election infrastructure security the how and why of it
play

Election Infrastructure Security: The How and Why of It Minnesota - PowerPoint PPT Presentation

Election Infrastructure Security: The How and Why of It Minnesota ta County ty A Auditor E Election Training Conference May ay 3, 2 2018 Contents Elect ction I Infr fras astructure Se Secu curity O Overview Cy Cyber ber a


  1. Election Infrastructure Security: The How and Why of It Minnesota ta County ty A Auditor E Election Training Conference May ay 3, 2 2018

  2. Contents • Elect ction I Infr fras astructure Se Secu curity O Overview • Cy Cyber ber a and d Ph Physi sical S Sec ecurity S Ser ervi vices a and d Tool ools 2

  3. Electio tion I Infras astructu ture S Security ity O Overvie view

  4. Elections: Critical to American Democracy “Given the vital role elections play in this country, it is clear that certain systems and assets of election infrastructure meet the definition of critical infrastructure, in fact and in law.” – DHS Election Infrastructure Designation Statement, Jan. 6, 2017 Cr Critical in infrastructure is is de defin ined as: as: “Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” 4

  5. Election ons S s Syst stems: ms: A Designated Critical Infrastructure Unique designation that provides for a basis for the Department of Homeland Security and other federal agencies to: • Recognize the importance of these systems, • Prioritize services and support to enhancing security for such infrastructure, • Afford the elections community an opportunity to work with each other and with the Federal Government, through government and private sector coordinating councils, and • Communicate to the global community our intention to hold those responsible who attack these systems as violating international norms. 5

  6. DHS HS E Emp mploys A A “Whol ole of of Nation on” A Approach Securing election infrastructure is a national priority and no one entity can be successful working alone ― it takes a “whole of nation” approach. Federal Academi Ac mia Agencies Just as most critical infrastructure is not federally owned or managed, election infrastructure is outside federal control. DHS values and builds partnerships based on a foundation of trust and information sharing. Stat ate an e and Private Local Go Gov Secto tor 6

  7. Par artnership ips: Crit itical Fo al Force Mu Mult ltip ipli lier DHS, S, w with t the U U.S. S. E Electio ion A Assis istan ance C Commiss mmissio ion: • Established the Election Critical Infrastructure Working Group (ECIWG) that brought together key federal, state, county, and local officials to plan subsector formation and prepare stakeholders to identify and mitigate risk to election infrastructure. Collaborat atio ion a and coordin dinat atio ion a are e esse sential ial: • DHS’s National Protection and Programs Directorate (NPPD) seeks to partner and collaborate with all election community members and established multiple standing coordination meetings with other Federal interagency and State and local election officials on partnership formation questions and recommendations. 7

  8. Coor oordinating C Cou ouncils: Sec ector S Suppo pport t Forums ums Governme ment C Coordin inat atin ing Counci cils • Enable agency and cross-jurisdictional coordination by various levels of government – federal, state, local, or tribal, as appropriate Secto tor Coordin dinat atin ing Co Councils • Enable critical infrastructure owners and operators, their trade associations, and other industry members to interact on a wide range of sector-specific strategies, policies, and activities. 8

  9. Election Infrastructure Subsector GCC Feder ederal, state, e, and local g gover ernmen ent p partners formed med the e Election Infrastructure Subsec ector GCC (EIS S GCC) ) and met et f for the e first time me in Atlan lanta, Oc October 2017. • Formation was a milestone in multi-level government cooperation and bolstered election infrastructure security and resiliency. EIS G GCC: CC: • Enables partners to leverage information sharing; physical/cyber products, resources, and capabilities; and collective expertise. • Is a 27-member group, 24 of which are state and local election officials. • Is led by a five-member Executive Committee (Chair: DHS/NPPD; EAC; a Secretary of State; a state election director; and a local election director) which meets bi-weekly. • Met again in Washington, D.C., on February 15, 2018. 9

