Progress in Support of Risk Management

Slides:



Advertisements
Similar presentations
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Advertisements

Bill Newhouse Two Government Cybersecurity Initiatives NIST.
CISB444 - Strategic Information Systems Planning
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
SOCIAL DEVELOPMENT CANADA 1 The Government of Canada and the Non-Profit and Voluntary Sector: Moving Forward Together Presentation to Civil Society Excellence:
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
Establishing (or Enhancing) PMO Effectiveness Nicolle Goldman, PMP March 28, 2007.
Project: EaP countries cooperation for promoting quality assurance in higher education Maria Stratan European Institute for Political Studies of Moldova.
Using Analysis and Tools to Inform Adaptation and Resilience Decisions -- the U.S. national experiences Jia Li Climate Change Division U.S. Environmental.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Framework for Improving Critical Infrastructure Cybersecurity
Society for Maintenance and Reliability Professionals (SMRP)
Proposed Updates to the Framework for Improving Critical Infrastructure Cybersecurity (Draft Version 1.1) March 2017
Knowledge for Healthcare: Driver Diagrams October 2016
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Presenter: Mohammed Jalaluddin
Ontario Early Years Child and Family Centres Planning Guidelines
Update from the Faster Payments Task Force
(Your Community College Name Here) Our New Agenda For Student Success
Cyber Risk Presentation to the Board of Directors
EITS Planning & Decision Support
5 OCTOBER 2015 MANILA, PHILIPPINES
Information Technology Sector
The Role of Construction in Homeland Security
About the NIS directive
HEALTH IN POLICIES TRAINING
CDRH 2010 Strategic Priorities
Sustaining Continuous Improvement
NIST Cybersecurity Framework
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
TSMO Program Plan Development
Standards for success in city IT and construction projects
8 Building Blocks of National Cyber Strategies
Asset Governance – Integrated Strategic Asset Management
Progress in Support of Risk Management
ISO 30300:2011 Management systems for records
The SWA Collaborative Behaviors
An Urgent National Imperative
IS4550 Security Policies and Implementation
Institutional Effectiveness Presented By Claudette H. Williams
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Continuity Guidance Circular Webinar
EMS Checklist (ISO model)
Cybersecurity ATD technical
Teams What is a team? Maintaining Focus
Cooperative Federalism 2
Taking the STANDARDS Seriously
A Focus on Strategic vs. Tactical Action for Boards
Plan your journey.
Building an Informatics-Savvy Health Department
Sachiko A. Kuwabara, PhD, MA
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
NIST Privacy Framework
MODULE 11: Creating a TSMO Program Plan
HUD’s Coordinated Entry Data & Management Guide
Energy Storage & Cyber Security
Presentation transcript:

Progress in Support of Risk Management Recent NIST activities and publications Greg Witte, CISSP-ISSEP, CISM Greg.Witte@g2-inc.com ManageTheRisk.com

National Institute of Standards and Technology Advanced Manufacturing IT and Cybersecurity Healthcare Forensic Science Disaster Resilience Cyber-physical Systems Advanced Communications G2 is a small business that is proud to provide contractor support to NIST We don’t speak for NIST, but pleased to speak about NIST’s great work NIST’s mission is to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life. Federal, non-regulatory agency around since 1901 Agency of U.S. Department of Commerce Basic info about NIST; dual role to support federal as well as private sector/industry Organized by labs; sort of like a college campus; nobel prize winners Work involves collaborating with private sector, so no regulatory requirements. CSD – fundamental ACD – application work We need to start by looking at the background/driver for the Framework…

Relevant NIST & NCCoE Activities NIST’s Smart Grid efforts provide strategic planning to modernize and stabilize the national grid. National Cybersecurity Center of Excellence (NCCoE) - a collaborative hub where industry organizations, government agencies, and academic institutions work together to address pressing cybersecurity issues Asset Management Identity and Access Management (IdAM) Situational Awareness Smart Grid Work Led by our Engineering Lab Guidelines for Smart Grid Cybersecurity released in 2014 Tech Transfer and Research into secure interoperability and operation

Audience Poll: How many here are using the NIST Framework?

