UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Report to the KSD Board June 9, Provide Kent School District the necessary guidance and assistance to create an equitable, academically enriching,
Homeland Security Information Network-Emergency Management (HSIN-EM) Fire Service Community Overview Technologies for Critical Incident Preparedness Conference.
Strengthening Military Families: Opportunities for Commanders.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
National Infrastructure Protection Plan
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
National Cybersecurity Awareness Campaign 11
South Carolina Cyber.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
[ Date ] [insert your community foundation logo here] Give Local America A giving day opportunity.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Information Asset Classification
SYSTEM OF CARE BUILDING A TRAUMA INFORMED SOC IN ST. JOSEPH COUNTY.
Creating a “Culture” of Cybersecurity
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Why build a strategy? 7/15/2015 University of Wisconsin–Madison2 Options: Detection or Prevention Last strategic plan was five years old and never formally.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The Office of Infrastructure Protection
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
State PTA Reflections Network National Arts in Education Week PTA.org/ArtsEdWeek.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Homeland Security UNCLASSIFIED United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cyber Security and the Marine Transportation System.
Energy Losses Management Programme From Strategy to Implementation ‘Social Marketing Strategy Overview’
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
Homeland Security UNCLASSIFIED Executive Order Presidential Policy Directive (PPD) - 21 Implementing the Presidential Executive Order (EO) on cybersecurity.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
California Youth Advocacy Network CYAN offers the following: Technical Assistance Trainings (in-person and teleconference) Statewide Advocacy and Policy.
Solano County Office of Education Jay Speck Solano County Superintendent of Schools.
2014 Implementation Plan Special Recognition Program Committee for Europe Sevinç Atay JCI Turkey.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Business Crisis and Continuity Management (BCCM) Class Session
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Connecting executives to meet America’s challenges January 2012 INFORMATIONAL BRIEFING Leading EDGE Program Overview.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
National Emergency Communications Plan Update National Association of Regulatory Utility Commissioners Winter Committee Meeting February 16, 2015 Ron Hewitt.
Cybersecurity Education & Awareness Overview
United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cybersecurity and the Marine Transportation System.
California Cybersecurity Integration Center (Cal-CSIC)
Dr. Konstantinos Komaitis
Cybersecurity Education and Workforce Development Resources
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Public Policy & the Internet
Cyber Security Ecosystem of Georgia. Experience and Challenges
Securing free and fair European elections
Refreshing New Zealand’s Cyber Security Strategy 2018
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
ISACA IN 2019 Robin Lyons WHAT’S NEXT, NOW Technical Research Manager
October is National Cybersecurity Awareness Month
ADVANCING THE PRACTICE OF CASE MANAGEMENT
Presentation transcript:

UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1

UNCLASSIFIED Homeland Security NATIONAL CYBER SECURITY AWARENESS MONTH A collaborative effort, celebrated each October, between government and industry to raise awareness about staying safe online Formally recognized by the President, Congress, and leaders from industry and academia International reach and support from partners such as Canada, the European Union, and Japan 2015 marks National Cyber Security Awareness Month’s (NCSAM) 12th year, spreading cybersecurity awareness across the nation

UNCLASSIFIED Homeland Security NCSAM 2015 Each week in October is dedicated to a specific cybersecurity theme. The five themes listed below offer the opportunity for government and industry to get involved in cybersecurity activities most relevant to them. Week 1, October 1-2 – General Cybersecurity Awareness: 5 Years of Stop.Think.Connect.™ Week 2, October 5-9 – Creating a Culture of Cybersecurity at Work Week 3, October – Connected Communities: Staying Protected While Always Connected Week 4, October – Your Evolving Digital Life Week 5, October – Building the Next Generation of Cyber Professionals

UNCLASSIFIED Homeland Security GET INVOLVED Join us this NCSAM by educating and empowering your community to take steps to protect themselves and their families online: –Promote NCSAM in your organization or community –Become a NCSAM Champion –Participate in NCSAM 2015 Twitter chats For more info: involved/twitter-chats/ –Attend a NCSAM event in your area –Use the NCSAM hashtag – #CyberAware – to promote your organization’s involvement in raising cybersecurity awareness Learn more at:

UNCLASSIFIED Homeland Security STAY INVOLVED Stay involved with DHS’s Stop.Think.Connect. Campaign year-round: –Become a Stop.Think.Connect. Campaign partner to formally adopt the Campaign messaging and share materials and resources from DHS with your organization –Sign up to become a Friend of the Campaign and receive regular updates Learn more at:

UNCLASSIFIED Homeland Security NCCIC Overview and Mission NCCIC Overview - -Operates at the intersection of the network defense, private sector, civilian, law enforcement, intelligence, and defense communities - cybersecurity and communications domains NCCIC Mission – -Apply unique analytic perspectives -Ensure shared situational awareness -Orchestrate synchronized response efforts -Protect the Constitutional and privacy rights of Americans 6

UNCLASSIFIED Homeland Security We NEED to Think Differently - A New Paradigm for Security Security breaches are inevitable Leadership must OWN the problem Manage Risk – build into security – threat centric Situational Awareness - vital Resilience is ESSENTIAL - operate through compromise Compliance is NOT security Partnership between government and industry is critical Culture Shift – Reactive to PROACTIVE!!! 3

UNCLASSIFIED Homeland Security Dynamic cyber defense SOC, CSIRC, C&A, Policy Traditional Cyber Security SOC, CSIRC, C&A, Policy IT/Network Mission Security User Behavior Deep Net Awareness Information Sharing Intelligence Leadership Resilience 4

UNCLASSIFIED Homeland Security When should it be used?TLP ColorHow may it be shared? Sources may use TLP: RED when information cannot be effectively acted upon by additional parties, and could lead to impacts on a party’s privacy, reputation, or operations if misused. RED Recipients may not share TLP: RED information with any parties outside of the specific exchange, meeting or conversation in which it is originally disclosed. Sources may use TLP: AMBER when information requires support to be effectively acted upon, but carries risks to privacy, reputation, or operations if shared outside of the organizations involved. AMBER Recipients may only share TLP: AMBER information with members of their own organization, and only as widely as necessary to act on that information. Sources may use TLP: GREEN when information is useful for the awareness of all participating organizations as well as with peers within the broader community or sector. GREEN Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels. Sources may use TLP: WHITE when information carries minimal or no risk of misuse, in accordance with applicable rules and procedures for public release. WHITE TLP: WHITE information may be distributed without restriction, subject to copyright controls. Traffic-Light Protocol (TLP): Originator-controlled classification system developed to encourage greater sharing of sensitive (but unclassified) information with external entities. Protection of Information 9

UNCLASSIFIED Homeland Security Protection of Information (cont.) Protected Critical Infrastructure Information (PCII) Information-protection program –enhances voluntary information sharing between infrastructure owners and operators and the government PCII protections –Guarantee shared information will not lead to the exposure of sensitive or proprietary data 10

UNCLASSIFIED Homeland Security So What? -Understand Threat Landscape -Leadership OWNS a New Paradigm! -Consider Cybersecurity Framework -Implement 20 Critical Security Controls -Change – Reactive to Proactive – Intelligence & Information Sharing 7

UNCLASSIFIED Homeland Security 12