NASA/JSC KeynoteRussell D. Robinson (Assistant Special Agent in Charge, FBI) Cyber Security and Law Enforcement small business Sergio C. Muniz (President,

Slides:



Advertisements
Similar presentations
Andrew Yang, Ph.D. Associate Professor of CS, CIS, IT Cyber Security Institute Tackling the Challenges of Securing the Cyber Space - An academia perspective.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
DHS, National Cyber Security Division Overview
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Security Controls – What Works
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
College Strategic Plan by Strategic Planning and Quality Assurance Committee.
PREPARE AMERICA for a Unified Response to Terrorism A NATIONAL HOMELAND SECURITY PREPAREDNESS TRAINING SOLUTION OFFERED BY AMERICA’S COMMUNITY COLLEGES.
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Designing the Microbial Research Commons: An International Symposium Overview National Academy of Sciences Washington, DC October 8-9, 2009 Cathy H. Wu.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Public Participation and the Advisory Committee Process A Collaborative Partnership For Water Resources Toni M. Johnson, Chief Water Information Coordination.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
AIAA’s Publications Business Publications New Initiatives Subcommittee Wednesday, 9 January 2008 Rodger Williams.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Introducing ITAA Advancing the U.S. IT Industry The Information Technology Association of America.
Information Sharing Challenges, Trends and Opportunities
Cyber Security Nevada Businesses Overview June, 2014.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
TRANSPORTATION RESEARCH BOARD WATER SCIENCE AND TECHNOLOGY BOARD TRANSPORTATION RESEARCH BOARD TRB’s Vision for Transportation Research.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
1 Computer Auditing ( What is it, what skill set do you require & how much can you earn?) John Mitchell Academic Relations Director ISACA London Chapter.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Mickey Oros Altergy Systems Sr. Vice President – Business Development Chairman, Industry Advisory Panel National Hydrogen Association Keynote Session 2:
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
Tackling the Challenges of Securing the Cyber Space
Information Security Program
Iowa Communications Alliance
Master’s Degree Program in Business Compliance Assurance
California Cybersecurity Integration Center (Cal-CSIC)
ASSET - Automotive Software cyber SEcuriTy
Dr. Vida G. Wright, P.E., F.SAME Southwest Region Vice President
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Federal Protective Service
What is Cybersecurity Office of Information Technology
Presentation transcript:

NASA/JSC

KeynoteRussell D. Robinson (Assistant Special Agent in Charge, FBI) Cyber Security and Law Enforcement small business Sergio C. Muniz (President, CYFOR Technologies LLC) Small Business Perspectives in the Cyber Market legalSheryl A. Falk (Of Counsel, Winston & Strawn LLP) The Zero Hour Phone Call – How to respond to a data breach to minimize your legal risks public safety John T. Chaney (Mobility Architect, Broadband Services Division, Harris County, Information Technology) Public Safety IT Cyber Security Challenges in Today’s Information Sharing World utilitiesValentine Emesih (Control Systems Director, CenterPoint Energy) Modernizing electricity delivery infrastructure and potential cyber security challenges healthcareStephen Jones (CEO, Clear Lake Regional Medical Center) How Hospitals Protect Your Health Information aerospace Jason A. Soloff (Lead, Systems Security Engineering, NASA/JSC) Space Systems Protection in Cyber Risk Environment Panel discussion and Q&A

All types of security – Computer security – Information security – Data security – Database security – Network security – Software security – Application security – Physical security – Web security – Mobile Security – …

The CIA Model (aka. CIA triad) 5 Confidentiality prevents unauthorized disclosure of sensitive information and/or resources. Integrity prevents unauthorized modification. Availability is the prevention of loss of access to resources and information to ensure that information or resource is available for use when it is needed. Source:

Cyber Security and Law Enforcement This talk covers issues involved in securing the cyber space, in particular where cyber security and law enforcement intertwines. Mr. Robinson will discuss the impact of cyber threats against the U.S. infrastructures and the various industries, and what the community can do together to mitigate the issues. He will also discuss some of the investigative techniques that FBI investigators utilize to assist the Bureau in better understanding the threats that Cyber actors pose to both the private and the public sectors, and how the FBI disseminates that information to the various stakeholders. Russell D. Robinson Assistant Special Agent in Charge (ASAC) Houston Division – FBI Cyber Security Institute (CSI)

Small Business Perspectives in the Cyber Market The cyber market has grown significantly and is affecting virtually every section of our economy. Government, academia, the private sector, and in particular small businesses are focused meeting the demands of the high growth cyber market that will be essential to our economic well being and national security. Cyber will grow in importance and creates both opportunity and risks. Small business opportunities come in the form of lower barriers to entry into the cyber market. Advanced cyber technologies are easily available and relatively inexpensive and accessible to small business. The same low barriers to entry for small businesses create significant risks in that they provide low barriers to various cyber threats including cyber crime, industrial espionage, and attacks against our critical infrastructure (SCADA/ICS, power grids, banking and finance). Sergio C. Muniz President CYFOR Technologies LLC Cyber Security Institute (CSI)