  10. Election Infrastructure Subsector CC Private s sector s or stakehold holders f formed t the E Election Infrast astructure S Subse sector C Coordin inat atin ing C Council il ( (EISCC SCC) a and he held ld f first m meeting F Febru ruary 2 2018. . • Led by a five-member Executive Committee. EISCC SCC r respo ponsib sibil ilit itie ies i s include de: • Serve as the primary liaison between the subsector and government on election security and emergency preparedness. • Facilitate information and intelligence sharing. • Coordinate with DHS and the EIS GCC to develop, recommend and review sector-wide plans, procedures. 10

  11. DHS HS W Wor orks W With A A Variety Of State a and Loc Local P Partners DHS w work rks w with p h partners i in all l levels ls o of govern rnment: : 11

  12. Federal Pa Partners DHS w works wit with n nume merous F Fede deral par partners, in including ag agencies in involved in d in election pr processes: • Department of Defense (DoD) Federal Voting Assistance Program (FVAP) • U.S. Election Assistance Commission (EAC) • Federal Bureau of Investigation (FBI) • National Institute of Standards and Technology (NIST) • Office of the Director of National Intelligence (ODNI) 12

  13. Cyber a er and P Physi sical Securi rity Servic vices a and Tools

  14. DHS E Electi tion I Infrastr tructu ture S e Ser ervices DHS offers a broad range of services and programs to help secure election infrastructure. Services and programs are free, and all are voluntary and provided upon request. Contact Cybersecurit ity A y Advisors ( s (CSAs) s) or Pr Protec ective S e Secur ecurity Adviso sors ( s (PSAs As) to identify a CSA or PSA for you, and to discuss how to select, prioritize, and sequence available services and educational programs based on specific needs. • To contact CSAs, email: cyberadvisor@hq.dhs.gov • To contact PSAs, email: NICC@hq.dhs.gov 14

  15. Cybe bersecurity ty Service C e Center ers 24/7 cybersecurity operations centers that maintain close coordination among the private sector, government officials, the intelligence community, and law enforcement to provide situational awareness and incident response, as appropriate. Conta tact t Information For more information on DHS cyber programs, visit www.dhs.gov/cyber For access to the full range of DHS cyber resources, email SLTTCyber@hq.dhs.gov To become an EI-ISAC member, visit https://learn.cisecurity.org/ei-isac-registration 15

  16. Summar Su ary of of DH DHS S Service ces: s: Cyberse secur urity A Assessme ssments s (Sl Slide 1 o 1 of 2) f 2) Needs DH DHS S Servi vices Summa mmary Broadly assess Internet-accessible systems for known vulnerabilities and configuration errors on a persistent basis. Cybe ber H Hygiene S Scan anning As potential issues are identified DHS works with impacted stakeholders to mitigate threats and risks to their systems prior to their exploitation. Iden enti tify a and L Limit t Penetration testing Vulnerabi bili lities • Risk and V Vulnerab abili lity Social engineering • Assessme sment Wireless access discovery • (RVA) Database scanning • Operating system scanning • Measures susceptibility to email attack • Phishing C g Campa paign gn Delivers simulated phishing emails • Assessme sment Quantifies click-rate metrics over a 10-week period • 16

  17. Summar Su ary of of DH DHS S Service ces: s: Cyberse secur urity A Assessme ssments s (Sl Slide 2 o 2 of 2) f 2) Needs DHS S DH Servi vices Summa mmary One-day, onsite engagement conducted on an enterprise- wide basis to give insight on areas of strength and Cybe ber R Resili lience R Review weakness, guidance on increasing organizational (CRR CRR) cybersecurity posture, preparedness, and ongoing investment strategies. Cyber R Ris isk a and IT Secu curity P y Program Assesses activities and practices used by an organization Assessme sment External D al Dependencies to manage risk arising from external dependencies that Manageme ment A Assess ssme ment constitute the information and communication technology service supply chain. Cyber I Infrastructure S Survey y Assesses an organization’s implementation and (CIS (C IS) compliance with more than 80 cybersecurity controls. 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend