Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.

Slides:



Advertisements
Similar presentations
Why Security? A Commitment for [the Agency’s] Executives [CIO’s name] EC Presentation [date]
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
IT Security Law for Federal Agencies As of: 30 December 2002.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
MAINSTAY ENTERPRISES, INC. “We Support Your Security Needs” Information System Security Services In today’s competitive marketplace, facilitating electronic.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Information Systems Security Officer
Stephen S. Yau CSE , Fall Security Strategies.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Security Training for Management Complying with the HIPAA Security Law.
Information Security Update CTC 18 March 2015 Julianne Tolson.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
NSF and IT Security George O. Strawn NSF CIO. Outline Confessions of a CIO Otoh NSF matters IT security progress at NSF IT security progress in the Community.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Scott Charney Cybercrime and Risk Management PwC.
Enterprise Cybersecurity Strategy
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
SecSDLC Chapter 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chapter 8 Auditing in an E-commerce Environment
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
New Paradigms for Capital Planning in IT Security Sandy Washington Federal Railroad Administration July 22, 2008.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Computer Security Division Information Technology Laboratory
Introduction to the Federal Defense Acquisition Regulation
I have many checklists: how do I get started with cyber security?
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Presentation transcript:

Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems

Federal Information Security Act (FISMA) Overview “Each Federal agency shall develop, document, and implement an agency-wide information security program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source…” -- Federal Information Security Management Act of 2002

3 Legislation and Policy  Public Law (Title III) –Federal Information Security Management Act of 2002 (FISMA) (December 2002)  Office of Management and Budget Circular A-130 (Appendix III) –Security of Federal Automated Information Resources (February 1996)  National Institute of Standards and Technology (NIST) Special Publication Guidance –Special Publications at  National Science Foundation Information Security Handbook – Manual 7 (April 2004) –

4 Information Security Program Elements Reference: FISMA  Periodic assessments of risk  Security policies and procedures  Security planning for networks and information systems  Security awareness training for employees and contractors  Periodic testing and evaluation of security practices annually  Plans for continuity of operations and disaster recovery  Procedures for detecting and reporting security incidents  Process to document and address security weaknesses  Report security status to Congress annually

5 Key Definitions Reference: OMB A-130 Appendix III  General Support System (GSS, i.e. LAN) –An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, application, communications, and people.  Major Application –Application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the application.  Application –The use of information resources to satisfy a specific set of user requirements.

6 Key NIST Publications  Introduction to Computer Security: The NIST Handbook  Guide for Developing Security Plans  Security Self Assessment  A Risk Management Guide  Contingency Planning Guide

7 NSF Information Security Handbook  Management Control Procedures –Risk Management, Security Control Review, Life Cycle, Security Planning  Operational Control Procedures –Personnel, Physical, Contingency Planning, HW/SW, Training, Incident Response  Technical Control Procedures –Identification and Authentication, Logical Access Controls, Audit Trails  Appendices with Report Templates –Security & Contingency Plans, Risk Assessment

8 NSF Keys to Success  Top Down Commitment to Security as a Strategic Priority  Comprehensive Security Program  Sustained Levels of Investment  Performance Goals and Measures

9 NSF IT Security Program Risk Management Approach Risks are assessed, understood and appropriately mitigated Confidentiality Integrity Availability Security Open Collaborative Environment for Research and Discovery

10 Security Management Structure DIS Security Officer NSF Director CIO Sr. Agency Information Security Officer Security Working Group Program Office Security Liaisons NSF Employees and Contractors NSF Customers and Stakeholders

11 NSF IT Security Program Policies, Procedures & Plans Security Assessments, Audits & Controls Security Awareness Training Certification & Accreditation Intrusion Detection & CIRT Vulnerability Assessment & Penetration Tests NSF IT Security Program

12 Layered Approach Protecting Critical Assets Requires Layered Proactive Controls, Monitoring the Environment and Reactive Functions for Effective Response Proactive MeasuresEventReactive Functions Critical Data, Informatio n, & Systems ProtectDetectReact (Cited only as examples) Defense in DepthEscalation by Severity Deter e.g., Warning Banner Detect e.g., Intrusion Detection Delay e.g., Firewall Defend e.g., Encryption Deny, Defeat Monitoring CIRT Forensics BCP/COOP

13 Management Controls  Management Structure, Roles and Responsibilities  Policy and Procedures  System Inventory  Security Reviews, Assessments, and Plans  Certification and Accreditation  Agency-Level Plan of Action and Milestones  Security Awareness and Training

14 Technical and Operational Controls  Connectivity Standards  External and Internal Networks  Firewall Architecture  Intrusion Detection  Vulnerability Scans  Penetration Tests  Patch Management  Laptop Scanning  Anti-Virus Protection  Continuity of Operations, Contingency, and Disaster Recovery The Visible and Known Establishes Confidence

15 Lesson Learned – Security is a Continuous Process Policy Standards Enterprise Architecture Configuration Standards Security is a continuous process of evaluation and monitoring Managed Security Services Intrusion Detection Firewall Management Incident Reporting Vulnerability Scan Assessments Risk – Threats Privacy Security Test & Eval. Compliance Product Selection Product Implementation Centralized Security Mgt. Strategy Business Continuity Solution Planning Resource Allocation Run Assess Plan Design Implement

16 Challenges  Changing Threat Environment  Cultural Change –Awareness and Education  Security Investment