Washington DC – Mar 16, 2017 DL Name(s)

Slides:



Advertisements
Similar presentations
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Advertisements

Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Part of a Broader Strategy
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Cyber Metrics Brief Mr. Ross Roley PACOM Energy Innovation.
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Phoenix Convention Center Phoenix, Arizona Overview of the ESTCP Energy & Water Program Technology Track Overview of Federal Technology Demonstration Programs.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Corrective Action Programs. 2 HSEEP Homeland Security Exercise and Evaluation Program Provides a common exercise policy and program guidance that constitutes.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Safeguarding CDI - compliance with DFARS
for Election Infrastructure
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
Iowa Communications Alliance
Logistics Assessment & Planning
Cybersecurity - What’s Next? June 2017
HSGP Funding for Security Efforts
Agenda Control systems defined
and Security Management: ISO 28000
2017 National Geospatial Preparedness Summit
California Cybersecurity Integration Center (Cal-CSIC)
Cybersecurity Policies & Procedures ICA
Security Engineering.
Cyber Security coordination in Europe CERT-EU’s perspective
“The Link” - Continuity of Operations and Emergency Management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
National Cyber Strategy Preparedness: 8 Preparatory Questions
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Protective Security Advisor Program Brief
2017 Health care Preparedness and Response Draft Capabilities
Role for Electric Sector in Critical Infrastructure Protection R&D
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
An Urgent National Imperative
Continuity Guidance Circular Webinar
The U.S. Department of Homeland Security
NRC Update Nader Mamish, Director Emergency Preparedness Directorate
Cybersecurity ATD technical
Introduction to: National Response Plan (NRP)
Group Meeting Ming Hong Tsai Date :
Joint Planning and Development Office “Where new ideas are welcome”
Continuity of Operations Planning
Our Cloud Services Journey
Long-Term Power Outage Response and Recovery
Innovative Readiness Training
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Washington DC – Mar 16, 2017 DL Name(s) Michael Chipley PhD GISCP PMP LEED AP DL Title(s) and Bio(s) President, The PMC Group LLC Discussion Title DHS National Cybersecurity and Communications Integration Center Discussion Summary Michael will give an overview of the NCCIC and ICS-CERT, Incident Reporting, Alerts and Advisories, NVD and CVE’s, ICS-CERT JWG and Newsletter, Training, and CSET

PLATINUM GOLD SILVER/ CHAPTER The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. SILVER/ CHAPTER

NCCIC and ICS-CERT Overview The Department of Homeland Security is responsible for protecting our Nation's critical infrastructure from physical and cyber threats. Cyberspace enables businesses and government to operate, facilitates emergency preparedness communications, and enables critical control systems processes. Protecting these systems is essential to the resilience and reliability of the Nation's critical infrastructure and key resources and to our economic and national security. The NCCIC serves as a central location where a diverse set of partners involved in cybersecurity and communications protection coordinate and synchronize their efforts. NCCIC's partners include other government agencies, the private sector, and international entities. Working closely with its partners, NCCIC analyzes cybersecurity and communications information, shares timely and actionable information, and coordinates response, mitigation and recovery efforts. ICS-CERT reduces risk to the nation's critical infrastructure by strengthening control systems security through public-private partnerships. ICS-CERT has four focus areas: situational awareness for CIKR stakeholders; control systems incident response and technical analysis; control systems vulnerability coordination; and strengthening cybersecurity partnerships with government departments and agencies.

National Cybersecurity and Communications Integration Center The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. https://www.us-cert.gov/nccic

NCCIC Organization Chart ESTCP is DoD’s environmental technology demonstration and validation program. The Program was established in 1995 to promote the transfer of innovative technologies that improve DoD’s environmental performance, reduce operational costs and enhance and sustain mission capabilities. ESTCP funds demonstration projects to validate technology cost and performance with the ultimate goal to transition successful technology to implementation and regulatory acceptance.

NCCIC Reporting Options and Subscribing to Alerts The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP.

