Elections Systems: Designated Critical Infrastructure

Slides:



Advertisements
Similar presentations
Department of Homeland Security Site Assistance Visit (SAV)
Advertisements

BENEFITS OF SUCCESSFUL IT MODERNIZATION
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Information Security Policies and Standards
The State of Security Management By Jim Reavis January 2003.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Payment Card Industry (PCI) Data Security Standard
Website Hardening HUIT IT Security | Sep
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Critical Infrastructure Protection: Program Overview
Information Sharing Challenges, Trends and Opportunities
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
National Emergency Communications Plan Update National Association of Regulatory Utility Commissioners Winter Committee Meeting February 16, 2015 Ron Hewitt.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Principles Identified - UK DfT -
for Election Infrastructure
Proposed Updates to the Framework for Improving Critical Infrastructure Cybersecurity (Draft Version 1.1) March 2017
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
BruinTech Vendor Meet & Greet December 3, 2015
NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS)
Motorist Services Consolidation
State Coordinator Intervention
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Agenda Control systems defined
Critical Infrastructure 101
Compliance with hardening standards
ARRL Field Organization for Emergency Communications
Cybersecurity Policies & Procedures ICA
Introduction to the Federal Defense Acquisition Regulation
Implementation Strategy July 2002
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Managing Change and Other Keys to Successful Implementation
America’s First National Critical Infrastructure Exercise
Protective Security Advisor Program Brief
CYBER SECURITY FOR WATER AND WASTEWATER UTILITIES
Election Security Best Practices
Role for Electric Sector in Critical Infrastructure Protection R&D
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
John M. Felker Director, NCCIC.
Security Essentials for Small Businesses
Continuity Guidance Circular Webinar
Election Infrastructure Security Initiative
AT&T/Cisco Partnership…Enabling Customer Success
Presentation slide for courses, classes, lectures et al.
Cyber Security in a Risk Management Framework
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
October is National Cybersecurity Awareness Month
Anatomy of a Common Cyber Attack
Presentation transcript:

Elections Systems: Designated Critical Infrastructure A unique designation that provides a basis for the Department of Homeland Security and other federal agencies to: Recognize the importance of these systems; Prioritize services and support to enhancing security for election infrastructure; Provide the elections community with the opportunity to work with each other, the Federal Government, and through the Coordinating Councils; Send a message of our intention to hold anyone who attacks these systems responsible for violating international norms.

Election Infrastructure Subsector Government Coordinating Council Federal, state, and local government partners formed the Election Infrastructure Subsector GCC (EIS-GCC) and met for the first time in Atlanta in October 2017 The formation of the EIS-GCC was a milestone in multi-level government cooperation that bolstered election infrastructure security and resiliency. The EIS-GCC: Enables partners to leverage information sharing; cybersecurity and physical security products, resources, and capabilities; and collective expertise. Consists of 27-members, 24 of which are state and local election officials. Is led by a five-member Executive Committee which meets bi-weekly (Chair: DHS/CISA; EAC; a Secretary of State; a state Election Director; and a local Election Director). Adopted a Sector Specific Plan in 2018. Sector priorities for 2019-2020 were approved on February 1, 2019.

Election Infrastructure Subsector Coordinating Council Private sector stakeholders formed the Election Infrastructure Subsector Coordinating Council (EISCC) and met for the first time in February 2018 The EISCC: Is led by a five-member Executive Committee. Serves as the primary liaison between the private sector and government on election infrastructure security. Facilitates information and intelligence sharing. Coordinates with DHS and the EI-GCC to develop, recommend and review sector-wide plans and procedures. Established an action plan complete with goals and priorities in February, 2019.

CISA Regions PSAs (Regular and Supervisory, excluding the Regional PSA) = Regions VII and X have 5 PSAs, while Region IV has 17 CSIs (Regular, Supervisory, and Senior) = Region I has 6 CSIs, while Region V has 28

CISA Regional Capabilities Cybersecurity/information security expertise via your Regional Cybersecurity Advisor (CSA) Physical security expertise via your local Protective Security Advisor (PSA) Two-way Information Sharing between the field and CISA Headquarters Scalable cyber and physical security assessments Personal relationships between DHS and State/Local Election Officials

