Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Inteco and NIST Cooperation Peter Mell National Vulnerability Database Project Lead Senior Computer Scientist NIST Computer Security Division Tim Grance.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
Stephen S. Yau CSE , Fall Security Strategies.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
100 % UPTIME SLAs 27 | 8 DATA CLOUD CENTERSPODS SSAE-16, SOC 2 TYPE II, PCI-DSS, HIPAA, HITECH AT101, NIST , SAFE HARBOR COMPLIANT POWER INFRASTRUCTURE.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
Information Security Update CTC 18 March 2015 Julianne Tolson.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
Chapter 2 Securing Network Server and User Workstations.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Cybersecurity : Optimal Approach for PSAPs
Frontline Enterprise Security
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
DIR Basics Series March 22 nd, 2016 Cybersecurity Edward Block.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Capabilities Matrix Access and Authentication
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
LAND RECORDS INFORMATION SYSTEMS DIVISION
IT Development Initiative: Status and Next Steps
UConn NIST Compliance Project
National Cyber Security
Identity & Access Management
Security as Risk Management
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
IBM GTS Storage Security and Compliance overview.
Discussion points for Interpretation Document on Cybersecurity
Cybersecurity Framework For Energy Sector
LM 5. Wireless Network Security
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015

Overview Existing Security Protocols Data Mapping Assess needs, identify best practices

Existing Security Protocols PoliciesStandardsGuidelines

Cybersecurity Physical Infrastructure 1.Layered security a)Agency specific compliance b)Protection between agencies 2.Protection and Detection a)Firewall; Intrusion Detection; Anti-bot b) inspection; Web filtration; Data Loss Prevention c)Endpoint and Server anti-virus

Cybersecurity Policies 1.ITA authority (I.C ) a)Primarily initiated and coordinated by Admin b)Coordinated with agencies through ITA subcommittee 2.Policies, Standards, Guidelines a)29 directly addressing cybersecurity b)E.g. Incident reporting; cloud based file storage; data cleansing methods

Policy Highlights 1.P-4110: requires agency cybersecurity coordinator 2.P-4510: defines cybersecurity incident and requires reporting 3.G-580: defines cybersecurity breach; provides foundation for data mapping

Data Mapping

Categorize Select ImplementAssessAuthorizeMonitor Security Life Cycle - Federal -

Data Mapping

Assess Needs and Identify Best Practices

Assess Needs Idaho Technology Authority Manage Risk

Best Practices NIST (Fed) v. ISO Education Vulnerability Scanning/ Penetration Testing

Best Practices Build Relationships Improve Oversight

Technical Steps Mobile Devices End Points

Technical Steps Authentication