NCCIC Revised Federal Incident Notification Guidelines Apr 2017 The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. https://www.us-cert.gov/incident-notification-guidelines

NCCIC Revised Federal Incident Notification Guidelines Apr 2017 These guidelines support US-CERT in executing its mission objectives and provide the following benefits: Greater quality of information – Alignment with incident reporting and handling guidance from NIST 800-61 Revision 2 to introduce functional, informational, and recoverability impact classifications, allowing US-CERT to better recognize significant incidents. Improved information sharing and situational awareness – Establishing a one-hour notification time frame for all incidents to improve US-CERT’s ability to understand cybersecurity events affecting the government. Faster incident response times – Moving cause analysis to the closing phase of the incident handling process to expedite initial notification. Table of Contents Notification Requirement Submitting Incident Notifications Impact and Severity Assessment Major Incidents Impact Category Descriptions Attack Vectors Attack Vectors Taxonomy Incident Attributes The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. https://www.us-cert.gov/incident-notification-guidelines

NCCIC Revised Federal Incident Notification Guidelines Apr 2017 The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. https://www.us-cert.gov/incident-notification-guidelines

NCCIC Report Incidents The Energy and Water Program covers a wide array of technologies that are applicable to use and management of energy and water on military installations. The technologies are organized in three main areas of focus. The first is “Smart and Secure Installation Energy Management”, which includes…, the Second is Efficient Integrated Buildings and Components, which includes…tech and tools that…and the Third is “Distributed Generation”, which includes renewables, waste heat recovery and CHP. https://www.us-cert.gov/forms/report

ICS-CERT Alerts https://ics-cert.us-cert.gov/alerts

ICS-CERT Advisories https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01

ICS-CERT Advisories VULNERABILITY OVERVIEW CREDENTIALS MANAGEMENT CWE-255 Tableau Server is embedded within the Schneider Electric Wonderware Intelligence software and contains a system account that is installed by default. The default system account is difficult to modify to use non-default credentials after installation and changing the default credentials in the embedded Tableau Server is not documented. As such, Schneider Electric has released a new software version that removes the default system account in the embedded Tableau Server. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access. CVE-2017-5178 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01

National Vulnerability Database https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5178

ICS-CERT https://ics-cert.us-cert.gov/

CVSS Calculator Score https://nvd.nist.gov/cvss/v3-calculator?name=CVE-2017-5178&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

ICSJWG Meetings https://ics-cert.us-cert.gov/Industrial-Control-Systems-Joint-Working-Group-ICSJWG

ICSJWG Newsletter

ICS-CERT Standards and References https://ics-cert.us-cert.gov/Standards-and-References

ICS-CERT Training Hands-On Format - Technical Level ICS Cybersecurity (301) - 5 days This event will provide hands-on training in discovering who and what is on the network, identifying vulnerabilities, learning how those vulnerabilities may be exploited, and learning defensive and mitigation strategies for control system networks. The week includes a Red Team / Blue Team exercise that takes place within an actual control systems environment. The training provides the opportunity to network and collaborate with other colleagues involved in operating and protecting control system networks. Note that this course is not a deep dive into training on specific tools, control system protocols, control system vulnerability details or exploits against control system devices. This event consists of industrial control systems cybersecurity training and a Red Team / Blue Team exercise: Day 1 - Welcome, overview of the DHS Control Systems Security Program, a brief review of cybersecurity for Industrial Control Systems, a demonstration showing how a control system can be attacked from the internet, and hands-on classroom training on Network Discovery techniques and practices. Day 2 - Hands-On classroom training on Network Discovery, using Metasploit, and separating into Red and Blue Teams. Day 3 - Hands-On classroom training on Network Exploitation, Network Defense techniques and practices, and Red and Blue Team strategy meetings. Day 4 - 8-hour exercise where participants are either attacking (Red Team) or defending (Blue Team). The Blue Team is tasked with providing the cyber defense for a corporate environment, and with maintaining operations to a batch mixing plant, and an electrical distribution SCADA system. Day 5 - Red Team/Blue Team exercise lessons learned and round-table discussion. https://ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT

ICS-CERT Assessments https://ics-cert.us-cert.gov/Assessments

ICS-CERT 2015

ICS-CERT Assessments 2015 Top 20

ICS-CERT CSET https://ics-cert.us-cert.gov/Downloading-and-Installing-CSET

CSET Process

CSET Visio and GrassMarlin Import CSET has a very robust network diagramming and inventory capability, additional templates added with each new release

CSET Site Cyber Secuirty Plan Generated using NIST SP 800-53 R4 and NIST SP 800-82 R2 Security Controls

Contact Michael Chipley The PMC Group LLC mchipley@pmcgroup.biz 571-232-3890

THANK YOU CS2AI Confidential