Download presentation
Presentation is loading. Please wait.
1
Bill Trelease VP – CTO Delhi Telephone Company Bill@delhitel.com
2
The Cyber Security Framework The Core of the matter: Identify Protect Detect Respond Recover
3
Identify – Who is deciding the what Put a team together that represents all aspects of your business Since the Executive Order does not apply, we get to decide what “Core” and “Critical Infrastructure” are for us. What is critical, and to who
4
Identify – The inventory l Telephone The voice switch A large [capacity] Mux (OC-x) ? DXC ? An NGDLC or OLT
5
Identify – The inventory l Internet Core or Border router DNS Authentication server Other routers or switches
6
Identify – The inventory l TV EAS receiver Comb generator(s) EAS server
7
Identify – The inventory l Business Critical Billing NMS / EMS OSS
8
Identify – The inventory Don't forget the interaction EMS all of it's devices Billing / OSS to authentication NMS
9
Identify – The Inventory Document IT !!!!! What it is (make, model, etc) Where it is Who has to have access and what kind (read, write, admin) Who should not have access Date of last upgrade and / or patch and Rel. Id
10
Protect l Start from the outside, work in ACLs on Edge routers and SBC Firewall Segment networks Inter company internet network ACLs Per device Real passwords Appropriate permissions Backups incremental with full archival snapshots
11
Detect (think monitor) Log all login attempts Firewall with current signatures IDS current signatures Traffic patterns specifically changes of irregularities
12
Respond and Recover A response and recovery plan should be in place for all the assets identified Allow for the possibility that drastic measures may be required Segment disconnect Area isolation Stopping a service to maintain others
13
The Framework – it's more than just the “core” Tiers (4) Refer to Framework for more detail Keeps the core from being a check list Indicative of framework risk management “philosophy” adoption Tier 1: Partial – don't know that you don't know Tier 2: Risk Informed – know you don't know, but it's ITs problem
14
The Framework – it's more than just the “core” Tier 3: Repeatable – know there is a cyber risk and the company is working on it Tier 4: Adaptive – cyber security risk management is integrated in all company practices, there are scheduled tests, and results flow back into the process for improvement
15
Hand off to Jon
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.