An Urgent National Imperative

Slides:



Advertisements
Similar presentations
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Advertisements

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks.
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
National Infrastructure Protection Plan
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
1 Dan Steinberg, JD Portland, OR May 4, 2011 Speaking Notes Privacy and Security for Research Repositories Please do not reuse or republish without attribution.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Getting Smarter with Information An Information Agenda Approach
Disaster & Smart City in Aging Society – Designing a secure and resilient smart city Smart City and Resiliency Jirapon Sunkpho College of Innovation Thammasat.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
TEL2813/IS2820 Security Management
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Secure Cloud Solutions Open Government Forum Abu Dhabi April 2014 Karl Chambers CISSP PMP President/CEO Diligent eSecurity International.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Chapter 1: Security Governance Through Principles and Policies
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
Cybersecurity is not a new issue! Dr. Edgar Frank Codd, an IBM researcher, wrote a paper that described the fundamental model of the relational databases.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Acting Deputy Assistant Secretary of Defense for Systems Engineering
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
and Security Management: ISO 28000
Information Technology Sector
Cyber Resilient Energy Delivery Consortium
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
California Cybersecurity Integration Center (Cal-CSIC)
SE and SSE Trade-Off Analyses
Leverage What’s Out There
Cybersecurity Policies & Procedures ICA
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
NIST Cybersecurity Framework
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cybersecurity EXERCISE (CE) ATD Scenario intro
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
ATD session 2: compliancy versus mission assurance
Cyber defense management
8 Building Blocks of National Cyber Strategies
Securing Your Digital Transformation
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Chapter 27 Security Engineering
How to Mitigate the Consequences What are the Countermeasures?
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Cybersecurity ATD technical
Community of Users.
Enterprise Architecture at Penn State
MAZARS’ CONSULTING PRACTICE
Final Conference 18 Set 2018.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
What is Cybersecurity Office of Information Technology
Presentation transcript:

An Urgent National Imperative Building Trustworthy, Secure Systems for the United States Critical Infrastructure An Urgent National Imperative

It’s a dangerous world in cyberspace… The Current Landscape. It’s a dangerous world in cyberspace…

Cyber Risk. Function (threat, vulnerability, impact, likelihood) Energy Cyber Risk. Function (threat, vulnerability, impact, likelihood) Transportation Defense Manufacturing

Defense Science Board Reports Resilient Military Systems and the Advanced Cyber Threat Cyber Supply Chain Cyber Deterrence Make statement about ALL controls being monitoring – it is only the frequency that varies Defense Science Board Reports

Complexity.

Our appetite for advanced technology is rapidly exceeding our ability to protect it.

Data. Data. Everywhere.

Houston, we have a problem.

Protecting critical systems and assets— The highest priority for the national and economic security interests of the United States.

Defending cyberspace in 2018 and beyond.

Simplify. Innovate. Automate.

Federal Government’s Modernization Strategy Identify and develop federal shared services. Move to FedRAMP-approved cloud services. Isolate and strengthen protection for high value assets. Reduce and manage the complexity of systems and networks… Engineer more trustworthy, secure, and resilient solutions.

Limit damage to the target Reducing susceptibility to cyber threats requires a multidimensional strategy. System Harden the target First Dimension Limit damage to the target Second Dimension Make the target resilient Third Dimension

Cyber Resiliency. The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.

Resilience and Survivability Reliability Fault Tolerance Privacy Cyber resiliency relationships with other specialty engineering disciplines. Security Safety Resilience and Survivability

CREF Constructs CYBER RESILIENCY ENGINEERING FRAMEWORK Goals protection. Damage limitation. Resiliency. Goals Objectives Techniques Approaches Strategic Design Principles Structural Design Principles Risk Management Strategy Constructs

Relationship among cyber resiliency constructs.   TECHNIQUES Approaches Structural Design Principles Strategic Design Principles Why OBJECTIVES Understand Prevent/Avoid Prepare Continue Constrain Reconstitute Transform Re-architect What GOALS Anticipate Withstand Recover Adapt Risk Management Strategy How Inform selection and prioritization Inform selection and prioritization Inform selection and prioritization Inform selection prioritization Inform selection

CREF Techniques CYBER RESILIENCY ENGINEERING FRAMEWORK protection. Damage limitation. Resiliency. Adaptive Response Analytic Monitoring Coordinated Protection Substantiated Integrity Privilege Restriction Dynamic Positioning Dynamic Representation Non-Persistence Diversity Realignment Redundancy Segmentation Deception Unpredictability Techniques

Cyber Resiliency Constructs in System Life Cycle. Business or mission analysis Stakeholder needs and requirements definition System requirements definition Architecture definition Design definition System analysis Implementation Integration Verification Transition Validation Operation Maintenance Disposal ISO/IEC/IEEE 15288:2015 Systems and software engineering — System life cycle processes NIST SP 800-160

NIST SP 800-37, Revision 2 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy Make statement about ALL controls being monitoring – it is only the frequency that varies

Just released for public review and comment. Risk Management Framework (RMF) 2.0 Just released for public review and comment. CATEGORIZE   ASSESS AUTHORIZE MONITOR PREPARE IMPLEMENT SELECT

Communication between C-Suite and Implementers and Operators A unified framework for managing security, privacy, and supply chain risks. Communication between C-Suite and Implementers and Operators RMF 2.0 Security Risk Management Privacy Risk Management Alignment with NIST Cybersecurity Framework Alignment with Security Engineering Processes Supply Chain Risk Management

Transparency. Traceability. Trust.

On the Horizon… NIST Special Publication 800-37, Revision 2 Risk Management Framework for Information Systems and Organizations Final Publication: October 2018 NIST Special Publication 800-53, Revision 5 Security and Privacy Controls for Information Systems and Organizations Final Publication: December 2018 NIST Special Publication 800-53A, Revision 5 Assessing Security and Privacy Controls in Information Systems and Organizations Final Publication: September 2019

On the Horizon… NIST Special Publication 800-160, Volume 2 Systems Security Engineering Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems Final Publication: October 2018 NIST Special Publication 800-160, Volume 3 Software Assurance Considerations for the Engineering of Trustworthy Secure Systems Final Publication: December 2019 NIST Special Publication 800-160, Volume 4 Hardware Assurance Considerations for the Engineering of Trustworthy Secure Systems Final Publication: December 2020

Some final thoughts.

Work smarter, not harder.

The ultimate objective for security and privacy. Institutionalize. The ultimate objective for security and privacy. Operationalize.

The essential partnership. Government Academia The essential partnership. Industry

Security. Privacy. Freedom.

RMF RISK MANAGEMENT FRAMEWORK Simplify. Innovate. Automate. 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930 Email Mobile ron.ross@nist.gov 301.651.5083 LinkedIn Twitter www.linkedin.com/in/ronross-cybersecurity @ronrossecure Web Comments csrc.nist.gov sec-cert@nist.gov