ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U

Slides:



Advertisements
Similar presentations
The U.S. Merchant Marine and America’s Maritime Security
Advertisements

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Philippine Cybercrime Efforts
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Leverage MarkITS for agile solutions delivery that balances strategic thinking with tactical execution for “Business & Technology Convergence” MarkITS.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Intellectual Property & the Economy J. Steven Landefeld, Director New York State Bar Intellectual Property Section Fall Meeting September 14th,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Information Security Policies Larry Conrad September 29, 2009.
(Geneva, Switzerland, September 2014)
Community Planning & Capacity Building Recovery Support Function Presented By: Michelle Diamond Community Planning & Capacity Building Coordinator FEMA.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
NC TOMORROW A COLLABORATIVE FOR SUSTAINABLE ECONOMIC GROWTH April 7, 2011.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
European Public Sector Information Systems Conference -- September 30, 1998 Case Study: Building the Skills that Produce Success - A Case Study from the.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
The Administration’s SPECTRUM POLICY INITIATIVE. Cumulative 3G wireless service revenue could reach $1 trillion over the next 10 years. 148 million Americans.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
‘The United Kingdom Anti-Fraud Policy - A Critical Review’ Wales Fraud Forum 2 nd Annual Conference Dr Nicholas Ryder Head of Commercial Law Research Unit.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Texas Emergency Management Conference San Antonio April 3, 2012.
Critical Infrastructure Protection Critical Infrastructure Protection Private Sector Programs April 7, 2005 Rod Nydam, JD, GMU Law School Private Sector.
National Institute of Standards and Technology Technology Administration U.S. Department of Commerce Accelerating Emerging Technologies to the Marketplace.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
Critical Infrastructure: Commerce/NTIA Lead Agency Role by Shirl Kinney Deputy Assistant Secretary, NTIA October - November, 1998 A Composite of Recent.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 ECONOMIC ASPECTS OF DATA PROTECTION South Eastern Europe Conference on Regional Security through Data Protection Belgrade Dece mber 1-2, 2003 Daniel.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
SEC-07-FCT-2016 Human Factor for the Prevention, Investigation, and Mitigation of Criminal and Terrorist Acts Dr. William Hynes Future Analytics Consulting.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Cyber Insurance Risk Transfer Alternatives
Broadband Challenges 2017 Christopher Tamarin
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Security and Georgia. New Challenges
Fusion Center ITS security and Privacy Operations Joe Thomas
UNECE International Forum on Trade Facilitation
Crisis management related research at
New Industry Initiatives in CyberSecurity
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Academic Challenges Concerning Standardization
California Cybersecurity Integration Center (Cal-CSIC)
8 Building Blocks of National Cyber Strategies
CIPC Relationships & Roles
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Forth International Forum
Group Meeting Ming Hong Tsai Date :
National Information Assurance (NIA) Policy
LO1 - Know about aspects of cyber security
Presentation transcript:

ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U.S.-Bulgaria Conference on Cybersecurity Sofia September 8-9, 2003 Daniel C. Hurley, Jr. Director, Critical Infrastructure Protection U.S. Department of Commerce

Homeland Security Components National Defense Departments of Defense and Homeland Security Law Enforcement Departments of Justice and Homeland Security Economic Security Departments of Commerce, Treasury and Homeland Security

Within the U.S. Government, the Department of Commerce is appropriate agency for addressing economic security issues: Core mission incorporates CIP Historic ties with and understanding of industry Trust between Department and industry Without DOC’s involvement, U. S. industry won’t play effectively

Facets of Economic Security Goal: To ensure that CIP policies, programs and activities support an economic security perspective Commerce Department Operating Agencies have complementary programs/roles for CIP Many pre-existing programs have adjusted to contribute CIP support

Solution Factors Technology Process People - Standards - Guidelines/Policies - Best Practices - Education & Awareness

Costs of Computer Crime 2003: $201 million 2002: $455 million Types: Proprietary info ($70 million) denial of service ($65 million) financial fraud ($10.2 million; down from $116 million in 2002) Forms of attack: virus incidents (82%) insider abuse (80%) CSI/FBI 2003 Computer Crime and Security Survey

Examples of Recent Attacks Klez virus: -- Clean up and lost productivity: $9 billion Code Red: 1 million computers affected Clean-up and lost productivity: $2.6 billion Love Bug: 50 variants, 40 million computers affected Clean-up and lost productivity: $8.8 billion NIMDA: Clean-up and lost productivity: $1.2 billion Slammer: Clean up and lost productivity: $1 billion +

“Business Case” for Cybersecurity Research reported in CSO Magazine in 2002 demonstrates a 21% Return on Investment for cyber security systems implemented early in network development. “The costs of a sever computer attack are likely to be greater than the preemptive investment in a cyber security program would have been.” (Source: National Strategy to Secure Cyber Space, February 2003)

Commerce Agencies Involved National Telecommunications and Information Administration (NTIA) International Trade Administration (ITA) Bureau of Industry and Security (BIS) Technology Administration (TA) Economic Development Administration (EDA)

Departmental CIP Programs NTIA Spectrum management Domain Name System root server tasks International Telecommunication organizations IPv6 Task Force ITA e-Commerce Privacy

Departmental CIP Programs BIS Export Administration Defense Industrial Base issues TA/NIST Security Standards EDA Economic recovery protocols

Security Standards National Institute of Standards and Technology Technical Security Standards Security Management Standards Testing, Evaluation, and Assessment Programs International Recognition Arrangements

References and Tools “Best Practices” Security Standards www.nric.org Security Standards http://csrc.nist.gov American Bar Association guides available upon request

CIP Lessons Learned • GLOBAL ECONOMIC BENEFITS OF CIP • Economic Security is a motivating factor • Complements law enforcement and national security objectives • cONTINUAL EDUCATION & AWARENESS NECESSARY • Solutions involve people, not just technology and process • INDUSTRY INTERACTION ESSENTIAL • Facilitates issue identification • Broadens analytic support • Facilitates buy-in by industry • Accelerates economic benefits to be derived

ECONOMIC SECURITY COMPONENT OF CIP: ROLES OF GOVERNMENT AND PRIVATE SECTOR U.S.-Bulgaria Conference on Cybersecurity September 8-9, 2003 Daniel C. Hurley, Jr. Director, Critical Infrastructure Protection U.S. Department of Commerce www.ntia.doc.gov dhurley@ntia.doc.gov