Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bill Trelease VP – CTO Delhi Telephone Company

Similar presentations


Presentation on theme: "Bill Trelease VP – CTO Delhi Telephone Company"— Presentation transcript:

1 Bill Trelease VP – CTO Delhi Telephone Company Bill@delhitel.com

2 The Cyber Security Framework The Core of the matter:  Identify  Protect  Detect  Respond  Recover

3 Identify – Who is deciding the what  Put a team together that represents all aspects of your business  Since the Executive Order does not apply, we get to decide what “Core” and “Critical Infrastructure” are for us.  What is critical, and to who

4 Identify – The inventory l Telephone  The voice switch  A large [capacity] Mux (OC-x) ?  DXC ?  An NGDLC or OLT

5 Identify – The inventory l Internet Core or Border router DNS Authentication server Other routers or switches

6 Identify – The inventory l TV EAS receiver Comb generator(s) EAS server

7 Identify – The inventory l Business Critical Billing NMS / EMS OSS

8 Identify – The inventory Don't forget the interaction EMS all of it's devices Billing / OSS to authentication NMS

9 Identify – The Inventory Document IT !!!!!  What it is (make, model, etc)  Where it is  Who has to have access and what kind (read, write, admin)  Who should not have access  Date of last upgrade and / or patch and Rel. Id

10 Protect l Start from the outside, work in ACLs on Edge routers and SBC Firewall Segment networks Inter company internet network ACLs Per device Real passwords Appropriate permissions Backups incremental with full archival snapshots

11 Detect (think monitor)  Log all login attempts  Firewall with current signatures  IDS current signatures  Traffic patterns specifically changes of irregularities

12 Respond and Recover A response and recovery plan should be in place for all the assets identified  Allow for the possibility that drastic measures may be required  Segment disconnect  Area isolation  Stopping a service to maintain others

13 The Framework – it's more than just the “core”  Tiers (4) Refer to Framework for more detail  Keeps the core from being a check list  Indicative of framework risk management “philosophy” adoption  Tier 1: Partial – don't know that you don't know Tier 2: Risk Informed – know you don't know, but it's ITs problem

14 The Framework – it's more than just the “core” Tier 3: Repeatable – know there is a cyber risk and the company is working on it Tier 4: Adaptive – cyber security risk management is integrated in all company practices, there are scheduled tests, and results flow back into the process for improvement

15 Hand off to Jon


Download ppt "Bill Trelease VP – CTO Delhi Telephone Company"

Similar presentations


Ads by Google