2 OVERVIEW Cybersecurity initiative launched in July 2015 to create a trusted environment to address Cybersecurity -- Focus on the security needs of operators.

Slides:



Advertisements
Similar presentations
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Systems Engineering in a System of Systems Context
ATIS SOFTWARE-DEFINED NETWORKING/ NETWORK FUNCTIONS VIRTUALIZATION Mark Lipford, Director Global Standards and Ecosystem Development, Sprint GSC-18 Meeting,
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Larry Clinton Operations Officer Internet Security Alliance
Jackie Voss Manager, Global Standards Development ATIS All-IP Transition Initiatives September 30, 2015.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
The Strategy Map Presentation Templates
Kick Off Meeting Largs, Scotland
ANSI – ESOs meeting Washington February 2017
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Cyber Security – An Existential Threat? (IIC, Singapore)
Projects, Events and Training
Office 365 Security Assessment Workshop
Enterprise risk management
ATIS Priorities and Initiatives Susan Miller, President & CEO, ATIS
Report from Session #2: SDN/NFV
DROPS Focus Groups Human Factors
Energy & Materials Tracking
2 ATIS 5G OVERVIEW ATIS launched its 5G Ad Hoc in 2015 to advance regulatory imperatives, deliver an evolutionary path, address co-existence of technologies,
Paths to our Digital Future
Evaluating Existing Systems
Building the foundations for innovation
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Leverage What’s Out There
ATIS’ Cloud Services Activity
Evaluating Existing Systems
NIST Cybersecurity Framework
Updates Key areas of CCSA action: Next Generation Network: SDN, NFV
TCG’s Embedded System and IoT Focus
5G Security Training
Michael Nawrocki, Vice President of Technology and Solutions ATIS
All data occupies physical space, even if we don't think of it as such.
Digital Transformation Asia 2018 – CALL FOR SPEAKERS
Improving Vehicle Cybersecurity: ICT Industry Experience & Perspectives Denis Niles Senior Mobile & IoT Security Specialist Wireless Devices & Applications.
European Commission Initiatives for eGovernment
Cybersecurity in Elections Infrastructure: Risks and Mitigations
Security Essentials for Small Businesses
An Urgent National Imperative
Microsoft Azure Provides a Global and Scalable Operation for Managing Technical Vendor Data “We see Microsoft Azure as the solution for us to provide a.
Department of Health & Human Services (HHS)
SOCIAL DIALOGUE PLATFORM
Continuity Guidance Circular Webinar
Cybersecurity ATD technical
Presented by Prof. dr. Nermin Suljanović Elektroinštitut Milan Vidmar
Group Meeting Ming Hong Tsai Date :
ATIS Priorities and Initiatives Susan Miller, President & CEO, ATIS
The SAFERtec project on V2I security assurance: concept and vision
Enterprise Architecture at Penn State
ATIS Software-Defined Networking/ Network Functions Virtualization
Industry Engagement Program Medical Diagnostic Imaging (MDI) Equipment
Report from Session #2: SDN/NFV
Reinhard Scholl, GTSC-7 Chairman
Agenda The current Windows XP and Windows XP Desktop situation
BROADBAND SA CONNECT - AN OPPORTUNITY FOR SMALL ICT BUSINESSES
Summary from Africa and ASEAN assistance Dr. Peter Pembleton, UNIDO
Alliance for Telecommunications Industry Solutions (ATIS) Update
DSC Contract Management Committee Meeting
IoT and Supply Chain Risk Management
Presentation transcript:

2 OVERVIEW Cybersecurity initiative launched in July 2015 to create a trusted environment to address Cybersecurity -- Focus on the security needs of operators Phase 1 completed early 2016 Phase 2 underway

3 PHASE 1: Overview Develop Application Tools and Share Standards for Use in Complex Organizations NIST Framework Application Focus on Tools and Processes to enable effective Cybersecurity Risk Management Cybersecurity Risk Mgmt. Toolkit Emerging Threat Analysis Characterize Emerging Threats and Identify Tools to Address Them

PHASE 1: NIST Framework Application Tools 4 PHASE 1: NIST Framework Application Tools Telecom Industry Best Practices and Standards for Framework Core Elements Application in large organizations with complex supply chains Target Profile impacts as movement to SDN, NFV, Cloud Architectures occurs, etc.

PHASE 1: Emerging Threats Analysis 5 PHASE 1: Emerging Threats Analysis SDN/NFV Based Networks/End-User Controlled Networks Back-office and IT infrastructure attacks Specific IoT and M2M Threats

NIST FRAMEWORK RFI: ATIS Response 6 NIST FRAMEWORK RFI: ATIS Response RFI Purpose – NIST seeking comments on: Effectiveness of Version 1 Framework Suggestions for improvement of the Framework Options for longer-term ownership Key points of response include: Current Version 1 Framework is effective for ICT sector; should remain voluntary Standardization of measurements is discouraged -- would discourage ICT companies from enhancing use of the Framework and associated company process specific metrics Encouraged NIST to retain long-term ownership of the Framework Recommended removing profile related elements as their application is highly company specific

CYBERSECURITY PHASE 2 “Architect and Design for Security” toolkit: 7 CYBERSECURITY PHASE 2 “Architect and Design for Security” toolkit: Standards, practices and other recommendations to assist in development of secure solutions include SDN/NFV and Cloud Create an Information Sharing and Analysis Center (ISAC) Forum roadmap for ICT; survey existing ISAC fora relative to coverage of emerging threats

ARCHITECT AND DESIGN FOR SECURITY: Threat Modelling 8 ARCHITECT AND DESIGN FOR SECURITY: Threat Modelling Development processes can wait until the end of the development cycle to address security. Try to test security flaws out. At the end, we see if security requirements are satisfied. With Architectural Risk Analysis applied early in the development cycle, we begin to design security into the product. At the beginning, we intentionally aim for strong security. Did we hit anything? Aiming for the right target

9 COMMUNICATION Balance value of information dissemination with sensitivities Information management processes established Enable broader external publication and use of group’s output with selective protection of sensitive elements. Planning to target portion of Phase 2 work for external publication Maintain trusted and active environment to address cybersecurity