Progress in the 2018 Election Cycle Establishment of the EI-ISAC In February 2018, the EIS-GCC established the Elections Infrastructure ISAC, which is now the fastest growing ISAC ever Funding Consideration Document In May 2018, the EIS-GCC released a guidance document with potential short- and long-term funding considerations to support peers making decisions on how to spend election funding Communications Protocols In July 2018, the GCC issued a set of voluntary Communications Protocols to improve the efficiency and effectiveness of information sharing between Election Information Stakeholders New Trainings and Assessments Led by feedback from election officials, DHS now offers online “IT Management Training for Election Officials” and Remote Penetration Testing National-level Election Security Tabletop Exercise In August 2018, DHS hosted a three day tabletop exercise with 44 states, the District of Columbia, and 10 Federal agencies Classified Briefings Classified information was shared on several occasions, pushing more threat information to this sector than ever before. The most recent classified briefing was in February 2019. Election Day Situation Room On Election Day, DHS hosted the National Cybersecurity Situational Awareness Room.  This online portal for state and local election officials and vendors facilitated rapid information sharing and provided election officials with virtual access to the 24/7 operational watch floor of the NCCIC

Resources for State and Local Election Officials Vulnerability Scanning A scanning of Internet-accessible systems for known vulnerabilities on a continual basis. As potential issues are identified, DHS notifies impacted customers so they may proactively mitigate risks to their systems prior to exploitation. Conducted remotely and fully automated. Remote Penetration Testing Utilizes a dedicated remote team to assess and identify vulnerabilities and work with customers to eliminate exploitable pathways. The assessment simulates the tactics and techniques of malicious adversaries and tests centralized data repositories, externally accessible assets, and web applications. Phishing Campaign Assessment Measures the susceptibility of an organization’s staff to social engineering attacks, specifically email phishing attacks. The assessment takes place during a six-week period. An assessment report is provided two weeks after its conclusion. The assessment report provides guidance, measures effectiveness, and justifies resources needed to defend against and increase staff training and awareness of generic phishing and spear- phishing attacks.

Join the Election Infrastructure ISAC The EI-ISAC is a dedicated resource that gathers, analyzes, and shares information on critical infrastructure and facilitates two-way cybersecurity threat information sharing between the public and the private sectors. The EI-ISAC supports the election community through: 24 x 7 x 365 network monitoring Election-specific threat intelligence Threat and vulnerability monitoring Incident response and remediation Training sessions and webinars Promotion of security best practices

Positive Relationships – By the Numbers EI-ISAC Membership - 1554 50 states and 4 territories 1476 local election offices 7 associations 14 election vendors Albert Sensors - 140 47 states and 1 territory 92 local election offices States with a High Level of Local EI-ISAC Membership

Election Infrastructure Security – Adoption of Services Total Cyber Resilience Review (CRR) 24 External Dependencies Management Assessment 18 Cyber Infrastructure Survey (CIS) 19 Cyber Hygiene Scanning (CyHy) 150 Hunt 25 Risk and Vulnerability Assessment (RVA) 40 Remote Penetration Testing (RPT) Phishing Campaign Assessment (PCA) 10 Election-related Exercises 32 43 States have utilized at least one DHS cybersecurity service 30 States have utilized at least two DHS cybersecurity services 14 states have utilized three or more DHS cybersecurity services 6 states have leveraged five or more DHS cybersecurity services Services updated 4/2/2019

Top Recommendations Provided Across All EI Assessments Mitigate Internet Vulnerabilities in a timely manner Recommend that EI Subsector entity managers mitigate all internet-accessible high and critical severity level vulnerabilities within 30 days. Vulnerabilities with lower severity levels should be reviewed and either mitigated, or the associated risk formally accepted, within 60 days. Strengthen Password Policy and Auditing Processes Recommend the use of multi-factor password technology. Entities should perform regular audits of their password policy. Password best practices include ensuring that default passwords are never used in production, that strong passwords are required and used, and that administrators use encrypted password vaults. Implement Network Segmentation Internal network architecture should protect and control access to the entity’s most sensitive systems. Recommend that user workstations should be less trusted and connections to external networks should be isolated, controlled, and monitored. Follow Cybersecurity Best Practices EI Subsector entities should follow established enterprise network best practices for IT infrastructure, including the implementation of a strong patching methodology for operating systems and third-party products. Replace Unmaintainable Equipment All EI Subsector equipment should be maintainable with current security patching. Exceptions should be minimized and isolated.

CISA Cybersecurity 101 Matt Masterson Geoff Hale Senior Cybersecurity Advisor Department of Homeland Security Matthew.Masterson@hq.dhs.gov Geoff Hale Director, Election Security Initiative Department of Homeland Security Geoffrey.Hale@hq.dhs.gov