1 The University of Southern Mississippi National Center for Spectator Sport Safety and Security Cyber Security Tabletop Exercise Facilitator: Facilitator:

Slides:



Advertisements
Similar presentations
Tips and Resources IASC Cluster/Sector Leadership Training
Advertisements

Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
Patient Movement in the Midst of a Disaster
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
WELCOME TO INNG EMERGENCY OPERATIONS LIAISON OFFICER OVERVIEW
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
Interagency Refinery Task Force Gina M. Solomon, M.D., M.P.H. Deputy Secretary for Science and Health California Environmental Protection Agency
Wade E. Kline, AICP Community Development Planner.
Connecticut Emergency Management and Response
EDS Public Information Tabletop Exercise
National Infrastructure Protection Plan
Tabletop Exercise Meningitis Outbreak
DHS, National Cyber Security Division Overview
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Business Crisis and Continuity Management (BCCM) Class Session
(Geneva, Switzerland, September 2014)
What Is It And How Will We Measure It?
Network security policy: best practices
N EW Y ORK S TATE O FFICE OF E MERGENCY M ANAGEMENT Director Bill Davis.
Preliminary Assessment Tribal Emergency Response Preparedness Dean S. Seneca, MPH, MCURP Agency for Toxic Substances and Disease Registry Centers for Disease.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
Maintaining Essential Business and Community Services During a Pandemic Paul R. Patrick, Director Bureau of Emergency Medical Services Utah Department.
Part of a Broader Strategy
Practical Information on Crisis Planning: A Guide for Schools and Communities U.S. Department of Education August 2004.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
EDS Inventory Management Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Information Sharing Challenges, Trends and Opportunities
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
ADM 677 Crisis Management in Educational Settings Karen McCuiston Kentucky Center For School Safety.
1 California Public Health Preparedness: Lessons from Seven Jurisdictions R. Burciaga Valdez, PhD June 8, 2004.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
California Emergency Management Agency State Emergency Plan Briefing Emergency Partnership Advisory Workgroup Meeting April 16, 2009.
S/L/T Version 1 National Response Framework Overview for Local, Tribal and State Audiences January 22, 2008.
PS Version 1 National Response Framework Overview for Private Sector Audiences January 22, 2008.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
Welcome 2011 California Statewide Medical and Health Exercise.
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Disaster Planning Workshop Hosted By: Pleasantview Fire Protection District.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
What Is an Incident? An incident is an occurrence, caused by either human or natural phenomena, that requires response actions to prevent or minimize.
Using Tabletop Exercises Carl Osaki, MSPH, RS Northwest Center for Public Health Practice, Clinical Associate Professor Department of Environmental & Occupational.
SNS Planning Elements Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
Copyright – Disaster Resistant Communities Group – Initial Planning Conference.
Tabletop Exercise (TTX). Exercise Agenda Tabletop Ground Rules TTX Participants Overview TTX Exercise After Action Review Summary.
Business Continuity Disaster Planning
The Federal Telework Program U.S. Office of Personnel Management.
Emergency Management Assistance Compact Public Health and Medical Tabletop Exercise Introduction.
1 Regional Hospital Full Scale Exercise CONTROLLER EVALUATOR GUIDE.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
2017 National Geospatial Preparedness Summit
8 Building Blocks of National Cyber Strategies
2017 Health care Preparedness and Response Draft Capabilities
Conduction of a simulation considering cascading effects
Cybersecurity EXERCISE (CE) ATD Scenario questions
Presentation transcript:

1 The University of Southern Mississippi National Center for Spectator Sport Safety and Security Cyber Security Tabletop Exercise Facilitator: Facilitator: James A. McGee – National Center for Spectator Sport Safety and Security Spring 2010

2 Content Exercise Rules Exercise Rules Exercise Objectives Exercise Objectives Exercise Schedule Exercise Schedule Scenario Briefings Scenario Briefings

