Resources to Support Training Programs for CSIRTs.

Slides:



Advertisements
Similar presentations
Vanja Ivosevic Centre for Education Policy Becici, 24 April 2010 Mapping policies and practices for the preparation of teachers for inclusive education.
Advertisements

Philippine Cybercrime Efforts
1 National Collaborative on Workforce and Disability for Youth Competencies for Working with Youth: Identify, Assess, and Build Them!
Comparative Study of MOPAN and EvalNet Approaches to Assessing Multilateral Organizations’ Development Effectiveness James Melanson Director, Development.
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
David A. Brown Chief Information Security Officer State of Ohio
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
By Collin Smith COBIT Introduction By Collin Smith
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Computer Security: Principles and Practice
Center for Health Care Quality Licensing & Certification Program Evaluation 1 August 2014 rev.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Roles of IT Personnel Unit Customer Service This is a facility that helps customers with wide-ranging questions relating to a specific company,
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Copyright 2003 Cuyahoga Community College District Knowledge Management: Making it Fly in Higher Education Presenter: Amy C. Eugene Director, Knowledge.
project management office(PMO)
Schools’ Data Collection for National Partnerships Agreements (NPA) Educational Measurement and School Accountability Directorate (EMSAD)
SQA Architecture Software Quality.
Joel Maloff Phone.com February, 2012.
Prepared by London Pharmacy Education & Training 2011 based on previous work by North Thames and South Thames Pharmacy Education & Training March 2000.
1 Talal Abu Ghazaleh Information Technology International (TAG-ITI)
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
SQA Architecture Software Quality By: MSMZ.
This Lesson Introduction to the ADDIE model Needs Analysis
2014 E DUCATIONAL T ECHNOLOGY P LAN P ROJECT K ICKOFF.
Test Organization and Management
Cybersecurity nexus (CSX)
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
The RRCP Program A Framework for Change Presented to our SPDG Partners June 2010.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
Help Desk Introduction to Computer User Support. 2 Certificate III Software Applications Introduction to Computer User Support Increased Need for User.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Topic #3: Job Analysis Paul L. Schumann, Ph.D. Professor of Management MGMT 440: Human Resource Management © 2008 by Paul L. Schumann. All rights reserved.
How to use the VSS to design a National Strategy for the Development of Statistics (NSDS) 1.
Association of Corporate Counsel Page 2 Benefits of Membership Communities Chapters and committees CLO network Membership Directory Member-To-Member.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Programme Performance Criteria. Regulatory Authority Objectives To identify criteria against which the status of each element of the regulatory programme.
Copyright  2005 McGraw-Hill Australia Pty Ltd PPTs t/a Australian Human Resources Management by Jeremy Seward and Tim Dein Slides prepared by Michelle.
1 National Collaborative on Workforce and Disability for Youth “Keys to Success: Youth Service Practitioners Competencies”
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Company: FirstGroup Position: IT Auditor or Senior IT Auditor Location: Cincinnati, OH About the Company : FirstGroup plc, headquartered in Aberdeen, Scotland,
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Customised solutions for all your human resources.
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
SEN 460 Software Quality Assurance. Bahria University Karachi Campus Waseem Akhtar Mufti B.E(C.S.E) UIT, M.S(S.E) AAU Denmark Assistant Professor Department.
Jeff Linton and Mary Kate McNulty. Mission Statement  Student Access  Acquisition of Technology  High Quality Training.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
1 Dr. Ali Mistarihi Employee Training & Development.
© PeopleAdvantage 2013 All Rights Reserved We will Show You How to Easily Conduct Effective Performance Appraisals LCSA Conference 2013.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
PLCs Professional Learning Communities Staff PD. Professional Learning Committees The purpose of our PLCs includes but is not limited to: teacher collaborationNOT-
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Records Coordinator Roles and Records Skills Kathryn Dan.
Chapter 1 Computer Technology: Your Need to Know
Leverage What’s Out There
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Gaby Andrews Zack Decker Susana Lopez Peter Miranda
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Presentation transcript:

Resources to Support Training Programs for CSIRTs

Problem There is a long trend which shows CSIRTs are having a problem training their staff A recent survey* by Jeff Yuetter had two interesting results – Staff expertise or availability is a very challenging problem to 49% of teams (51 responded) – 54% of the teams do not have a formal training or mentoring program in place (56 responded) Similar findings were reported by – CERT/CC in 2009 – CERT/CC in 2003 * update d version of CSIRT State of the Practice independently carried out by Jeff in Fall 2011

