Cybersecurity Introductions Skyline Technology Solutions Tom - - PowerPoint PPT Presentation

cybersecurity
SMART_READER_LITE
LIVE PREVIEW

Cybersecurity Introductions Skyline Technology Solutions Tom - - PowerPoint PPT Presentation

The Why, What, and How of Cybersecurity Introductions Skyline Technology Solutions Tom Burgoon - BD ITS Practice Laura Gomez-Martin Cybersecurity Compliance Advisor Chip Stewart Principal Consultant Mission Secure


slide-1
SLIDE 1

Cybersecurity

The Why, What, and How of

slide-2
SLIDE 2

Introductions

  • Skyline Technology Solutions
  • Tom Burgoon - BD ITS Practice
  • Laura Gomez-Martin – Cybersecurity Compliance Advisor
  • Chip Stewart – Principal Consultant
  • Mission Secure
  • Rick Tiene –VP, Government and Critical Infrastructure
slide-3
SLIDE 3
slide-4
SLIDE 4

DOT Networks

Road Side Devices Field Network Trusted Network External Networks

ITS Assets

Roadside Internet of things Cellular Internet Commodity Internet Fixed Wireless Leased Circuits PSTN & Private APN

slide-5
SLIDE 5

Cybersecurity Quick Primer

slide-6
SLIDE 6

Road Side Devices Field Network Trusted Network External Networks

Road Side Devices

slide-7
SLIDE 7

Field Network

Road Side Devices Field Network Trusted Network External Networks

slide-8
SLIDE 8

Trusted Network

Road Side Devices Field Network Trusted Network External Networks

slide-9
SLIDE 9

External Networks

Road Side Devices Field Network Trusted Network External Networks

slide-10
SLIDE 10

Insider Threats

Road Side Devices Field Network Trusted Network External Networks

slide-11
SLIDE 11

Security is simple – not easy

slide-12
SLIDE 12

What is Cybersecurity

  • Policy
  • Detailed Controls and Configurations
  • Continuous Monitoring
  • Incident Response
slide-13
SLIDE 13

What Cybersecurity is Not

  • Total Elimination of Risk
  • One Tool Solution
  • A Traditional IT Function
slide-14
SLIDE 14

Informative Resources

  • CIS Top 20
  • ISO 27001
  • NIST SP 800-53R4
slide-15
SLIDE 15

Recent Critical Infrastructure Developments

2013: Executive Order 13636 Improving Cybersecurity in Infrastructure 2014: Cybersecurity Enhancement Act 2014: Framework for Improving Critical Infrastructure Cybersecurity v1.0 2017: Framework for Improving Critical Infrastructure Cybersecurity v1.1

slide-16
SLIDE 16

Framework for Improving Critical Infrastructure Cybersecurity

slide-17
SLIDE 17

Cybersecurity Program for Maryland DoIT

slide-18
SLIDE 18

Cybers rsecurity P Pro rogra ram

slide-19
SLIDE 19

Research

Identify Data and Systems Research and Choose Standard Perform Risk Assessment/Gap Analysis

Define acceptable level of risk, downtime, data loss Compare where you are to end- goal

Joint Effort and Communication

slide-20
SLIDE 20

Design

Realistic and Cost- Effective Identify & Prioritize Initiatives Identify Essential Roles Existing Resources Create

slide-21
SLIDE 21

Adopt

Leadership Support

  • Involvement

in Process

Authoritative Power Availability of Documents Education Program

slide-22
SLIDE 22

Implementation

Actionable Steps

  • Research new tools
  • Procure new tools

Train Personnel Configure Existing Technology Implement New Technology Ensure New Equipment Meets Standards

slide-23
SLIDE 23

Monitor

Continuous Monitoring of Threats Incident Identification Evaluation of Effectiveness Continuous Improvement

slide-24
SLIDE 24

Incident Response

Create Standards and Processes Table-top Exercises Adequate Staffing

Staff to perform incident coordination, forensic analysis, and reverse engineering Lessons Learned

Cybersecurity Insurance

slide-25
SLIDE 25

What does a mature program look like?

slide-26
SLIDE 26

Organizations with an Established Program

  • Audit to check whether personnel, technology, and processes are in line

with Program Requirements

  • Automatic
  • Manual
  • Create a compliance division and routinely check status and identify

improvements

slide-27
SLIDE 27

Where Does My Organization Start?

  • Where does my organization stand today?
  • How do I find out if my organization has a program?
  • Who should I contact?
slide-28
SLIDE 28

Review

  • Why – Risk,
  • What – Definition and Resources that offer Frameworks
  • How – Programs take energy, resources, and 24/7 attention
slide-29
SLIDE 29

Questions?