3 Exercise Rules Scenario depicts a plausible cyber security event Scenario depicts a plausible cyber security event No trick questions or “hidden” agendas No trick questions or “hidden” agendas Players have no previous knowledge of the scenario, and will receive information at the same time Players have no previous knowledge of the scenario, and will receive information at the same time Players will respond using existing plans, procedures and other response resources Players will respond using existing plans, procedures and other response resources Decisions are not precedent-setting and may not reflect your organization’s final position on a given issue Decisions are not precedent-setting and may not reflect your organization’s final position on a given issue

4 Exercise Objectives Examine the capabilities of USM to prepare for, protect from, and respond to the effects of cyber attacks. Examine the capabilities of USM to prepare for, protect from, and respond to the effects of cyber attacks. Exercise senior leadership decision making and interagency coordination of incident responses in accordance with the USM Cyber Response Plan. Exercise senior leadership decision making and interagency coordination of incident responses in accordance with the USM Cyber Response Plan. Validate information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response, and recovery information. Validate information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response, and recovery information. Exercise intra-governmental (Federal-State) coordination and incident response. Exercise intra-governmental (Federal-State) coordination and incident response. Identify policies/issues that hinder or support cyber security requirements. Identify policies/issues that hinder or support cyber security requirements. DRAFT

5 Exercise Objectives (Continued) Identify public/private interface communications and thresholds of coordination to improve cyber incident response and recovery, as well as identify critical information sharing paths and mechanisms. Identify public/private interface communications and thresholds of coordination to improve cyber incident response and recovery, as well as identify critical information sharing paths and mechanisms. Identify, improve, and promote public and private sector interaction in processes and procedures for communicating appropriate information to key stakeholders and the public. Identify, improve, and promote public and private sector interaction in processes and procedures for communicating appropriate information to key stakeholders and the public. Identify cyber physical interdependence of infrastructure of real world economic and political impact. Identify cyber physical interdependence of infrastructure of real world economic and political impact. Raise awareness of the economic and national security impacts associated with a significant cyber incident. Raise awareness of the economic and national security impacts associated with a significant cyber incident. Highlight available tools and technology with analytical cyber incident response and recovery capability. Highlight available tools and technology with analytical cyber incident response and recovery capability.

6 Exercise Schedule Exercise Schedule 8:30 A.M. Participant Sign-In/Coffee 8:30 A.M. Participant Sign-In/Coffee 9:00 A.M.Introduction 9:00 A.M.Introduction Discuss general instructions and ground rules of the exercise 9:15 A.M.Exercise Overview 9:15 A.M.Exercise Overview Discuss exercise objectives, and schedule of exercise 9:30 A.M.Read Module 1 9:30 A.M.Read Module 1 A loose coalition of well financed “hacktivists” with a political agenda, who directed anti-globalization and anarchist activism, introduced a massive computer virus attack into the USM cyber system. 9:45 A.MModule 1 Discussion 9:45 A.MModule 1 Discussion DRAFT

7 Exercise Schedule (Continued) 10:00 A.M.Read Module 2 10:00 A.M.Read Module 2 A cadre of “hacktivists” continued to leverage their collective capabilities to mount a coordinated cyber attack and by generating counterfeit digital certificates, the “hacktivists” directed unknowing web users to “spoofed” websites where funds were extorted and personal information was mined. 10:15 A.M.Module 2 Discussion 10:15 A.M.Module 2 Discussion

8 Exercise Schedule (Continued) 10:30 A.M.Read Module 3 10:30 A.M.Read Module 3 While the nation continued to experience widespread impacts of attacks on the IT and Communications sectors, the adversary targeted individual universities. The adversary’s intent was to cause cascading disruptions stemming from specific, focused attacks. 10:45 A.M. Module 3 Discussion 10:45 A.M. Module 3 Discussion 11:00 A.M.Debriefing about Lessons Learned 11:00 A.M.Debriefing about Lessons Learned 11:30 A.M.End of Exercise/Lunch 11:30 A.M.End of Exercise/Lunch

