State of the Ecosystem: Where We Are and Where We’re Going Gregory B. White, Ph.D. 1 September

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Arizona – The Land Where Unicorns Run Free Urban Area Security Initiative Cybersecurity.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
1 E-Procurement in Azerbaijan Republic Challenges and perspectives Elshad Samedzade, PHD & Arzu Aliyev
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Jeff Recor IAC 2003 FISSEA IA Community Outreach March 2005 Jeff Recor Director, IAC.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
APEC Automotive Dialogue Road Safety Summit Robert C. Lange General Motors Executive Director Vehicle Structure & Safety Integration September 5, 2006.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
DS Cyber Security for SMEs, local public administration and Individuals Dr. William Hynes Future Analytics Consulting (FAC)
CIP Prevention, detection, response and mitigation of the combination of physical and cyber threats to the transport infrastructure of Europe Dr.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
10/04/2016 David LaPlante, CISO Information Security & Cybersecurity Program Planning Critical Infrastructure Cyber Security Framework.
Seda Annual Performance Plan 2017/18 – 2019/20
Society for Maintenance and Reliability Professionals (SMRP)
A secure and resilient Nation: connected, informed and empowered.
Broadband Challenges 2017 Christopher Tamarin
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
The Demand-Driven Workforce Investment System
Improving the health of the public by 2040: Optimising the research environment for a healthier fairer future UKPRP - May 2017 Graham Hart FMedSci Dean,
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Online Public Meeting 20 OCTOBER 2016
Cyber Security – An Existential Threat? (IIC, Singapore)
Overview of the Network
Information Security – Current Challenges
South Big Data Innovation Hub
Welcome! Enhancing the Care Team May 25, 2017
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Supporting New and Emerging ISAOs 01 September 2016
The importance of SMEs for ITU
California Cybersecurity Integration Center (Cal-CSIC)
ASSET - Automotive Software cyber SEcuriTy
Continuity of Government Through Managed Services
Stretch Your Budget With Organizational Membership
Data Security Team 1.
Bringing It All Together: The PCI Framework
Dr. Vida G. Wright, P.E., F.SAME Southwest Region Vice President
Creating & Sharing Value with Network Activity & Threat Correlation
Managing Change and Other Keys to Successful Implementation
Protective Security Advisor Program Brief
1 PAGER 10. Mai 2002.
Attacks on The Manufacturing Industry
Getting to an Inclusive, Regional Economic Development Strategy
Community Technology Assessments
David Sayago EU Research Funding Team Valorisation Centre.
Connected & Automated Vehicle Executive Leadership Team (CAV ELT)
SustainRisk Providing an unique combination of expertise in extractives after decades of work in financial institutions, mining companies and consulting.
Health care for the Homeless Strategic Planning 2018
Final Conference in Paris Exploitation plan
RESOURCE MOBILIZATION Col Dr Vijay Deshpande
What The States Are Doing on Election Security
Cybersecurity ATD technical
Giles Denham Director of Strategic Relationships
Refreshing New Zealand’s Cyber Security Strategy 2018
Stretch Your Budget With Organizational Membership
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
The CYBERWISER.eu project
Cybersecurity EXERCISE (CE) ATD Scenario questions
Facilitating Change (AET 560)
Chapter to Provide Title
NDIA DoD CIO Vision.
The Consultative Group To Assist the Poorest
Infragard national 2019 Strategic direction & plans
Presentation transcript:

State of the Ecosystem: Where We Are and Where We’re Going Gregory B. White, Ph.D. 1 September

Why is Cybersecurity Information Sharing Important? “In our industry, we are constantly one or two steps behind the hackers. Over the past several years, the prevailing sentiment is that coming together as a security community to better combat these attacks would make our jobs easier and allow our clients, and us, to sleep better at night. At the same time, this practice would provide security teams the breathing room to focus on higher-value activities, like detecting and researching anomalous behavior.” is-important#sthash.jjGbbNbW.dpuf

Mission and Vision of the ISAO Standards Organization Mission: Improve the Nation’s cybersecurity posture by identifying standards and guidelines for robust and effective information sharing related to cybersecurity risks/incidents and cybersecurity best practices. “The cyber threat is one of the most serious economic and national security challenges we face as a Nation.” President Barack Obama, March 2010 Vision: A more secure and resilient Nation that is connected, informed and empowered. (This means we need more than just the critical infrastructures to be part of the information sharing program, we need every sector/industry/agency/individual.)

