1 Office of Information and Technology (OI&T) Field Security Operations Field Security Service.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Protection of Information Assets I. Joko Dewanto 1.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Structure and Responsibility
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
VA OI&T Field Security Service Seal of the U.S. Department of Veterans Affairs Office of Information and Technology Office of Information Security.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Mobility Project iPad Experiences & Results Child Welfare Technology Conference October 23, 2013 PRESENTED BY County of Ventura, Human Services Agency.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
HIPAA COMPLIANCE WITH DELL
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
PRIVACY AND INFORMATION SECURITY ESSENTIALS Information Security Policy Essentials Melissa Short, IT Specialist Office of Cyber Security- Policy.
Chapter 6 of the Executive Guide manual Technology.
UAB IT Security Program Sallie Wright UAB AVP, Information Technology.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Managing Security Risks in the Federal Reserve System Marianne Emerson, Deputy Director Information Technology Division Board of Governors of the Federal.
Working with HIT Systems
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Presentation to the CIO PREPARED BY: JOSHUA SMITH, GARY FAULKNER, BRANDON VAN GUILDER, AND ERIC RUSCH.
Enterprise Cybersecurity Strategy
KTAC Security Task Force Superintendents Update April 23, 2015.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Title in Sergoe, white, shadow, 36 Presentation title goes here, using Segoe Regular, in sentence case. Integrated Innovation Mark O’Shea Partner Technology.
Standard III Resources Effective Practices in Accreditation ASCCC Accreditation Institute, Feb , San Diego, CA Cheryl Aschenbach, ASCCC At-large.
Information Security tools for records managers Frank Rankin.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Budget Study Sessions Strategic Support Proposed Operating Budget OUTCOMES: - A High Performing Workforce that is Committed to Exceeding.
City of Hyattsville City Council IT Briefing October 19, 2015 dataprise.com | #ITinRealLife.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Office of Information and Technology (OI&T) Field Security Operations Field Security Service - On behalf of Office of Information and Technology (OI&T)
Jordan Population and Housing Census 2015
East Carolina University
Office of Information and Technology (OI&T) Field Security Operations Field Security Service - On behalf of Office of Information and Technology (OI&T)
LAND RECORDS INFORMATION SYSTEMS DIVISION
Information Technology (IT) Department
Pamela Heller, MSHI, RHIA, CCS-P, FAHIMA
Technology Audit Plan ----BCSY University
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
Introduction to the PACS Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

1 Office of Information and Technology (OI&T) Field Security Operations Field Security Service

2 Overview  Field Security Operations  Information Protection  Questions and Answers

3 Office of Information and Technology Field Security Operations

4 Director of IT Field Security Operations Technical Security Officers (TSO) Division Continuity of Operation Planning (COOP) Division Information Security Officers Division OI&T Field Security Operations Data Center ISO Support Division Region 1Region 3Region 4Region 5Region 2 Network 1, 2, 3, 4 & 5 POs Network 12, 15, 16, 17 & 23 POs SOC VBA NCA VACO AAC Network 6, 7, 8, 9, 10 & 11 POs Network 18, 19, 20, 21 & 22 POs Critical Infrastructure Protection Service Security Project Management Office IT Field Security Service Enterprise Security Solutions Service (SCMS & TIS)

5 Office of Information and Technology Field Security Service

6 Field Security Service Mission  The mission of the OI&T Field Security Service (FSS) is to ensure the privacy, confidentiality, integrity, and availability of VA information assets associated with the services offered by the Department of Veterans Affairs. In addition, FSS provides assurance that cost effective security controls are in place to protect automated systems from financial fraud, waste, and abuse.

7 Field Security Service Enterprise Technical Security Officer (TSO) Continuity of Operation Planning (COOP) Division Information Security Officers Division Data Center Support Division Region 1Region 3Region 4Region 5Region 2 Network 1, 2, 3, 4 & 5 POs Network 12, 15, 16, 17 & 23 POs SOC VBA NCA VACO AAC Network 6, 7, 8, 9, 10 & 11 POs Network 18, 19, 20, 21 & 22 POs IT Field Security Service Region TSO

8 IT Boundaries

9 Field Security Service Leadership Team Region 1 ISO (Supervisor) John White Region 2 ISO (Supervisor) Alan Mattson Region 3 ISO (Supervisor) Barbara Smith Region 4 ISO (Supervisor) Alan Papier Region 5 ISO (Supervisor) Dennis Smith IT FSS Director (Supervisor) Randy Ledsome Network 6 ISO (Team Lead) VACANT Steve Blackwell (Acting) Network 7 ISO (Team Lead) Greg Walker Network 8 ISO (Team Lead) Dale Bogle Network 9 ISO (Team Lead) Chris Varacalli Network 10 ISO (Team Lead) Kristin Steel Network 11 ISO (Team Lead) VACANT Mark Latendresse (Acting) Network 1 ISO (Team Lead) Tim ODonnell Network 2 ISO (Team Lead) Chafica Angeli Network 3 ISO (Team Lead) Alan Papier (Acting) Network 4 ISO (Team Lead) Starr Washington Network 5 ISO (Team Lead) Michael Barnes Network 12 ISO (Team Lead) Steve Deyoe Network 15 ISO (Team Lead) VACANT Terry Taylor (Acting) Network 16 ISO (Team Lead) Dan Cleaver Network 17 ISO (Team Lead) Diane Dixon Network 23 ISO (Team Lead) Craig Heitz Network VBA – St Petersburg ISO (Team Lead) Jessica Lewis Network VBA – St Paul ISO (Team Lead) Connie Hamm Network VBA – San Diego ISO (Team Lead) Patrice Volante Network VACO ISO (Team Lead) Louise Lovett-Robinson NCA ISO Judi Huffman Network 18 ISO (Team Lead) Steve Kerby Network 19 ISO (Team Lead) Armando Diaz De Leon Network 20 ISO (Team Lead) Michael Sutherland Network 21 ISO (Team Lead) Mary Ebner Network 22 ISO (Team Lead) Doug Foster Note: This presentation only includes staff in Team Lead and Supervisor positions. IT COOP (Team Lead) Don Sheehan

10 ISO Standardization  Position Descriptions (including series and grades)  Performance Standards  Roles and Responsibilities  Guidance and Procedure  Training and Education

11 Office of Information and Technology Information Protection

12 Laptop Encryption Smart Phone/Blackberry Encryption and Document Security Removable Media and Storage Security Network Transmission Security Remote Access Security Information Protection Technical Controls Operational Controls Management Controls Training Human Resources Standard Operating Procedures Policy Directives Memoranda Information Protection

13 \ Information Protection Technology Summary User Removable Media and Storage Smart Phones/Blackberry Devices Technical Solution Only authorized Users And devices Only Government Furnished devices; Encrypted; password protected Network Transmissions No clear text; Encrypted data Transmissions Layered approach to provide Comprehensive information protection of VA sensitive data Control data storage and transmission and Documents PKI, Internet Gateway Scans, RMS - Full document control. Remote Access Reduce VPN access; Scan all equipment connecting to VA network - RESCUE Security Issue

14 Summary  Field Security Operations and Field Security Service  Information Protection  Information Protection is EVERYONE’s Responsibility!

15 General Questions? Randy Ledsome Director of Field Security Service