Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
PCard User Overview. 2 Marion Campus Who can use the PCard? Users Responsibilities Faculty, staff and students (with supervisor approval) who have been.
Position Opening Page 1 Job Classification: Network Server Administrator Opening Date: June 27, 2014 Location: Dobson Office Closing Date: July 7, 2014Grade:
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
School Management Software
System Implementations American corporations spend about $300 Billion a year on software implementation/upgrade projects.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Penn State University College Of Education Understanding College of Education Resources.
November 2009 Network Disaster Recovery October 2014.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
2008© COPYRIGHT 1 1 ATHN DATA SUMMIT DISASTER PREPAREDNESS JULY 31, 2008 PANEL MEMBER - JOY MAHURIN COMPREHENSIVE BLEEDING DISORDERS CENTER CONTINUITY.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Discovery Planning steps (1)
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Best Practices To ensure that students get the most out of online learning.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
P. O. Box 247 RPO Corydon Winnipeg, MB R3M 3S7 Telephone: (204) Fax: (204)
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
Staying Safe Online Keep your Information Secure.
New Grants Model Document Retention 1 District 5240 Grants Document Retention District Assembly /6/2013.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Developing a Disaster Recovery Plan Bb World ’06 San Diego, Calif. Poster Session Presented by Crystal Nielsen, M.A. Instructional Technologist Northwest.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Keeping you Running Part II Developing Your Own Local Government Cyber Security Plans Stan France & Mary Ball
How to evaluate ICT use for small organisations Session 2.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Information Systems Security Operational Control for Information Security.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
D5240 Document Retention System 8/20/ District 5240 The Rotary Foundation Grants Document Retention System Rotary Year
Protecting and Sharing Documents Lesson 13. Objectives.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
BNL Tier 1 Service Planning & Monitoring Bruce G. Gibbard GDB 5-6 August 2006.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
KTAC Security Task Force Superintendents Update April 23, 2015.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
1 Enterprise Requirement Planning For Manufacturing.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
Grant Management Seminar Session 3 1 Session 3 Oversight and Reporting 10/13/2012.
Regulatory Streamlining Task Force Update Discussion Item December 6, 2011 Board of County Commissioners.
Citizen and Immigration Services Transit Benefit Application System Approver Training November 5,
Hurricane Katrina Foreign Contributions Program February 2007.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
State of Georgia Release Management Training
Designing a Comprehensive Laserfiche System PP104 Steve Tivedt, The Insco Dico Group.
Building Support for GIS June 7, 2007 – ICIT Midyear Conference.
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
ALPA Information Technology Conference November 16-18, 2005.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Make-Up Testing/Undo Student Test Submissions
SharePoint 101 – An Overview of SharePoint 2010, 2013 and Office 365
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Data Preservation During Upgrades
An Introduction to System Administration
Enterprise Content Management (ECM) Project
Presentation transcript:

Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball

Outline Background Grant Process Experiences Recommendations

Background Rural county of 32,000 population Board of Supervisors 16 towns 6 villages County Data Processing department provides services without charge to towns and villages

Local Reasons for Addressing Corrupted machines –Lost information –Lost work time –Effort required by County to support and remedy Physical threat experience –Courthouse fuel oil spill –Planning for potential dam break

Broader Reasons for Addressing CSCIC coordination –Local Government Cyber Security Committee Non-Technical Guide Additional resources –Alert distribution –Problem reporting Overall records retention Incorporating into County emergency planning Model for replication

The Grant State Archives Local Government Records Improvement Fund $50k Provided for –Consultants to evaluate cyber security protection strategies –Acquisition and installation of protection software –Development of model policies and procedures –Consultant to work with municipal staff –Creation of an internet based back-up application

Establish Initial Contact Five minute presentation to municipal board –Get motion to participate –Leave folder with Guide, model policies, data gathering forms –Identify an initial contact person

Initial Work with Municipal Offices Review purpose Identify continuity functions Identify workflows and resources needed –Forms –Paper documents –Hardware –Software –Skills

Follow Up Work with Municipal Offices Consolidate needs and develop plans Provide training in use of Internet backup Review model policies and establish local versions to recommend to municipal board Install protective software and train on use

Project Consolidation Process Calculate number of backup machines, printers, faxes, desks, phones, etc. needed Identify coordinated alternate sites Track machine protection reports Integrate with County emergency plans

Project Experiences Project Handout Development Board Meetings Initial Staff Meetings Plan Development Follow up Software installation Backup site Training

Project Handouts Power point (5 pages on project details) Local Government Cyber Security: Getting Started Guide Model policies, plans, and procedures –Business Continuity Policy –Business Continuity Plan and Procedures –Cyber Security Policy –Acceptable Use Policy (Internet Use)

Board Meetings Presentation to the Board of Supervisors –22 Towns and Villages –6 to 9 members on each board Project handout given to each board member Presentation took about 5 minutes Question and answer period Motion to Participate

Commonly Asked Questions from the Board Cost or future cost to the municipality Internet connections (dial up issues) Backup site –Server location –Security of stored information Software protection

Initial Meeting with Staff Plan Development Reviewed workflow Categorized work functions –Significant, Essential, and Non-essential Identified office requirements –Hardware, software, equipment, forms, etc. Documented purchasing and replacement information Reviewed current backup methods Discussed files and documents for back-up site Establish temporary work location(s)

Discovery Process Follow Up Continuity Issues –Backup usually stored on premises –Physical storage desperately needed Make more forms available on-line to public Dial up issues for rural areas Discussed improvements –Continuity and cyber security –Other County programs used by municipalities

Protective Software MacAfee software Easy on-line installation Scan computers for possible threats or virus In-house monitoring AVG on Windows 98

Backup Site On-line Access User name and password log-in Ability to “Add” –Not a working folder –Stored for emergency restoration Zip program –User friendly, easy to use

Training Cyber security –Recognizing threats and reporting Protective software Backup site –Access the site –Zip files and send to server –Develop backup schedule

Recommendations It’s not rocket science Develop the support base before going for formal approval Know what information to gather before starting gathering Come to Part II this afternoon