Creation of an Information Sharing Ecosystem Information Sharing and Analysis Centers (ISACs) were created over a decade ago to address the needs of the nation’s critical infrastructures. The majority of organizations/businesses are not part of one of the critical infrastructures, but they need to be engaged in information sharing as are entities that are related to a critical infrastructures. We need to build an “ecosystem” that will include all individuals and organizations that want to participate in information sharing.

Aviation ISAC Orthopedic Doctors School Systems Alabama Baptists Ministers ISAO Program ISAO Standard Organization ISAO Service Providers National Bar Association SW U.S. Mariachi Bands ISAO Association of Online Auction Professionals Health ISAC Financial Services ISAC State of Texas ISAO Mariachi Bands of Texas ISAO Automotive Manufacturers Law Enforcement From ~ 20 Sector - based entities with varying ideas of ISAC member qualification and requirements…… to Game Changer 1000s of potential sharing entities (with unlimited numbers of members) built on baseline requirements for trusted sharing. Incoming information Outgoing information (From a DHS briefing): Empowering Communities

Examples of members of the ecosystem Commercial or Sector ISAO Shoe Retailers ISAO Alabama Baptist Ministers ISAO “Tiered” ISAOs for a given industry National Association of Mariachi Bands ISAO SW U.S. Mariachi Bands ISAO Mariachi Bands of South Texas ISAO Geographically based ISAOs State of Texas ISAO City of San Antonio ISAO ISAO Service Providers Providers of services to ISAOs Providers of services to individual organizations not part of an ISAO – a commercial ISAO Special Event ISAOs Super Bowl ISAO Groups of Security-minded Individuals San Antonio Security Leaders Forum Government (and industry) Information Sharing organizations Not all ISOAs may want to participate in sharing with government agencies or other specific info sharing entities Each of these has a place in the ecosystem. We need to ensure we have provided a way for them to fit in.

So what information can an ISAO share? Security relevant indicators Security relevant incident data (in real-time is the ultimate goal) Analysis that leads to actionable activities Best practices Security training / awareness Tools or an analysis/evaluation of tools Trends that might impact the members of the ISAO Recommendations on countermeasures Analysis of Sector and Common Applications

So what services/capabilities can an ISAO Provide? Sharing of information with members Based on needs and charter of the ISAO Interface and communication with other ISAOs and government agencies Again, depends on needs of the members of the ISAO Represent the members in information sharing and security forums Analysis of sector-relevant security information 24/7 security operations alert center Assistance with incident response … many others Ultimately, the ISAO is the link into the national information sharing ecosystem for its members!

So, who should form an ISAO? LOTS of people! The State of Texas (others have already started) Communities within the state Industry sectors or portions of sectors with common interests You may elect to be part of multiple ISAOs Geographic and functional Tiered ISAOs (national, regional, local) The services offered by an ISAO will vary and will depend on the goal of the ISAO and what its members want. Share with other ISAOs? Share with the government? Assist in incident response? 24/7 SOC? You may want to contract with a service provider versus developing your own services

Questions? Dr. Gregory White, Executive Director, ISAO SO (210) Mr. Rick Lipsey, Deputy Director, ISAO SO and Director, Stakeholder Engagement (210) Mr. Brian Engle, Executive Director, R-CISC (202) Mr. Larry Sjelin, Director, Standards Lifecycle Management (210) Ms. Natalie Sjelin, Director, ISAO Support (210) ISAO SO Organizational 10