Slide 1 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Nine Tough Questions Mayors Should Ask Their Geeks For Mayors’

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Confidential: All Rights Reserved Web-based Alerting The International Common Alerting Protocol (CAP) provides for a standardized alerting format for all.
Douglas Bass, Director Office of Emergency Management Fairfax County, VA.
SUNGARD PLANNING SOLUTIONS LESSONS LEARNED: SEPTEMBER 11 A Business Continuity Approach Barbara Allen SunGard Planning Solutions December 11, 2002.
Mapping, Tracking & Visualization Enterprise Situational Awareness and Management Don Farrell Don Farrell & Associates, Inc.
Emergency Preparedness
INTERNET SAFETY FOR STUDENTS
Security and Personnel
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Bill Schrier, CTO City of Seattle GMIS 2011 Santa Fe.
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Office of Enterprise Technology Agency Overview House State Government Finance Committee February 2, 2011.
CYBER CRIME AND SECURITY TRENDS
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Kanawha County’s Emergency Preparedness Plan. Planning is bringing the future into the present so you can do something about it now. Alan Lakein Time.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Wisconsin Digital Summit Monona Terrace November 15, 2004 Justice and Public Safety Interoperability: Wisconsin’s Justice Information Sharing (WIJIS) Initiative.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 FCC-NTIA Joint Advisory Committee on Communications Capabilities of.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Slide 1 1 Explanation of ITTF Communications initiatives and the use of IREACH for health departments.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
1 Crisis Management / Emergency Management Overview.
Departmental Disaster Readiness By John Hardcastle Emergency Services Coordinator Palm Springs Fire Department.
2011 Windstorm 2011 Windstorm After-Action Report - Update December 3, 2012.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Local Government Business Continuity, Avian Flu & Emergency Management Roy Mentkow Director, Department of Technology City of Roanoke Virginia.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Chief Harlin R. McEwen Chief of Police (Ret) City of Ithaca, NY FBI Deputy Assistant Director (Ret) Washington, DC Public Safety Spectrum Trust Chairman.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Writing an Emergency Operations Plan Why do we need to plan? Spring 2008.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Capital Improvement Project Town of Chelmsford IT FY2007.
Sustain a Safe, Healthy & Prosperous Community for All 1 County of Santa Clara SB 272 Process.
Surveillance and Security Systems Cyber Security Integration.
Information Security Officer Meeting
Securing Information Systems
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
A Better Choice For COMPANY NAME
CYBERTHON Use-cases.
Communicating Through the Internet and Other Technologies
Premier Employee Program Version 4.0
Securing and Protecting Citizens' Data
Presentation transcript:

Slide 1 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Nine Tough Questions Mayors Should Ask Their Geeks For Mayors’ Technology Summit Fox School of Business, Temple University 8 October 2004 Bill Schrier, Chief Technology Officer City of Seattle, Washington

Slide 2 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle The CIO Chief Geek, aka CIO Chief Information Officer – The person, reporting to the CEO, who determines the overall strategic direction and insures business contribution of the information systems function in a business. Geek, noun, slang a person who is extremely interested and knowledgeable about computers, electronics, technology, and gadgets; also called gearhead, propellerhead Propeller-less

Slide 3 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Wi Fi Phishing XML VoIP Viruses Internet

Slide 4 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Tough Questions Information technology must serve constituents Information technology and networks: –an enabler of government –also a dependency, vulnerability –new threats: cyber-attacks, info theft, reputation loss How do you know your IT is effective and secure? Hard questions to help you - the City’s CEO – insure IT serves you and your constituents

Slide 5 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 1. Priorities Increasingly, technology enables every department to deliver faster, better, cheaper IT works across the government – interdepartmental cooperation, interoperability Technology makes your priorities “real”: 24x7 services, web, 311, community notification But there is so much to do! And it is costly! How do you decide where to invest $$$ ? Tough question number 1: Do your geeks (technology staff) know your priorities?

Slide 6 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Mayor Nickels’ Priorities Get Seattle moving Keep our neighborhoods safe Jobs, opportunity for All Build strong families and healthy communities Make a difference in the lives of people! Greg Nickels Mayor of Seattle

Slide 7 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 2. City Employees Effective government depends upon information & communications Employees – your greatest asset and vulnerability Hiring – background checks Internet, usage policies Remote access, security policies, two-factor authentication Toughie #2: Are your City’s employees ready and able to secure your information? Security awareness – “post-it” note terror Computer forensics – “personal” computers

Slide 8 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 3. CISO THE single “go to” official, responsible for information security policy, awareness, resources and programs Advises departments on risk, issues, compliance and the law: HIPPA A check on too-rapid deployment of technology – the “idea virus” Need help? Call my CISO! Toughie #3: Do you have Chief Information Security Officer? Kirk Bailey, CISO Seattle

Slide 9 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 4. IT and EOC Communications are critical in both daily emergencies and disasters Radio, telephone, computer networks, , web, GIS (maps), applications Multiple redundant communications Second responders WTO, Nisqually Earthquake Toughie #4: Are your IT staff an integral part of your Emergency Operations Center? Public Safety Radio Tower

Slide 10 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle IT Incident Command Worms and viruses and hackers, oh my! Sasser, Randex F, MyDoom Cyber attacks on utilities, communications Alki Vulnerability Exercise TOPOFF2 Cyber-Exercise 2003 Toughie #5: Do your geeks know and practice incident command?

Slide 11 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Cyber Wormslayer

Slide 12 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Real Life TOPOFF2 Washington State EOC 6-7 May 2003

Slide 13 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 6. Message Website Electronic mail lists, listserv’s Your TV Channel, emergency messages Video streaming, library Broadcasting from your EOC Backup website, electronic mail Toughie #6: Is IT ready to broadcast your message?

Slide 14 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle What Scares Schrier

Slide 15 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 7. Disaster Recovery Constituents understand an earthquake But not water leaks or building fires Data secured off-site Backup sites and plans Not just computers: phones, web, All departments – business continuity Toughie #7: Do you have an IT disaster recovery plan?

Slide 16 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 8. Securing Data Rigorous policy for new public web applications: hardening, outside review Safeguarding names, social security numbers and identity theft Privacy policy for your website A certain county … Toughie #8: It is 11PM. Do you know where your constituents’ data are?

Slide 17 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle 9. Protect Your Brand Impersonating, identity theft of your City’s good name Integrity and trust Phishing – policy “we don’t” Toughie #9: Can your CIO protect your City’s branding and good name? Protecting the “.gov” domain Spoofing and …

Slide 18 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle The Bottom Line City government is about making a difference in the lives of people. Information technology: –enables better constituent service –allows citizens more access to and better interaction with their government –but is a two edged sword Hard questions, sound policies, make for effective, secure information technology