EPA’s Story: Developing a Secure Mobile-First Culture Malcolm Jackson Assistant Administrator for Environmental Information and Chief Information Officer.

Slides:



Advertisements
Similar presentations
Customer success stories: Empower people-centric IT.
Advertisements

Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA M TAY WEN YIN (JASLYN)A U WONG CHIH YONGA E GOH AIK HWEEA L Our Team.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
National Aeronautics and Space Administration NASA Mobility.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Culture of Compliance HIPAA Privacy & Security Compliance Office.
Technology Presentation E-Learning, hardware and the cloud.
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Michigan’s Digital Strategy Michigan Information Systems Association Passport to Smarter Government September 18, 2014 Presented by: David Behen DTMB Director.
Technology in Organisations How are technological components used together in systems? All images drawn by Christopher Ashwood.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Leading the way; making a difference Young Professionals in Shipping Network, Hong Kong Changing the Environment – a look at the less traditional roles.
Department of Finance & Administration Organization Chart as of January 23, 2014.
The Future of Flexibility BC Center for Work & Family Executive Briefing Series Boston College Center for Work and Family.
Strategic Planning for EEO & HR Offices Dinah Cohen CAP Director Derek Shields CAP Program Manager EEOC Executive Leadership Conference – May 3-5, 2011.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
IPv6 Survey: Taking the Federal Pulse on IPv6 Summary Results Market Connections, Inc. June 2006.
Chapter 3 Organizational Environments and Cultures Dr. Ellen A. Drost
Safety Challenges in the Resources and Construction Industries Mike Gear National Health & Safety Manager BGC Contracting.
BYOD Smackdown Presenters Roy Hickman, Moderator David Palme, Con Stance Jeff Trudell, Pro Stance.
Component 6 - Health Management Information Systems Unit 2-2 -Hardware and Software Supporting Health Information Systems.
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Next Generation Air Monitoring: An Overview of US EPA Activities National Air Quality Conference RTP, NC February 12, 2014 Tim Watkins US EPA/Office of.
Innovation Leadership Dr Françoise Legoues. 2 What is innovation? “Innovation occurs at the intersection of invention and insight. It’s about the application.
Desktop Security: Making Sure Your Office Environment is Secure.
Frontline Enterprise Security
Enterprise Cybersecurity Strategy
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
The First Step in Cybersecurity. Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity.
B.Y.O.D. Bring Your Own Device Considerations for Implementing an Open Mobile WiFi Campus By Kristin Morris M.E.T. program, June 2012 Boise State University.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
TechOrchard Phil Poje, CEO. Benefits and Risks Data Breaches BYOD Mobile Device Management.
Describe the potential of IT to improve internal and external communications By Jim Green.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
LEN BLASIOL, MODERATOR JIM LEVERSO NOAH NASON BOBBIE SANDERS “Building a Mobile IT Engine”
NEIGHBOURHO ODS 0 to 25 COMMISSIONI NG & PROCUREMENT CUSTOMER ( DIGITAL ) INTEGRATED CARE ORGANISATION.
11/8/2012Proprietary & Confidential1. Enhancing the learning environment to… Increase student & teacher competencies in technology Support the integration.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Information Security tools for records managers Frank Rankin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Moving to BYOD Gary Audin 1.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Information Security Program
A Shift in the Data Security Paradigm
Designing a DM Classroom
How to Define a Successful Mobility Strategy
Proactive Attack Prevention and Detection
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Leverage What’s Out There
Institution Affiliated
Reduce Security Risks to Protect Your Network
CIS 349 Possible Is Everything/tutorialrank.com
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/tutorialrank.com
CIS 349 Education for Service/snaptutorial.com
CIS 349 Teaching Effectively-- snaptutorial.com
Fatigue Risk Management
IT Development Initiative: Status and Next Steps
National Cyber Security
Powerful Partnerships with Industry Leaders
Presentation transcript:

EPA’s Story: Developing a Secure Mobile-First Culture Malcolm Jackson Assistant Administrator for Environmental Information and Chief Information Officer June 25, 2012

Agenda Industry past, present, and future History of secure mobile devices at EPA Security concerns Cybersecurity evolution at EPA Recent Cybersecurity Threats Current and near-future EPA initiatives Future Challenges The future and the convergence of technology 6/25/2012U.S. Environmental Protection Agency2

6/25/20123U.S. Environmental Protection Agency Photo source: Micro Manufacturing Where the Industry has Been….

History of Secure Devices at EPA Blackberry Laptops 6/25/2012U.S. Environmental Protection Agency4 Risk: Low/Moderate

EPA Cybersecurity Evolution 1999: Agency-wide manual published 2000: GAO Report identifying EPA weaknesses 2001 – 2002: Creation of Technology and Information Security Staff and Senior Agency Information Security Officer position – present: Compliance with FISMA requirements; continuous monitoring of security threats to Agency 6/25/2012U.S. Environmental Protection Agency5

Recent Cybersecurity Threats 6/25/20126U.S. Environmental Protection Agency Photo Source: Voltage Security

Current EPA Initiatives Tablets Telework Collaboration Tools Wireless Networks New Hardware BYOD 6/25/2012U.S. Environmental Protection Agency7 Risk: Extremely High

Future Secure Device Challenges Paradigm shift Managing security tool(s) evolution Agency Leadership engagement and ownership Move from reactive to proactive Educating employees Ownership by everyone 6/25/2012U.S. Environmental Protection Agency8

6/25/20129U.S. Environmental Protection Agency Technology Convergence Over the Past 5 Years 011/03/technological- convergence.html Photo Source:

Technology Convergence in the Next 5 Years 6/25/201210U.S. Environmental Protection Agency Photo Source:

Questions? 6/25/201211U.S. Environmental Protection Agency