NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.

Slides:



Advertisements
Similar presentations
Minnesota Port and Waterway Security Working Group Meeting April 12, 2012.
Advertisements

Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Federal Transit Administration Office of Safety and Security FTA BUS SAFETY & SECURITY PROGRAM 18 th NATIONAL CONFERENCE ON RURAL PUBLIC AND INTERCITY.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
The NIST Framework for Cybersecurity
Cybersecurity Framework October 7, 2014
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Enterprise IT Decision Making
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Atlanta Public Schools Project Management Framework Proposed to the Atlanta Board of Education to Complete AdvancED/SACS “Required Actions” January 24,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
NIST Special Publication Revision 1
Project Overview, Objectives, Components and Targeted Outcomes
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA By Ms Daina Vaivadienė Chief Specialist of the Internal Audit and Financial Control Methodology.
Workshop on Programming in support of Anti-Corruption Agencies Bratislava, 30 June - 1 July 2009 A methodology for capacity assessment of AC agencies:
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
1 Mid-Term Review of the Hyogo Framework for Action Roadmap to Disaster Risk Reduction in the Americas & HFA Mid-Term Review.
2015 Safety Action Plan & Regulatory Strategy California Public Utilities Commission January 29, 2015.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
Homeland Security UNCLASSIFIED Executive Order Presidential Policy Directive (PPD) - 21 Implementing the Presidential Executive Order (EO) on cybersecurity.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Proposed Preliminary Statewide Full Service Partnership Classification System BASED ON STAKEHOLDER FEEDBACK THIS REPORT IS THE MENTAL HEALTH SERVICES OVERSIGHT.
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
The NIST Special Publications for Security Management By: Waylon Coulter.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Framework for Improving Critical Infrastructure Cybersecurity
Proposed Updates to the Framework for Improving Critical Infrastructure Cybersecurity (Draft Version 1.1) March 2017
BruinTech Vendor Meet & Greet December 3, 2015
Module 4 Risk Management
Update from the Faster Payments Task Force
Enterprise risk management
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
School Safety in the Post-2015 Framework on Disaster Risk Reduction Toward Sendai and Beyond
Race to the Top—Early Learning Challenge Letters of Support Webinar
Intelligent Buildings and Cybersecurity
Cybersecurity Policies & Procedures ICA
NIST Cybersecurity Framework
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
ATD session 2: compliancy versus mission assurance
The Open Group Architecture Framework (TOGAF)
Cyber defense management
8 Building Blocks of National Cyber Strategies
VERMONT INFORMATION TECHNOLOGY LEADERS
Managing Change and Other Keys to Successful Implementation
America’s First National Critical Infrastructure Exercise
The Strategic Information Technology Formulation
2017 Health care Preparedness and Response Draft Capabilities
An Urgent National Imperative
Summary of Actions ITU Regional Standardization Forum for Africa
Cybersecurity ATD technical
Group Meeting Ming Hong Tsai Date :
Vijay Rachamadugu and David Snyder September 7, 2006
NERC Reliability Standards Development Plan
Employee engagement Delivery guide
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
World Bank project example
NERC Reliability Standards Development Plan
Final Conference 18 Set 2018.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
The GEF Public Involvement Policy
NIST Privacy Framework
Data Security and Privacy Techniques for Modern Databases
Presentation transcript:

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity Framework Overview Executive Order “Improving Critical Infrastructure Cybersecurity” January 22, 2014 Brian Hubbard Account Manager (301)

Executive Order 13636—Improving Critical Infrastructure Cybersecurity “It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties” NIST is directed to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure 2

The Cybersecurity Framework For the Cybersecurity Framework to meet the requirements of the Executive Order, it must: include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. provide a prioritized, flexible, repeatable, performance- based, and cost-effective approach to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. identify areas for improvement 3

4 Development of the Preliminary Framework Engage the Framework Stakeholders Collect, Categorize, and Post RFI Responses Analyze RFI Responses Identify Framework Elements Prepare and Publish Preliminary Framework EO Issued – February 12, 2013 NIST Issues RFI – February 26, st Framework Workshop – April 03, 2013 Completed – April 08, 2013 Identify Common Practices/Themes – May 15, nd Framework Workshop at CMU – May 29-31, 2013 Draft Outline of Preliminary Framework – June rd Framework Workshop at UCSD – July 10-12, th Framework Workshop at UT Dallas – September 11-13, 2013 Publish Preliminary Framework – October 29, 2013 Ongoing Engagement: Open public comment and review encouraged and promoted throughout the process

Getting from the Preliminary Framework to the Final Framework and Beyond 5 Framework Governance Additional Ongoing Public Engagement Public Comment Period Final Cybersecurity Framework Prepare and Publish Preliminary Framework Publish Preliminary Framework – October 29, 2013 Begin 45 day Public Comment Period Stakeholder outreach discussion continue 5 th Framework Workshop at NCSU – Nov 14-15, 2013 Public comment period closed – December 13, 2013 Complete comment resolution and disposition Publish Cybersecurity Framework – February 2014 Framework maintenance and updates Ongoing Engagement: Open public comment and review encouraged and promoted throughout the process

Framework Components Framework Core ○ Cybersecurity activities and references that are common across critical infrastructure sectors organized around particular outcomes. Framework Profile Alignment of standards, guidelines and practices to the Framework Core in a particular implementation scenario “Current” Profile vs. “Target” Profile Framework Implementation Tiers Capture how an organization views cybersecurity risk and the processes in place to manage that risk 6

Framework Core 7

The five Framework Core Functions provide the highest level of structure:  Identify – Develop the institutional understanding to manage cybersecurity risk to systems, assets, data, and capabilities  Protect – Develop and implement the appropriate safeguards, prioritized through the organization’s risk management process, to ensure delivery of critical infrastructure services  Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.  Respond – Develop and implement the appropriate activities, prioritized through the organization’s risk management process (including effective planning), to take action regarding a detected cybersecurity event.  Recover - Develop and implement the appropriate activities, prioritized through the organization’s risk management process, to restore the appropriate capabilities that were impaired due to a cybersecurity event. 8 Framework Functions

Framework Categories Categories are the subdivisions of a Function into groups of cybersecurity activities, more closely tied to programmatic needs 9

Subcategories - subdivide a Category into specific outcomes of technical and/or management activiites Informative References are specific sections of standards, guidelines and practices common among critical infrastructure sectors that illustrate a method to achieve the outcomes associated with each Subcategory. The Informative References presented in the Framework Core are not exhaustive, and organizations are free to implement other standards, guidelines, and practices. 10 Subcategories and Informative References

11 Framework Core - Sample

 Enables organizations to establish a roadmap to reducing cybersecurity risk  Used to describe current state and desired target state  Comparison of profiles reveals gaps that may be addressed to meet cybersecurity risk management objectives 12 Framework Profiles

Framework Implementation Tiers  The Framework Implementation Tiers (“Tiers”) are a lens through which to view the characteristics of the organization’s approach to risk  Tiers range from Partial (Tier 1) to Adaptive (Tier 4)  Tier selection process considers an organization’s current risk management practices threat environment legal and regulatory requirements business/mission objectives organizational constraints 13

An organization’s risks, policies, and procedures will ultimately drive its Framework adoption Framework Use Cases: Basic Review of Cybersecurity Practices Establish or Improve a Cybersecurity Program Communicating Cybersecurity Requirements with Stakeholders Identifying Opportunities for New or Revised Informative References Framework Provides a Methodology to Protect Privacy and Civil Liberties 14 How to Use the Framework

Thank You The Cybersecurity Framework is available at Brian Hubbard G2 Inc. (301)