9 Cyber Security Scenario The exercise simulates a sophisticated cyber attack campaign through a series of modules directed against critical infrastructures. The intent of these modules is to highlight the interconnectedness of cyber systems with the physical infrastructure and to exercise coordination and communication between the public and private sectors. DRAFT

10 Cyber Security Scenario (Continued) The exercise is a simulated event with no real world effects on, tampering with, or damage to any critical infrastructure. While the scenario is based on hypothetical but possible situations, they are not intended as a forecast of future terrorist-related events. The collective modules have three major adversarial objectives: To disrupt specifically targeted critical infrastructures through cyber attacks To disrupt specifically targeted critical infrastructures through cyber attacks To hinder the Universities ability to respond to the cyber attacks To hinder the Universities ability to respond to the cyber attacks To undermine public confidence in the Universities ability to provide/protect services To undermine public confidence in the Universities ability to provide/protect services DRAFT

11 Scenario Briefing – Module 1 March 01, 2010 The following incidents involving disruptions to cyber security at USM have been reported: Hackers recently broke into the USM computer database, which could potentially compromise student, faculty and staff records. Hackers recently broke into the USM computer database, which could potentially compromise student, faculty and staff records. Upon consulting with the MS-ISAC, it was revealed that six other universities were having similar problems. Upon consulting with the MS-ISAC, it was revealed that six other universities were having similar problems. Reports that certain USM on-line service support systems (everything from SOAR to financial aid) are down or behaving erratically due to what appears to be a massive computer virus attack. Reports that certain USM on-line service support systems (everything from SOAR to financial aid) are down or behaving erratically due to what appears to be a massive computer virus attack. DRAFT

12 Module 1 Key Discussion Questions What kind of information is available to faculty, staff, students, and parents about an attack to the cyber system? What kind of information is available to faculty, staff, students, and parents about an attack to the cyber system? Have faculty, staff, community and emergency response partners been involved in providing input and feedback for crisis planning for schools? Have faculty, staff, community and emergency response partners been involved in providing input and feedback for crisis planning for schools? Will faculty and staff play a role in the incident command structure once the Incident Command System (ICS) is activated during an emergency? If so, what is the role? Will faculty and staff play a role in the incident command structure once the Incident Command System (ICS) is activated during an emergency? If so, what is the role? Is the USM current emergency response plan suited for a cyber attack? Is the USM current emergency response plan suited for a cyber attack? Is there a communication plan for keeping faculty, staff and students informed of decisions regarding attacks to the cyber system? Is there a communication plan for keeping faculty, staff and students informed of decisions regarding attacks to the cyber system? DRAFT

13 Module 1 Questions DRAFT

14 Scenario Briefing – Module 2 March 05, 2010 The “hacktivists” specifically targeted several critical infrastructure sectors, along with state and federal agencies, the media, and universities. The “hacktivists” specifically targeted several critical infrastructure sectors, along with state and federal agencies, the media, and universities. By generating counterfeit digital certificates, the “hacktivists” directed unknowing USM web users to “spoofed” websites where funds were extorted and personal information was mined. By generating counterfeit digital certificates, the “hacktivists” directed unknowing USM web users to “spoofed” websites where funds were extorted and personal information was mined. DRAFT

15 Scenario Briefing – Module 2 March 05, 2010 Coordinated attacks on domain name servers and telecommunications router infrastructure resulted in a distributed denial of service and unreliable telephony. Users were intermittently unable to access websites, send , and make phone calls. Victims of the attack were forced to explore alternative methods of communication during the disruptions. Coordinated attacks on domain name servers and telecommunications router infrastructure resulted in a distributed denial of service and unreliable telephony. Users were intermittently unable to access websites, send , and make phone calls. Victims of the attack were forced to explore alternative methods of communication during the disruptions. The USM Chief Security Officer (CSO) has received threats and false Amber Alerts have been broadcast. The series of suspicious events compelled the USM CSO to request activation of the State’s Emergency Operations Center. The USM Chief Security Officer (CSO) has received threats and false Amber Alerts have been broadcast. The series of suspicious events compelled the USM CSO to request activation of the State’s Emergency Operations Center. DRAFT