Several Relevant Frameworks to Leverage Cyber-Physical Systems (CPS) Framework Baldrige Excellence Framework Framework for Improving Critical Infrastructure Cybersecurity (or the Cybersecurity Framework) Risk Management Framework NICE Framework (Workforce) In two weeks in Austin, launching new Privacy Framework

IoT Security and Privacy Risk Considerations Cybersecurity for Internet of Things Program and the Privacy Engineering Program Seeking insights from stakeholders on ideas for improving security and privacy risk management Developing guidance for federal agencies, though much of it may be useful for other organizations Scoping IoT for guidance to cover the portions where orgs may be at greatest need of information on security and privacy risk management. Example: Gartner predicts more than 5 million “things” connected worldwide every day, reaching almost 21 billion in the next few years Always evolving – see new Special Publication 500- 325, Fog Computing Conceptual Model

Risk Management Framework Mandatory for Federal agencies but useful for all Works in harmony with the Cybersecurity Framework Being updated to better support evolving needs, integration with other frameworks, and system engineering approach Draft NIST SP 800-160, Vol. 2, Systems Security Engineering: Considerations for Developing Cyber Resilient Systems, Cyber resiliency goals, objectives, techniques, approaches, and design principles for system life cycle processes. Implementation of RMF controls and enhancements contribute to CSF outcomes

Baldrige Excellence Framework A Systems Approach to Improving Your Organization’s Performance For nearly 30 years, the Baldrige Excellence Framework has empowered organizations to accomplish their missions, improve results, and become more competitive. The Baldrige Excellence Framework includes the Criteria for Performance Excellence, core values and concepts, and guidelines for evaluating your processes and results. Whether used as guidance in establishing an integrated performance management system or for self-assessing progress, the Baldrige Excellence Framework is about helping you innovate and improve. Available for Business/Nonprofit (including Manufacturing, Service, Small Business, Nonprofit, and Government), Education, and Health Care sectors. Learn about the Impacts of Baldrige. Cybersecurity Excellence Builder available from: https://www.nist.gov/baldrige/products-services/baldrige-cybersecurity-initiative

NICE (Cybersecurity Workforce) Framework Accelerate Learning and Skills Development 7 Categories 33 Specialty Areas Nurture a Diverse Learning Community 52 Work Roles Guide Career Development and Workforce Planning ~1000 Tasks Knowledge, Skills, Abilities

Privacy Engineering Development of trustworthy information systems by – applying measurement science system engineering principles to the creation of frameworks, risk models, guidance, tools, and standards that protect privacy and, by extension, civil liberties. See: https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering

Cybersecurity Framework Supports Cybersecurity Enhancement Act of 2014 It’s flexible to many sectors - Meant to be customized. Risk-driven system of cybersecurity outcomes – Provides a common language; Does not tell an organization how much cyber risk is tolerable. It’s meant to be paired - Take advantage of great pre-existing things It’s a living document - Enable best practices to become standard practices for everyone; updated as technology and threats changes; Evolves faster than regulation and legislation; updated as stakeholders learn from implementation Department of Energy's Energy Sector Cybersecurity Framework Implementation Guidance(link is external) Released in April 2018 Clarifies use of Framework Components (i.e., Implementation Tiers and Profiles) Provides guidance on self assessment metrics and measurements Adds the concept of identity proofing and expands authorization Adds Supply Chain Category Now 23 Categories, and 108 Subcategories Working on moving Informative References to an online database

Self-Regulation Many recent NIST RFI respondents continued to request that the Framework remain voluntary Many organizations want to do the right thing but need a flexible approach Some of the “old ways” forced prescriptive rules with criteria that didn’t even apply Benefits of the use of frameworks (like COBIT 5 and CSF) for self-regulation, since these support oversight while leaving the implementation details flexible and agile. Promotes innovation in compliance - seems like an oxymoron - as we often say, understanding risk and managing it well can be a competitive advantage. It can also be a way for a community, perhaps such as the financial sector, to pool its resources and defend itself. Look at the recent success through several ISACs - demonstration of how self-regulatory tools and approaches can be coordinated across organizations. Carrot Copyright: merrilyanne Stock photo ID:45793642 Upload date:August 27, 2014 Ruler Copyright: Stolk Stock photo ID:46861212 Upload date:September 13, 2014

Self-Regulation Effective pressure to “do the right thing” We often hear concerns from organizations that want assurance that they are doing “enough”, both for their own due diligence and also to avoid penalties Ruler Copyright: Stolk Stock photo ID:46861212 Upload date:September 13, 2014

Cybersecurity Framework and Regulation NIST’s Frameworks complement, don’t compete with most regulatory frameworks Some models are less prescriptive Others are quite specific but can align to the higher-level functions and categories CSF helps guide discussions, decisions, and monitoring regarding the need to fulfill necessary requirements (e.g., NERC) without directing how.

A Way of Seeing the Regulatory Environment No surprises on rules or assessments Reduce engagement backlog Implementation of new rules by appropriate deadlines Fulfill government needs and satisfy citizens Regulated Entity Clearly understand rules and how to fulfill them Reduce compliance workload Quick integration of new rules into cybersecurity operation Achieve business objectives and gain customers Clear Communication Efficient Assessments Efficient Processing of New Rules Reduced aggregate risk

Updates to Mappings and Informative References Reference Relationship Types from Interagency Report 8204