Cybersecurity Update Cascade Natural Gas.

Slides:



Advertisements
Similar presentations
ICGFM Working in the Field in a Time of Increased Oversight Sean Temeemi, Chief Compliance Officer, FHI 360 November 7, 2012.
Advertisements

Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
David A. Brown Chief Information Security Officer State of Ohio
DHS, National Cyber Security Division Overview
CHAPTER 16 Auditing and corporate governance. Contents  Corporate governance  Independent directors  Chairman of the board and chief executive officer.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 5 Decision Makers and Decision Making. Who are the Decision Makers in Business? McGraw-Hill © 2004 The McGraw-Hill Companies, Inc. All rights.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Network security policy: best practices
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Pro-active Security Measures
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
Chapter 8 Auditing in an E-commerce Environment
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
The Privacy Symposium August 22, 2007 ©2007. Goodwin Procter LLP The Ethics and Responsibilities of a Privacy Professional.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Three Lines of Defense and Business Continuity February 18, 2016.
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Performing Risk Analysis and Testing: Outsource or In-house
OIT Security Operations
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
The Importance of an AML Programme
An Update on FERPA and Student Privacy
Cybersecurity, competence and preparedness
Cybersecurity - What’s Next? June 2017
Case Study - Target.
Team 1 – Incident Response
Cyber Risk Presentation to the Board of Directors
Agenda Control systems defined
IIASA Governance Review
Transaction Processing Systems
Cybersecurity Policies & Procedures ICA
Cybersecurity EXERCISE (CE) ATD Scenario intro
Forensics Week 11.
San Francisco IIA Fall Seminar
John Butters Running Tiger Teams
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
General Counsel and Chief Privacy Officer
Enterprise Risk Management
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing the Threats of Tomorrow, Today.
Cyber Security professions Overview
Keeping your data, money & reputation safe
IS Risk Management Framework Overview
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
GRC - A Strategic Approach
DSC Contract Management Committee Meeting
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Anatomy of a Common Cyber Attack
Presentation transcript:

Cybersecurity Update Cascade Natural Gas

MDU Resources Group, Inc. 1+ million customers / 4 utility brands / 8 states Gas • Electric • Propane

Cybersecurity Management Structure CIO Director - Enterprise Security & Governance Manager – Cybersecurity Cybersecurity Engineers Cybersecurity Administrators Cybersecurity Architects (internal ethical hacker) Director – Enterprise Operations Support / Utility Operations Board of Directors Retired, former chairman and chief executive officer of CA Technologies Previously held executive positions with IBM Corp. and ICON Office Solutions Inc. Expertise: Corporate governance and technology

Goal 2: Cybersecurity Enterprise IT (EIT) Strategic Plan Secure IT systems and networks, keeping ahead of evolving cyber threats. EIT will develop and implement information security policies to align with regulatory requirements while following the SANS 20 Critical Security Controls. Goals include the adoption of common cybersecurity tools and policies to enable secure communications, along with designing an IT architecture with resiliency as an always on state, built to survive failure. IT systems and networks are proactively managed and monitored to ensure weaknesses are identified, compliance with the best practices is maintained, and risk- based strategies are in place to adjust to rapid changes in the threat landscape SysAdmin, Audit, Network, Security (SANS)

Goal 2: Cybersecurity Enterprise IT (EIT) Strategic Plan 2.1 SANS 20 Critical Security Controls Maturity and Operations Technology (OT) Security 2.2 Cybersecurity Employee Awareness 2.3 Enhanced security with advanced technology 2.4 Increased visibility and use of Information Security Management System

Cyber Risk Oversight Committee (CYROC) Formed in 2012 to focus on the full range of cyber risks the Company faces, including strategic, financial, operational, regulatory, information technology, security, health and safety, and reputational. Authorized by the Board of Directors CIO – Chair IT leaders from the Business Units who are appointed by the CEO to serve as voting members. CFO, Legal, Communications & Internal Auditing staff members Non-voting advisory members of the CYROC