16 Module 2 Key Discussion Questions DRAFT Does the university have firewalls and countermeasures in place to protect the cyber system? Does the university have firewalls and countermeasures in place to protect the cyber system? Does the university plan to maintain educational operations in the case of a large scale cyber attack? If so, what plan is in place for maintaining continuity of instruction/business? Does the university plan to maintain educational operations in the case of a large scale cyber attack? If so, what plan is in place for maintaining continuity of instruction/business? Does the university have established communication protocols with community and emergency response partners during a massive cyber attack? Does the university have established communication protocols with community and emergency response partners during a massive cyber attack? What is the universities plan to communicate with media for latest information dissemination? What is the universities plan to communicate with media for latest information dissemination? What is the universities plan to communicate with emergency response partners during a cyber attack of this nature? What is the universities plan to communicate with emergency response partners during a cyber attack of this nature?

17 Module 2 Questions DRAFT

18 Scenario Briefing – Module 3 March 09, 2010 After evaluating the alleged incidents, the Governor determined that the threats were coordinated and serious enough to stand up the State Emergency Operations Center and reported the situation to the MS-ISAC. Several Federal law enforcement, intelligence, homeland security, defense, and sector-specific departments/agencies were notified. After evaluating the alleged incidents, the Governor determined that the threats were coordinated and serious enough to stand up the State Emergency Operations Center and reported the situation to the MS-ISAC. Several Federal law enforcement, intelligence, homeland security, defense, and sector-specific departments/agencies were notified. The State obtained one of the counterfeit Malware CDs and successfully installed countermeasures to successfully halt the attacks, the USM CSO received indication from the attackers that this type of situation would reoccur if their extortion demands were not met. The State took the threat seriously, coordinating efforts with the Federal Bureau of Investigation (FBI) to apprehend the adversary and continued their cyber response procedures. The State obtained one of the counterfeit Malware CDs and successfully installed countermeasures to successfully halt the attacks, the USM CSO received indication from the attackers that this type of situation would reoccur if their extortion demands were not met. The State took the threat seriously, coordinating efforts with the Federal Bureau of Investigation (FBI) to apprehend the adversary and continued their cyber response procedures. DRAFT

19 Scenario Briefing – Module 3 March 09, 2010 While the nation continued to experience widespread impacts of attacks on the IT and Communications sectors, the “hacktivists” targeted individual universities. The “hacktivists” intent was to cause cascading disruptions stemming from specific, focused attacks. While the nation continued to experience widespread impacts of attacks on the IT and Communications sectors, the “hacktivists” targeted individual universities. The “hacktivists” intent was to cause cascading disruptions stemming from specific, focused attacks. As the events unfolded, law enforcement and intelligence agencies gathered information and responded as necessary. In coordination with the impacted private sector entities and other government agencies, law enforcement and the Intelligence Community worked to halt attacks and restore confidence in the Internet. All participating organizations relied on trusted relationships and forged new communications paths to share information and build and pass along situational awareness. As the events unfolded, law enforcement and intelligence agencies gathered information and responded as necessary. In coordination with the impacted private sector entities and other government agencies, law enforcement and the Intelligence Community worked to halt attacks and restore confidence in the Internet. All participating organizations relied on trusted relationships and forged new communications paths to share information and build and pass along situational awareness.