Causes We assume that there will be multiple causes for this issue. We will primarily focus on: – Lack of identified resources to compose a comprehensive training plan – Lack of knowledge on how to prepare and execute a training plan Thus, we believe the major issues are related to building and executing Training Plans

Major Steps to Creating a Training Plan (1) Identify all of the topics required (2) Create a check-list that summarizes all the training topics (3) Identify the resources (4) Develop a procedure for evaluation and correction (to include assessment materials)

A Relook at Causes We assume that there will be multiple causes for this issue. We will primarily focus on: – Lack of identified resources to compose a comprehensive training plan This is step (3) in Creating a Training Plan – Lack of knowledge on how to prepare and execute a training plan This is part of step (4) in Creating a Training Plan This means the major issues are related to executing Training Plans

What has been done What about steps (1) and (2)? The (U.S.) National Initiative for Cybersecurity Education (NICE) has a framework – – Nice addresses steps (1) and (2)

What Can We do We are proposing that a pilot could focus on Incident Responders. In NICE this is – Protect and Defend: Incident Response: Tasks and KSAs (pgs 70-73) Cybersecurity-Workforce-Framework-printable.pdf Cybersecurity-Workforce-Framework-printable.pdf We could identify and document the resources for the tasks and KSAs [step (3)]

The Pilot Pilot: An attempt to address step (3) Identify resources for NICE specialty areas tasks/KSAs – Focus on specialty area - Incident Responders Protect and Defend: Incident Response: Tasks and KSAs (pgs 70-73) We believe this material is part of the missing information needed by CSIRT managers to develop a training plan

Pilot Work with 6 to 7 domain experts within a community to identify resources to match against Tasks and KSAs – This would also identify gaps We could either host the material on our website or assist with the community hosting it on theirs – Initially we think a wiki format might be best

Benefits If we can identify what resources will be required to meet specific Tasks and KSAs at various levels, it will also assist with – Management of professional development for staff – Better inform Human Resources in recruiting – Inform new recruits what the expectations are for role/position within a team

Long Term It is not sufficient to just have resources and a plan Assessments of the resources(4) will be required before we have a complete solution for CSIRTs

OVERVIEW OF NICE

NICE Framework -1 Generic Outline – Framework Category Specialty Area – Tasks – KSAs (Knowledge, Skills, and Abilities) Example – Protect and Defend Incident Response – 16 Tasks – 26 KSAs

NICE Framework - Categories There are seven framework categories – Securely Provision (SP) – Operate and Maintain (OM) – Protect and Defend (PD) – Investigate (IN) – Operate and Collect (OC) – Analyze (AN) – Support (S)

NICE Framework - Specialty Areas There are a total of 31 Specialty Areas SP: Information Assurance CompliancePD: Computer network Defense Infrastructure Support SP: Software EngineeringPD: Security Program Management SP: Enterprise ArchitecturePD: Vulnerability Assessment and Management SP: Technology DemonstrationIN: Digital Forensics SP: Systems Requirements PlanningIN: Investigation SP: Test and EvaluationOC: Collection Operations SP: Systems DevelopmentOC: Cyber Operations Planning OM: Data AdministrationOC: Cyber Operations OM: Info Systems Security ManagementAN: Cyber Threat Analysis OM: Knowledge ManagementAN: Exploitation Analysis OM: Customer Service and Technical SupportAN: All Source Intelligence OM: Network ServicesAN: Targets OM: System AdministrationS: Legal Advice and Advocacy OM: System Security AnalysisS: Strategic Planning and Policy Development PD: Computer Network DefenseS: Education and Training PD: Incident Response

Similar Initiatives

Matrix: NICE specific specialty areas to training/classes Training Plans: Interview teams to create generic training plans for the CSIRT community

Initiative: Matrix We would like to create a Matrix that would identify by NICE framework specialty areas what training courses or college classes (language unspecific) meet the Tasks and/or KSAs An example of a similar project done by SANS can be found at (pg 2): security-controls/winter-2012-poster.pdfwww.sans.org/critical- security-controls/winter-2012-poster.pdf

Initiative: Matrix cont. For a pilot we will be working with the FIRST Education and Training Committee – We are looking for a few more experts to join the effort Our initial area of focus will be the Protect and Defend framework category – We would further subdivide each specialty area into Junior / Intermediate / Senior Instead of freely available resources we will take a different look to address step (3) – Training Classes – College Classes (to include freely available online)

Initiative: Training Plans Use the resource from the 2 previous Pilots Interview CSIRTs with existing training plans Develop templates and resources to assist CSIRT managers in creating and managing training within their organization