US-CERT www.us-cert.gov National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.

Slides:



Advertisements
Similar presentations
National Cyber Security Division (NCSD): Approved Overview Briefing
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Department of Homeland Security Site Assistance Visit (SAV)
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
National Infrastructure Protection Plan
The U.S. Coast Guard’s Role in Cybersecurity
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development EDUCAUSE Live! November 14,
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
Community Planning & Capacity Building Recovery Support Function Presented By: Michelle Diamond Community Planning & Capacity Building Coordinator FEMA.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
1 Webinar on: Establishing a Fully Integrated National Food Safety System with Strengthened Inspection, Laboratory and Response Capacity Sponsored by Partnership.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
National Disaster Recovery Framework. National Disaster Recovery Framework Reasons for establishing the Framework Past large-scale recovery efforts revealed.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
ESF #2 Communications.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Association of Defense Communities June 23, 2015
Information Sharing Challenges, Trends and Opportunities
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Infrastructure Protection
What APEC Task Force for Emergency Preparedness (TFEP) has progressed in the implementation of HFA Presented by Vincent Liu Program Director APEC Secretariat.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Role of Technical Agencies Responsible for Hazard Assessment, Monitoring, Observations, Data and Analysis Dr. David Green National Oceanic and Atmospheric.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
NITRD Networking and Information Technology Research and Development Program 19 March 2009.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
Coast Guard Cyber Command
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
for Election Infrastructure
BruinTech Vendor Meet & Greet December 3, 2015
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Cybersecurity Education & Awareness Overview
California Cybersecurity Integration Center (Cal-CSIC)
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
U. S. Department of Homeland Security. Office for Civil Rights
8 Building Blocks of National Cyber Strategies
Protective Security Advisor Program Brief
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
NPHS 1510 Federal and International
Presentation transcript:

US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT March 10, th Federal Information Systems Security Educators’ Association

2 The National Cyber Security Division (NCSD) is the National focal point for addressing cyber security issues in the United States. Mission components include:1. Identifying, analyzing and reducing threats and vulnerabilities 2. Disseminating threat warning information 3. Coordinating incident response 4. Providing technical assistance in continuity of operations andrecovery 5. Serving as national focal point for the public and private sectorregarding cyber security issues …Implement the National Strategy… Mission

3 PRIORITYIMPLICATION National Cyberspace Security Response System Rapid identification, information exchange, and remediation can mitigate damage Response system will involve public and private institutions and cyber centers to perform analyses, conduct watch and warning, enable information exchange, and facilitate restoration efforts National Cyber Security Threat and Vulnerability Reduction Program Coordinated national efforts by government and private sector to identify and remediate serious cyber vulnerabilities through collaborative activities, such as sharing best practices and evaluating and implementing new technologies Raise awareness, increase criminal justice activities, and develop national security programs to deter cyber threats National Cyberspace Security Awareness and Training Program Promote comprehensive national awareness program to empower all Americans – businesses, workforce, and general population to secure their parts of cyberspace Foster adequate training and education programs for Nation’s cyber-security needs Promote private support for independent certification of cybersecurity professionals Securing Governments’ Cyberspace Federal, State and Local Governments’ systems protection and resilience Continuously assess threats and vulnerabilities to cyber systems International Cyberspace Security Cooperation Improve attack attribution and prevention capabilities International cooperation – Facilitate and promote global “culture of security” – Foster international watch-and-warning networks to detect emerging attacks The National Strategy’s Five Priorities

Homeland Security Presidential Directive 7 December 17, 2003 U.S. Department of Homeland Security Information Analysis and Infrastructure Protection Paragraph 16. The Secretary will continue to maintain an organization to serve as a focal point for the security of cyberspace. The organization will facilitate interactions and collaborations between and among Federal departments and agencies, State and local governments, the private sector, academia and international organizations. To the extent permitted by law, Federal departments and agencies with cyber expertise, including but not limited to the Departments of Justice, Commerce, the Treasury, Defense, Energy, and State, and the Central Intelligence Agency, will collaborate with and support the organization in accomplishing its mission. The organization's mission includes analysis, warning, information sharing, vulnerability reduction, mitigation, and aiding national recovery efforts for critical infrastructure information systems. The organization will support the Department of Justice and other law enforcement agencies in their continuing missions to investigate and prosecute threats to and attacks against cyberspace, to the extent permitted by law.

