DIR Basics Series March 22 nd, 2016 Cybersecurity Edward Block.

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Oregon Department of Education Business Continuity / Disaster Recovery Program Implementation Mark Tyler Nigel Crowhurst.
Building a More Secure and Prosperous Texas through Expanded Cybersecurity Mary Dickerson Texas Cybersecurity, Education and Economic Development Council.
David A. Brown Chief Information Security Officer State of Ohio
Communications Technology Services John Hoffman, Director June 27, 2013.
Shared Technical Architecture’s Role within the ECIO Organization “Arkansas Shared Technical Architecture”
Office of Technology Partnerships September 17, 2007 State and Local Collaboration Michigan’s Cross Boundary Program.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Iowa Interactive Overview for the IOWAccess Advisory Council September 10, 2008.
D ECEMBER 12, 2014 The State of the State of Cybersecurity.
Information Security Governance
Office of Enterprise Technology Agency Overview House State Government Finance Committee February 2, 2011.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
April 2011 NC Division of Child Development1. April 2011 NC Division of Child Development2 SEEK Awareness Subsidized Early Education for Kids.
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
Information Technology Assessment Review Presented to the Board of the State Center Community College District.
84th Legislative Session TECHNOLOGY BILL HIGHLIGHTS
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
2012 Hired Highway Safety Services to assist in the management of SMSA Opened the SMSA Business Office Created a new Web Page Distributed the SMSA Newsletter.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
TECHNOLOGY SOLUTIONS FOR GOVERNMENT AND EDUCATION 1 Senate Bill 20: DIR Implementation VENDOR WEBINAR| AUGUST 25, 2015 Texas Department of Information.
Cloud services security Prof. Manel Medina Head of Unit CERT Operations support ENISA
Roles and Responsibilities
Optimized IT Gae Lyn DeLand, IT Director In. March 15, 2007 IT Governance General Description: “This Bill consolidates information technology services.
Leveraging Weatherization Funding The Energy Project March 1, 2012.
1 The AccessText Network An Association of American Publishers Digital Text Portal Information Session July 23, 2009.
United We Ride: Where are we Going? December 11, 2013 Rik Opstelten United We Ride Program Analyst.
Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Implementation Strategy July 2002 STANDARDS DEVELOPMENT LIFECYCLE PROCESS ORP Publishes & Maintains 8 Standing Committee Recommends Approval / Disapproval.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
1 Office of Community Services Division of State Assistance COMMUNITY SERVICES BLOCK GRANT (CSBG) Technical Assistance Coordination Strategy Office of.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Panelists ASIS International – Dr. Marc Siegel, Security Management System Consultant, ASIS International Disaster Recovery Institute International (DRII)
2014–2018 State Strategic Plan Survey Results Technology Planning, Policy, and Governance.
Office of Core and Shared Resources Faculty Council Meeting October 9, 2012.
Information Technology Assessment conducted by BerryDunn Consulting for the UA System March 9, 2015.
Medicaid/SCHIP Technical Assistance for Health IT/HIE 2008 AHRQ Annual Conference Presented by: Linda Dimitropoulos, RTI International.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
Welcome Update on REC activities September 25, 2012.
GoToWebinar ® Attendee Controls Grab Tab Audio Pane Use Settings to configure and test audio and other preferences. Click arrow to hide or show control.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Operationalize the State Strategic Plan for IT Software Currency May 11,2016.
DIR Basics Series March 29 th, 2016 Data Center Services Tere Shade and Wendy Mazzurana.
DIR Basics Series March 24 th, 2016 Texas.gov Jennifer Buaas.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
DIR Enterprise Contracts DIR Connect May 25, 2016.
Enterprise Solution Services Assessing the IT environment Oversaw 2014 Texas Legacy System Study report (HB 2738, 83R) Identified 4,130 business applications.
Building a Public Health Informatics Division. OSDH Public Health Informatics Division Identify the needs Develop the proposal Establish division Reality.
Shared Technical Architecture’s Role within the ECIO Organization
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
Interoperability of Data Systems Administration for Children & Families Office of Planning, Research & Evaluation Robert (Bob) Garcia Regional Administrator,
IT Development Initiative: Status and Next Steps
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Mark Tyler Nigel Crowhurst
Enterprise Cybersecurity Upgrade Initiation Department of Information Technology Maria Sanchez, Acting State CIO November 13, 2018.
PACE Purchasing Cooperative
Cyber Risk & Cyber Insurance - Overview
IT Development Initiative: Status & Next Steps
IBM GTS Storage Security and Compliance overview.
Enterprise Cybersecurity Initiative Department of Information Technology Vince Martinez, State CIO, Executive Sponsor Lorenzo Ornelas, Managing Director.
Presentation transcript:

DIR Basics Series March 22 nd, 2016 Cybersecurity Edward Block

OCISO Program Overview

Program History 2004 DIR Forms Office of the CISO 2005 HB3112 directed DIR to create the Network Security Operations Center (NSOC), to provide network security services to state entities 2011 SB988 established the Texas Cybersecurity, Education, and Economic Development Council 2002 Penetration Testing Services as part of the Enterprise Operations Division 2013 SB 1102 created the position of state Cybersecurity Coordinator within DIR 2015 HB 1, Article IX, Sec Cybersecurity and Legacy System Priorities SB 34 Biennial Report to leadership on the state’s information security status

Electronic Governance, Risk, and Compliance (eGRC) IdentifyProtectDetectRespondRecover

Electronic Governance, Risk, and Compliance (eGRC) IdentifyProtectDetectRespondRecover Higher Education Program Catalog (Live) OCISO Program Participation (Live) Legacy and Cybersecurity Prioritization (Live) Agency security plans (Live) Application Portfolio Management (Future) Risk assessment (Live) Policy (Live) SOC alerting (Live) Threat (future) Urgent incidents (Live) Monthly incident reports (Live) Business continuity / disaster recovery (future)

Education and Awareness InfoSec Academy Monthly Webinars Service Webinars Newsletters Information Security Forum For our metrics purposes, 100% is the 143 agencies that are required to report security incidents to DIR

Security Services Assessment Services o Technical Assessments o Vulnerability Scanning o Web Application Vulnerability Scanning o Security Program Assessments o Decision Support Services Collaboration Opportunities o Statewide Information Security Advisory Committee (SISAC) o Information Security Working Group (ISWG) o Texas Cybersecurity Council

Customers State agencies and Public Institutions of Higher Education TEXAN Customers DCS Customers

Budgetary Details Funding provided through administrative fees collected on other DIR services Services provided free to state entities

On the Horizon HB 1, Article IX, Sec. 9.10: Cybersecurity and Legacy System Priorities HB 1, Article IX, Sec. 9.11: Cybersecurity Purchases SB 34: Biennial Report to leadership on the state’s information security status SB1877: Data Use Agreements within state agencies SB1878: Study on Identity and Access Management solutions for statewide adoption

OCISO Contact Information  24x7 Incident Response Hotline  GRC Questions  Information Security Forum Questions  Other OCISO questions