The Zero Hour Phone Call – How to respond to a data breach to minimize your legal risks You just answered the phone call that no one ever wants to receive, you system has been breached and your data may have been compromised. Do you know what actions to take? Do you know how to conduct the investigation and help protect your organization from potential legal action? Do you know who you are required to notify and when? Sheryl A. Falk Of Counsel Winston & Strawn LLP Cyber Security Institute (CSI)

Public Safety IT Cyber Security Challenges in Today’s Information Sharing World Mr. Chaney will discuss Harris County’s deployment of Public Safety LTE (Long Term Evolution) 4G broadband as part of a nationwide plan. He will also address the partnerships that this takes and the challenges when it comes to Cyber Security and the mission of information sharing for better situational awareness for public safety first responders. John T. Chaney Mobility Architect Broadband Services Division Harris County, Information Technology Cyber Security Institute (CSI)

Modernizing electricity delivery infrastructure and potential cyber security challenges CenterPoint Energy recently completed deployment of its Advanced Metering System infrastructure (AMS.) AMS included new smart meters for 2.2 Million electric customers, a communication infrastructure for gathering and exchanging meter data, and back office systems for processing meter commands and information. CenterPoint Energy is also in the process of completing an Intelligent Grid (IG) demonstration project. The IG project involves deploying field devices to a select number of substations and distribution circuits, and control systems for remotely monitoring and managing CenterPoint Energy’s electric distribution grid. A broad overview of the deployed infrastructure will be covered as well as benefits and challenges. Valentine A. Emesih, P.E. Control Systems Director CenterPoint Energy Cyber Security Institute (CSI)

How Hospitals Protect Your Health Information In 1996 Congress passed the Health Insurance Portability and Accountability Act (HIPAA), which outlined the first national standards for individuals’ health information. The Act created the “Privacy Rule” - standards for privacy of individually identifiable health information. This rule developed regulations and expectations for hospitals and other entities to assure the confidentiality and protection of individuals’ health information. HIPAA via the privacy rule outlines how your health care information must be protected. Your information can only be shared when certain perimeters in the law is met. Hospitals have spent millions of dollars upgrading infrastructure to assure the security of health information and compliance with the HIPAA. Stephen K. Jones, Jr. CEO Clear Lake Regional Medical Center Cyber Security Institute (CSI)

Space Systems Protection in Cyber Risk Environment The U.S. aerospace industry and civil/commercial space operations community exists in an increasingly contested environment. New challenges from the cyber front to U.S. economic and technical superiority as well as critical mission and infrastructure capability are emerging daily. NASA is moving to address these new challenges by adapting and applying time- tested system engineering methods and philosophies to the new domains of cyber risk assessment, cyber-defense and their element in space systems mission assurance. This presentation will discuss the new environment in which the U.S. aerospace sector must operate, some of the methods NASA has used to adapt, and some lessons learned and future opportunities. Jason A. Soloff Lead, Systems Security Engineering Human Exploration & Operations Mission NASA/JSC Cyber Security Institute (CSI)

13 Security does not focus on “products” only; it is a process and focuses on the whole “information system”. -no panacea or cure-all -a continual and iterative process -building up readiness -knowledge acquisition -learning & research -intelligence collection, -close monitoring, … -knowledge sharing -community awareness and involvement Cyber Security ?

Regional Industry Threats

The Public Health of the Internet “EastWest Institute Proposes Public Health Model For Internet Cyber Security”, by Mickey McCarter, 06/06/2012 – Scott Charney, "As use and reliance on the Internet continues to grow, improving Internet health requires all ecosystem members to take a global, collaborative approach to protecting people from potential dangers online." “Collective Defense: Applying Public Health Models to the Internet”, By Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft Corp., “Collective Defense: Applying Public Health Models to the Internet” 15

Cyber Security Collaboration Model Strategy: Accelerate Bay Area Houston’s cyber security industry by leveraging the synergy created through the collaborative efforts of the community, academia, local and state government, DoD, Federal protection agencies, and regional business sectors. 16

operations Collaborative R&DEducationCorporate & Community Services Research projects  Original research by - CSI faculty - postdoc researchers - graduate research assistants  Collaborative research with - JSC researchers - high tech companies’ researchers - faculty in other colleges Research results are integrated into the UHCL curricula. Research findings & experiences are published and shared with the community Research and development contracts with government agencies and business organizations 17 Knowledge acquisition & transfer Repository of cybersecurity research results Continually updated cybersecurity knowledge base - New vulnerabilities - New protection technologies - Reviews of vendors and tools Advancement of cybersecurity research and development are integrated into class teaching. Up-to-date knowledge is transferred to start-up companies and cybersecurity professionals via collaborations and/or consulting. Knowledge sharing Research publications and presentations Online sharing of papers and project experiences On-site research seminars On-site research workshops and/or conferences Supporting UHCL’s computer science, engineering and other programs with respect to cybersecurity knowledge and technologies Certified cybersecurity curriculum by NSA, NIST, etc. Raising user and community awareness of cybersecurity by offering free seminars Summer camps for high schoolers Summer research experience for college students

18

A sustainable Cyber Security Institute for the Bay Area region How one may help? Financial - Corporation donation - Personal donation - in-kind contribution Professional participation -Advisory Board - Industry Technical committees - Distinguished speakers - Mentors - Volunteers Promotion