REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,

Slides:



Advertisements
Similar presentations
Homeland Security Information Network-Emergency Management (HSIN-EM) Fire Service Community Overview Technologies for Critical Incident Preparedness Conference.
Advertisements

REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Doug Pearson Director, REN-ISAC
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
Protected Critical Infrastructure Information (PCII) Program
1 April 12, 2010 Information Security Officer Meeting.
National Infrastructure Protection Plan
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
REN-ISAC Update Doug Pearson, REN-ISAC Technical Director DICE 12 February 2008 Athens, Greece 1.
1 REN-ISAC Research and Education Networking Information Sharing and Analysis Center Internet2 Member’s Meeting Chicago 5 December 2006.
(Geneva, Switzerland, September 2014)
REN-ISAC Research and Education Networking Information Sharing and Analysis Center.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
The LOGIIC Consortium Zachary Tudor, CISSP, CISM, CCP Program Director SRI International.
Food and Agriculture Sector Coordinating Councils John L. Williams, DVM U.S. Department of Agriculture AFDO Annual Conference Kansas City, MO June 7, 2005.
Robert Arnold Federal Highway Administration Director, Office of Transportation Management.
Maintaining Essential Business and Community Services During a Pandemic Paul R. Patrick, Director Bureau of Emergency Medical Services Utah Department.
Security Professionals Conference May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Security: New Trends, New Issues Internet2 Fall Member Meeting 2004 Doug Pearson Indiana University Research and Education Networking ISAC
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
INDIANAUNIVERSITYINDIANAUNIVERSITY TransPAC2 Security John Hicks TransPAC2 Indiana University 22nd APAN Conference – Singapore 20-July-2006.
Early detection/rapid response to foreign animal and zoonotic diseases through a County Animal Security and Health Network Kelly J. Matthews, Dr. Shannon.
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Shared Darknet Project Internet2 Spring 2006 Member Meeting Doug Pearson Technical Director, REN-ISAC.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Critical Infrastructure Protection Critical Infrastructure Protection Private Sector Programs April 7, 2005 Rod Nydam, JD, GMU Law School Private Sector.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
INDIANAUNIVERSITYINDIANAUNIVERSITY 23rd APAN Meeting Manila, Philippines January REN-ISAC and Peakflow SP John Hicks Indiana University TransPAC2.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Sponsored Educational Group Participation in Abilene Laurie Burns Director, Member Activities, Internet2 EDUCAUSE Gathering of State Networks Denver, Colorado.
NSF Cybersecuity Summit May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within the higher.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC Doug Pearson Director, REN-ISAC Copyright.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC Doug Pearson Director, REN-ISAC
1 REN-ISAC Update Research and Education Networking Information Sharing and Analysis Center Joint Techs Madison WI July 2006.
PHDSC Privacy, Security, and Data Sharing Committee Letter to Governors.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Spring 2004 Internet2 Member Meeting NLR Service Center Update Dave Jent Indiana University.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
EDUCAUSE/Internet2 Computer & Network Security Task Force
Educause/Internet 2 Computer and Network Security Task Force
California Cybersecurity Integration Center (Cal-CSIC)
America’s First National Critical Infrastructure Exercise
CIPC Relationships & Roles
Privacy Recommendation PAR Proposal
Corporate Forum Presented by
Presentation transcript:

REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14, 2003

ISAC Intro Information Sharing and Analysis Centers (ISACs) are a cooperation of critical sector private and public entities with the U.S. Department of Homeland Security (DHS) to facilitate the sharing of information and collaboration to protect against threat. Example critical sector ISACs include Food Industry, Water, Emergency Services, IT, Electric Power, Gas, etc.

REN-ISAC The REN-ISAC (Research and Education Networking Information Sharing and Analysis Center) supports U.S. higher education and research communities by providing advanced network security services, and supports efforts to protect the national cyber infrastructure by participating in the U.S. ISAC infrastructure. The REN-ISAC supports all of higher education – is not Internet Abilene-specific.

REN-ISAC Information Base The REN-ISAC utilizes information derived from its constituents, network engineers, network instrumentation, other ISACs, and the DHS. And, shares information in that community.

Use of Abilene NetFlow Data Through relation with Internet2 and the Indiana University Abilene NOC, the REN-ISAC has a view of Abilene NetFlow data. In conjunction with the IU Advanced Network Management Lab the NetFlow data is used to characterize general network security threat activity, and to identify specific critical threats. Custom analysis, and confidential reporting –/21s. Should we move to /24? Arbor Networks Peakflow

Policy REN-ISAC is working with Internet2 to develop a policy for how the NetFlow data can be used Highlights: –Publicly reported information is restricted to aggregate views of the network. Information that identifies specific institutions or individuals cannot be reported publicly. –Sensitive information must be communicated with designated representatives of the affected institutions and refer only to local activity, unless otherwise authorized.

Registry To include all of higher education, Abilene- connected institutions are the launching pad. Primary registrant is the CIO, IT Security Officer, or equivalent. Delegates (including 24x7) and Observers. Related information to serve network security management and response, e.g. address blocks, domains, network agreements (e.g. Abilene, NLR), etc.

Past Activities Blaster –Identified top sourcing institutions of MS RPC scanning on Abilene and sent to representatives of those institutions describing their relative position as a source, /21s involved, and mitigation techniques. Nachi –Characterized the overall level of ICMP on Abilene and pointed to mitigation techniques

Relationships Internet2 EDUCAUSE EDUCAUSE/Internet2 Security Task Force IU Abilene NOC IU Advanced Network Management Lab DHS

Questions In what ways can the REN-ISAC benefit the community? Policy considerations? The relationship of privacy and security. Development of the registry, contact, procedure and policy.