Download presentation
Presentation is loading. Please wait.
Published byJoy Warren Modified over 9 years ago
1
Homeland Security Cyber Threat Discussion INFRAGARD 2012 UNCLASSIFIED/FOR OFFICIAL USE ONLY Richard C. Baron Executive Director Ohio Homeland Security Homeland Security Advisor to Ohio
2
What Does Cyber Threat Mean UNCLASSIFIED/FOR OFFICIAL USE ONLY Risk = Threat X Vulnerability X Consequence Vulnerability= What is the vulnerability Consequence = What is the consequence Threat = What is the threat Risk = What is at risk
3
Cyber Space UNCLASSIFIED/FOR OFFICIAL USE ONLY.com/.net/.org.mobi/…. Public/Corpoate Domain.mil Military Domain.gov/.us Governmental Domain
4
Focus of CYBER Security Private Sector UNCLASSIFIED/FOR OFFICIAL USE ONLY People Systems
5
Focus of CYBER Security Public Sector UNCLASSIFIED/FOR OFFICIAL USE ONLY People Systems
6
Rick’s Rules #1 UNCLASSIFIED/FOR OFFICIAL USE ONLY Source U.S Cyber Command 6 Multi-State ISAC (MS-ISAC) The time to plan is not at the time of crisis!
7
Rick’s Rules #2 UNCLASSIFIED/FOR OFFICIAL USE ONLY 7 Multi-State ISAC (MS-ISAC) The event causing the crisis de jour was most likely not an event that could not be anticipated!
8
Gordon Graham’s General Rule UNCLASSIFIED/FOR OFFICIAL USE ONLY 8 Multi-State ISAC (MS-ISAC) If it is predictable its preventable!
9
What Are We Trying To Protect UNCLASSIFIED/FOR OFFICIAL USE ONLY 9 Multi-State ISAC (MS-ISAC) Private SectorPublic Sector Network & System Intellectual PropertyTechniques & Methods Personal Data Monetary Access Data Security Plans Recover Plans Etc.
10
Fundamental Principles UNCLASSIFIED/FOR OFFICIAL USE ONLY 10 Multi-State ISAC (MS-ISAC) Similar crimes are committed by similar personalities that do similar things. Similar systems and operating systems have similar processes and behave in similar ways. Just Like
11
Considerations for Planning UNCLASSIFIED/FOR OFFICIAL USE ONLY 11 Multi-State ISAC (MS-ISAC) Work through existing support channels INFRAGARD Pre-coordinate with: –State CIO / CISO –State OHS/EMA –DHS coordinators for the state –Local FBI representatives –NORTHCOM EPLO (Emergency Preparedness Liaison Officer) –National Guard JFHQ (Joint Operations Center) for ANG and ARNG capabilities (NWS and CND teams) Multi use Title 10 / Title 32 / State AD / DSCA The common technology base in the NG provides ability for use both in combat operations or response to state emergencies –Commercial providers – Technical extension, ability to mix contract service providers with DOD tactical systems, local cyber response elements –Academic assets, Universities and Cyber training schools
12
Discussion UNCLASSIFIED/FOR OFFICIAL USE ONLY
13
Contact Information UNCLASSIFIED/FOR OFFICIAL USE ONLY
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.