20 Module 3 Key Discussion Questions What key procedures are in place to support the continuity of essential university operations, during a school closure? The following items should be considered during discussion What key procedures are in place to support the continuity of essential university operations, during a school closure? The following items should be considered during discussion Air quality/HVAC system functions Air quality/HVAC system functions Communication/Eagle Alert Systems Communication/Eagle Alert Systems Payroll Payroll Student Accounts Student Accounts How much time/school days does the university need to repair the cyber system? How much time/school days does the university need to repair the cyber system?

21 Module 3 Key Discussion Questions (Continued) What is the universities plan to maintain monitoring for possible resurgence of the computer virus/attack? What is the universities plan to maintain monitoring for possible resurgence of the computer virus/attack? Does the university have agreements in place with local and/or State emergency response entities regarding cyber security measures? Does the university have agreements in place with local and/or State emergency response entities regarding cyber security measures? What are USM procedures to maintain communication with community and emergency response partners? What are USM procedures to maintain communication with community and emergency response partners? What are USM procedures to communicate with parents, students, and staff? What are USM procedures to communicate with parents, students, and staff?

22 Module 3 Questions DRAFT

23 Does the USM emergency management plan adequately address key issues, such as faculty and staff training in the event of a cyber attack? Does the USM emergency management plan adequately address key issues, such as faculty and staff training in the event of a cyber attack? What problems did you identify in the emergency management procedures that could hinder emergency management efforts associated with a cyber attack? What problems did you identify in the emergency management procedures that could hinder emergency management efforts associated with a cyber attack? Does the USM emergency management plan adequately address key issues faced during a cyber attack, including continuity of business operations (e.g., payroll) and student accounts? Does the USM emergency management plan adequately address key issues faced during a cyber attack, including continuity of business operations (e.g., payroll) and student accounts? Exercise Debriefing Questions DRAFT

24 Exercise Debriefing Questions (Continued) Does the USM emergency management procedures properly coordinate communication as an emergency response activity among colleges, students, faculty, staff and community and emergency response partners during a cyber attack? In your opinion, what can be done to improve communication during an emergency situation such as the cyber attack scenario presented in the exercise? Does the USM emergency management procedures properly coordinate communication as an emergency response activity among colleges, students, faculty, staff and community and emergency response partners during a cyber attack? In your opinion, what can be done to improve communication during an emergency situation such as the cyber attack scenario presented in the exercise? Does the emergency management plan include partnerships with local and regional partners ensuring service and support during a cyber attack? Does the emergency management plan include partnerships with local and regional partners ensuring service and support during a cyber attack? In what ways were/will parents be engaged as stakeholders during the response to cyber attack? In what ways were/will parents be engaged as stakeholders during the response to cyber attack?

25 Exercise Debriefing Questions (Continued) Is there adequate support for students, faculty, and staff before, during, and after a mass cyber attack? If not, what activities and partnerships did the team identify to enhance assistance to faculty, staff, and students? Is there adequate support for students, faculty, and staff before, during, and after a mass cyber attack? If not, what activities and partnerships did the team identify to enhance assistance to faculty, staff, and students? Overall, what activities hastened recovery of the USM cyber system? What strategies prevented a greater prevalence of disruption? What are lessons learned for responding to future cyber attacks? What activities were the most helpful for recovering from the cyber attack? Overall, what activities hastened recovery of the USM cyber system? What strategies prevented a greater prevalence of disruption? What are lessons learned for responding to future cyber attacks? What activities were the most helpful for recovering from the cyber attack? What activities or processes were identified as gaps or weaknesses and will be addressed in future efforts? What activities or processes were identified as gaps or weaknesses and will be addressed in future efforts?

26 END OF EXERCISE The input, feedback, and questions you generate during participation in this exercise will help improve university emergency management efforts. Currently, there is no known cyber attack in the United States and all events depicted in this exercise are fictional. The goal of this exercise is to provide universities as well as their respective community and emergency response partners an opportunity, through discussion of possible events, to better prepare for a cyber attack. DRAFT