U.S. Department of Homeland Security Information Analysis and Infrastructure Protection Strategy, Policy, Programs: Support, Studies, Analysis, and Policy Leadership US-CERT: The National Cyber Preparedness and Response System FedCIRC: Securing Government’s Cyberspace NCSD’s Integrated Capability

6 US-CERT: Readiness The National Response System  National Level Watch and Incident Management —24/7 Watch Operations —Cyber Interagency Incident Management Group (C-IIMG) —Develop and practice capabilities: Livewire —Early warning initiatives and displays  Vulnerability Assessment and Remediation —Current and potential vulnerabilities & remediation mechanisms —Malware lab and analysis capability —Common vulnerabilities and exposures identification —Critical Infrastructure Program cyber review matrix —Internet infrastructure critical system matrix

Homeland Security Presidential Directive 7 December 17, 2003 U.S. Department of Homeland Security Information Analysis and Infrastructure Protection Paragraph 16. The Secretary will continue to maintain an organization to serve as a focal point for the security of cyberspace. The organization will facilitate interactions and collaborations between and among Federal departments and agencies, State and local governments, the private sector, academia and international organizations. To the extent permitted by law, Federal departments and agencies with cyber expertise, including but not limited to the Departments of Justice, Commerce, the Treasury, Defense, Energy, and State, and the Central Intelligence Agency, will collaborate with and support the organization in accomplishing its mission. The organization's mission includes analysis, warning, information sharing, vulnerability reduction, mitigation, and aiding national recovery efforts for critical infrastructure information systems. The organization will support the Department of Justice and other law enforcement agencies in their continuing missions to investigate and prosecute threats to and attacks against cyberspace, to the extent permitted by law.

8 US-CERT: Readiness (continued) Outreach: Public-Private Partnership  Information dissemination, alerting and information products –Secure Communications Infrastructure for collaboration and response  National Cyber Security Summit  Partnerships for awareness, exchange and response –Incident Responders (Federal Government, International, Law Enforcement, Other) –Critical infrastructure owners and operators –Service providers and backbone providers –Security product vendors and software industry

9 National Cyber Security Division Providing strategy and policy support and leadership  Software Assurance –Software development processes –Security enhancement through automated tools  International Collaboration  Intelligence community requirements  Economic analysis  Standards and best practices –NIAP review in conjunction with DoD and NIST, and others  Training and Education

10 Training and Education  Centers of Academic Excellence Program −Co-sponsor NSA Centers of Academic Excellence in Information Assurance Education and expand to National program  IT Security Professional Certification Effort −Work with DoD and Federal agencies to collect requirements for IT security professional certification −Define job functions, skills and knowledge required, and common body of knowledge  Scholarship for Service Program −Work with National Science Foundation and Federal CIO Council, Workforce Committee to promote Scholarship for Service Program among all Federal agencies  IT Security Awareness −Work with Department of Education and existing organizations such as EDUCAUSE and National Cyber Security Alliance to promote IT security training and education in universities and primary/secondary schools

11 FedCIRC Initiatives Securing Government ’ s Cyberspace  Security Analysis Program –Passive vulnerability discovery and analysis capability –Capability exists on existing systems, being deployed  Incident Management –Processes, incident support and correlation –Consolidated NIPC, FedCIRC and other watches  Security collaboration groups –CISO Forum, GFIRST, others

12 National Cyber Alert System Provides credible and timely information on cyber security issues to include: Cyber Security Tips Cyber Security Bulletin Cyber Security Alerts All information products are available on a free subscription basis and are delivered via . Sign up at

13 Vulnerabilities US-CERT has recently issued alerts on:  Multiple Vulnerabilities in MS ASN.1 Library  HTTP Parsing Vulnerabilities in Checkpoint FW-1  Multiple Vulnerabilities in MS Internet Explorer Actions taken may include release of standard and technical advisories, informational bulletins, and vulnerability notes; coordination with affected vendors; coordination of remediation efforts with the federal government and private industry; LE and IC contact

14 Recent Events Borne Viruses  Beagle/Bagle  Mydoom/Novarg/Doomjuice  Netsky  Blaster/Welchia/Nachi

15 Long-term needs Stronger foundations R&D investments in The “science” of information assurance –Well defined security properties of components –Security metrics –Component composition rules that preserve security properties Engineering practices that build-in (rather than bolt- on) security Protocols that limit damage from distributed attacks

16 Near to mid-term needs Education and Training organizations Undergraduate & Graduate programs Increased emphasis on secure development practices in CS & Engineering programs Executive education programs on risk management and information security Security training for IT staff

17 Near to mid-term needs Software Developers Dramatic reduction in the number of vulnerabilities Secure out-of-the-box configurations “Virus-proof” software Response Groups Global indications and warning systems with predictive capabilities

18 Lawrence Hale Deputy Director, NCSD, US-CERT