technologies International, LLC

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

2017 Trends in Datacenter and Critical Infrastructure

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Cyber Security Technologies

Regional Resilience: Prerequisite for Defense Industry Base Resilience

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

CYBER SOLUTIONS & THREAT INTELLIGENCE

Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below.

Cyber Security For Business

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Information Technology

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Expand Your Cyber Expertise. Secure Your Future.

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Security and Privacy Governance Program Guidelines

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

Cybersecurity for Health Care Providers

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

New Zealand Government IBM Infrastructure as a Service

Section One of the Order: The Cybersecurity of Federal Networks.

Angela McKay Director, Government Security Policy and Strategy Microsoft

INTELLIGENCE DRIVEN GRC FOR SECURITY

BRING EXPERT TRAINING TO YOUR WORKPLACE.

THE ACCENTURE CYBER DEFENSE SOLUTION

Chapter X Security Performance Metrics

COMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888)

PRODUCT OVERVIEW. ecommerce. Your Brand s Digital Experience. Delivered. Product Overview. ecommerce

Security by Default: Enabling Transformation Through Cyber Resilience

Cyber Security Advanced Education: Preparing the Emerging Workforce

Transcription:

Manufacturing Cybersecurity Cooperative Overview December 12, 2017 Chris Conrardy CTO and VP Strategic Initiatives, EWI cconrardy@ewi.org 614-688-5191 John Gilbert VP Strategic Planning, Blake Philips support@blake-philips.com 270-535-8873 Connie Reichert LaMorte Principle Engineer, EWI creichert@ewi.org 614-688-5247

About EWI Non-profit manufacturing technology organization Serving broad range of manufacturers for over 30 years Developing and implementing advanced manufacturing technologies to improve product performance, quality, reliability and cost Deep technical capabilities and expertise in many advanced manufacturing technologies with >150 staff across three locations Building new capabilities, partnerships and services to increase impact

New Technologies Are Transforming Manufacturing America s factory floors are either already in a disruption cycle - or expect to enter one in the next couple of years - Brookings, 2016 3D Printing Agile Automation Internet of Things New digital technologies can create new cyber vulnerabilities!

Cyber Defense Disparity DoD and big companies can afford the best defense, sending hackers along the path of least resistance. Small companies often left to fend for themselves with firewalls, policies, and offthe-shelf antivirus software. Small Suppliers HACKERS! Large OEMs EFFECTIVENESS Often Minimal Defenses Strong Defenses

Responding to SMM Cybersecurity Challenges Talent pool insufficient to meet demand and largely concentrated in major urban areas Many small and medium size manufacturers (SMMs) have not implemented adequate and sustained cybersecurity Some are struggling to comply with new NIST 800-171 Lack the expertise, talent, and resources to adapt to constantly changing threats Lack adequate cybersecurity policy and administration Current cybersecurity support options too costly for many SMM Cybersecurity Co-op Goals: Expand the talent pool Provide affordable options for SMMs Connect to network of existing providers Fill gaps in the cybersecurity ecosystem where needed

SMM Cybersecurity Cooperative Concept Distribute cost of talent and infrastructure across many SMMs Similar to the farm co-op model Tailored to the particular needs of SMMs On the job training (OJT) Network Defense Analyst training Geographically distributed apprentice program to address a critical shortage of talent Connect capable talent in rural communities to job opportunities SANS certified expert instruction Services tailored to SMMs at an affordable price Vulnerability and compliance assessment Ongoing network monitoring to detect intrusion Connect to screened service providers to respond when a threat or vulnerability is detected

Virtuous Cycle: Serving SMMs while Developing Talent Talent pool Mentorship Program Co-op Technical Capabilities Real-world problems SMM support SMMs ANTICIPATED BENEFITS: SMMs: Affordable defense and compliance with requirements Mentees: Elite on-the-job training, industry-recognized certification, employment opportunities Communities: Protected cyber ecosystem for SMM businesses, rural employment opportunities, sustainable co-op business model

SMM Network Monitoring Live analyst human-in-the-loop network defense Proven DoD effective Keeps management and IT staff informed of threats Does not: 1) interrupt service, 2) burden the SMM network, 3) compromise privacy SMMs Network Existing switch or Gigabit tap Network Operations Center

Co-op Scale-Up Distributed network of OJT mentoring and SMM support sites Community 2 Community 5 Community 4 Community 6 NOC Community 1 Community 3

SMM Cooperative Cyber Defense Core Team Jim Ettinger, Senior Analyst Highly experienced DoD and commercial Network Defense Analyst Nationally recognized SANS Mentor Certifications: GSEC, GCIA, GAWN, MCP, CEH, CNDA Kellen Kapelis, Security Analyst Strategic Intelligence and Military Communications background Network and physical security expert Certifications: A+, Security+, Network+, Licensed Private Investigator, Top Secret Clearance John Gilbert, Compliance Analyst Strategic Intelligence, Human Intelligence, and Signals Intelligence background Network security and human factors (Social Engineering) expert Certifications: A+, CEH, SEPP, Licensed Private Investigator, Top Secret Clearance

Pilot Project to Test the Co-op Approach Kicking-Off Next Week Seeking SMM input and partner interest SMM input on specific co-op services Interest from communities to host a co-op OJT mentoring and SMM service center Partner interest to connect co-op with existing capabilities IT service providers, cybersecurity firms, educators, researchers, manufacturing associations, government programs, etc.

EWI Facilities and Labs EWI is the leading engineering and technology organization in North America dedicated to developing, testing, and implementing advanced manufacturing technologies for industry. Since 1984, EWI has offered applied research, manufacturing support, and strategic services to leaders in the aerospace, automotive, consumer electronic, medical, energy, government and defense, and heavy manufacturing sectors. By matching our expertise to the needs of forwardthinking manufacturers, our technology team serves as a valuable extension of our clients innovation and R&D teams to provide premium, game-changing solutions that deliver a competitive advantage in the global marketplace. ewi.org 614.688.5000 Buffalo, New York Buffalo Manufacturing Works 847 Main Street Buffalo, NY 14203 716.710.5500 rlombardo@ewi.org Columbus, Ohio EWI World Headquarters 1250 Arthur E. Adams Drive Columbus, OH 43221 614.688.5000 info@ewi.org Loveland, Colorado EWI Colorado 815 14 th Street SW Loveland, CO 80537 970.635.5100 mwillard@ewi.org