N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa

Slides:



Advertisements
Similar presentations
AASHTO Internal Audit Conference 2012 – Phoenix Daniel Fodera, CMQ/OE Program Management Improvement Team Federal Highway Administration.
Advertisements

1 © 1999 Deloitte Consulting Infrastructure Sub-processes In Scope – Plan and Manage Business.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
Moving Forward with Safety Management Systems December 9, 2014 Standing Committee on Public Transportation Winter Meeting American Association of State.
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Managing the Information Technology Resource Jerry N. Luftman
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Framework
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Complying With The Federal Information Security Act (FISMA)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Peer Information Security Policies: A Sampling Summer 2015.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Managing a Training Program Why train? Who will attend the training? What are the learning objectives? Strategies? Coverage? How will the training program.
SEC835 Database and Web application security Information Security Architecture.
Continual Service Improvement Process
Information Systems Security Computer System Life Cycle Security.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
ISA 562 Internet Security Theory & Practice
NIST Special Publication Revision 1
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
1.  Describe an overall framework for project integration management ◦ RelatIion to the other project management knowledge areas and the project life.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Page 1 ISO/IEC JTC 1/SC 7/WG 7 N Summary of the Alignment of System and Software Life Cycle Process Standards The material in this briefing.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
1 | 2010 Lecture 3: Project processes. Covered in this lecture Project processes Project Planning (PP) Project Assessment & Control (PAC) Risk Management.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
© 2006 The MITRE Corporation. All rights reserved EA in the Federal Enterprise Life Cycle September 2006 Steve Decker MITRE Corporation Center for Enterprise.
New Paradigms for Capital Planning in IT Security Sandy Washington Federal Railroad Administration July 22, 2008.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
The Risk Management Framework (RMF)
ITSM Governance is Imperative to Succeed
Bridging the ITSM Information Gap
Bridging the ITSM Information Gap
Presentation transcript:

N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa

For Official Use Only  System is categorized as Low for Confidentiality, Integrity, and Availability  Full ATO received December 7, R e s ul ts R e s ul ts

For Official Use Only Continually Communicate with Stakeholders across the Enterprise and Continually Assess Risk Continually Communicate with Stakeholders across the Enterprise and Continually Assess Risk  Continually monitor  Adversaries  Threats  Vulnerabilities  Countermeasures  Mission changes  POA&M status  Continually monitor  Adversaries  Threats  Vulnerabilities  Countermeasures  Mission changes  POA&M status Monitor  Identify mission, business, and information sharing needs  Conduct initial risk assessment  Identify mission, business, and information sharing needs  Conduct initial risk assessment Categorize  Select minimum required risk mitigation controls based on impact levels  Refine controls based on updated risk assessment  Select minimum required risk mitigation controls based on impact levels  Refine controls based on updated risk assessment Select  Ensure risk assessment and countermeasures are documented for required essential information Document  Implement countermeasures in developed systems (technical) or environment (admin, physical, operational) Implement  Conduct assessment to determine effectiveness of countermeasures  Determine residual risk  Conduct assessment to determine effectiveness of countermeasures  Determine residual risk Assess  Add/Remove countermeasures based on risk assessment  Confirm all countermeasures are selected  Add/Remove countermeasures based on risk assessment  Confirm all countermeasures are selected Supplement  Review residual risk  Determine acceptability of residual risk  Accept risk or require POA&M, or deny  Review residual risk  Determine acceptability of residual risk  Accept risk or require POA&M, or deny Decide

For Official Use Only Committed to providing excellent service Security = boring

For Official Use Only  Proactive versus reactive  Based on Strategic, Tactical and Operational Goals  Strategic – Considered Long term (2-3 yrs)  Tactical – Mid Term (6 months-2 years)  Operational – Short Term (0-6 months) Strategic Tactical Operational O&M Change Management Continuous Monitoring New connections Extension of Backbone Limited Pen Testing IPv6 Full C&A – 2014 Complete Multicast

For Official Use Only Acquisition Life cycle System Development Life cycle A&A Life cycle Risk Management Life cycle Mission and Business Plan Budget Acquisition Plan Management and MeasurementProcurement Operations and Maintenance Disposal Test and Evaluation Develop- ment DesignConceptRequirements DecideMonitorAssess Docu- ment Supple- ment CategorizeSelectImplement Certification Initiation Monitoring Accredi- tation

For Official Use Only Operational Controls Physical Configuration Management Contingency Planning Personnel Security System & Information Integrity Management Controls Risk Management Policies and Procedures Planning System & Services Acquisitions Technical Controls Boundary Protections Access Controls, I&A Auditing

For Official Use Only Managing Risks is Key  Balancing Risks against cost  Accept  Mitigate  Transfer  Avoid Risk Cost

For Official Use Only User Group ERB CCB NNC CIO Council Funding Oversight Strategic Planning Financial Mgmt Requirements CONOPS System Architecture System Design Change Mgmt Configuration Mgmt Requirement Fulfillment System Monitoring Problem Mgmt Members Executive Level (CIO’s, CFO’s, etc) NWave PM NNC Rep NWave User Rep System IT Managers Technical Staff (ISSO, SA’s, Network Admins, etc) System Owners LO Project Management IT Managers Body Decision Domain LO Representatives CIO Reps LO NOC Rep NN System Owner IT Principles Investment & Prioritization IT Principles Investment & Prioritization IT Infrastructure Strategy IT Architecture IT Infrastructure Strategy IT Architecture Service Management Sub Committee

For Official Use Only  Consists on inputs from the Engineer, COTR, and ISSO. – Other participants are NNC LO’s representatives: 4 types of changes which require NNC review – Budget, Operations costs – Security – Peering to other organizations – ERB changes where consensus is not reached

For Official Use Only

 Changes within CCB scope are: ◦ Server configuration changes ◦ Network device changes ◦ Patching ◦ User access ◦ Other administrative changes required to maintain the network

For Official Use Only  Performance - tests and demonstrates performance requirements such as bandwidth, latency, etc  Functional - tests and demonstrates usability of system applications and tools  Security - verifies specific NIST security controls are implemented satisfactorily