Cyber Risk Oversight Committee (CYROC) Stay current on the cybersecurity environment front Evaluate, review and recommend cybersecurity tools Review, determine and recommend cyber-risk tolerance Plan and Review cybersecurity activity Table Top Exercises – GridX, INNGA, Black Hills Security Table Top Physical Security Review – Security Team, Utility Group Operations, Internal Audit Security and Operations team detailed review of technology and connectivity Reviewing automation technology for OT environments Penetration Test, Phishing & Smishing exercises

CIRP Committee Cyber Incident Response Plan The purpose of the CIRP Committee is to prepare for and respond to significant Cyber Incidents affecting the Company. Primary advisor to the CYROC and the MPC in making determinations regarding Breach notification and response. Cyber Incident Detection, Reporting and Assessment Internal Notification Process  Cyber Incident Handling and Response Quarterly Plan Review / Annual Plan Test

Planning & Review Cybersecurity policy/strategy/governing doc – EIT Strategic Plan Auditing – Internal & External (D&T/Business, Enclave/Technical) Cybersecurity Update – Quarterly Review Cybersecurity plan Test – Annually (Internal & External), Random National Organizations – Newsletters, e-Mail, Scheduled Sessions US-CERT, ICS-CERT, AGA-Cybersecurity Strategy Task Force, DNG-ISAC, etc…

National Cyber Strategy Of the United States of America Outlines the Administration’s plan to address cybersecurity nation-wide through four pillars: Protect the American People, the Homeland, and the American Way of Life Promote American Prosperity Preserve Peace through Strength Advance American Influence

WesternEnergy Institute CIO Forum - Sept 26th Getting Into the Mind of a Cybercriminal Executive Security Advisor How do underground groups conduct attacks? Where do they communicate and coordinate? What products and services do they buy and sell? Review basic hacking and OSINT (Open Source Intelligence) techniques. See how easy it is to profile and get all the information you need on your target Visit underground and dark web websites where identity theft and malware customization is bought and sold

Procurement Practices Best Practices Guide - Due-Diligence Questionnaire EIT Review / Corporate Legal Review HR Involvement 3rd party background checks Non-Disclosure Agreement Independent Vendor Rating Service Third Party Management Vulnerability Assessment

Risk Management Security Information Event Management Real-time analysis of security alerts generated by applications and hardware Monitoring traffic entering and leaving IT and OT environments 24x7 3rd Party Monitoring Vendor Contract - Hacking Ethical Hackers identify vulnerabilities before the bad actors do Vendor Contract - Penetration Test (2-year vendor rotation) External Test conducted the week of Sept. 10th (1-week engagement) Internal Test starting the week of Sept 10th (3-week engagement / hidden) Vendor Contract - Scanning Scans websites to detect and analyzes potential malicious files and URLs “Phishing” and “Smishing” 3rd party exercises (Employee awareness effort continues)

R&D Artificial Intelligence and Machine Learning Software Robots Bad actors are developing automated hacks that are able to study and learn about the systems they target, and identify vulnerabilities, on the fly We need to be prepared to counter with our own advanced response Software Robots Bots for streamlining business processes Bots to assist with security processes Blockchain Decentralized, distributed electronic ledger built on the model of offering absolute security and trust

Standards, Reporting, Partnerships Cybersecurity framework - SANS 20 Critical Security Controls Prioritization of Cybersecurity systems – Threat Analysis & Review Reporting – Outlined in our CIRP (Cyber Incident Response Plan) Partnerships AGA Natural Gas Security Committee & Cybersecurity Strategy Task Force WEI (Western Energy Institute) / NCEA (North Central Electric Association) DNG-ISAC – “Downstream Natural Gas Information Sharing and Analysis Center” / E-ISAC DHS/FBI/State Organizations Etc.….