f e brua ry 2018 se c tion me e ting we lc o me ab o a rd
play

F e brua ry 2018 Se c tion Me e ting We lc o me Ab o a rd Say He - PowerPoint PPT Presentation

F e brua ry 2018 Se c tion Me e ting We lc o me Ab o a rd Say He llo to our Ne w Sponsor T ha nk Yo u to All o f Our Spo nso rs! Upc o ming Se c tio n Me e ting s c h 13 th T opic s/ Spe ake r s in De ve lopme nt: Mar F utur e


  1. F e brua ry 2018 Se c tion Me e ting

  2. We lc o me Ab o a rd Say He llo to our Ne w Sponsor

  3. T ha nk Yo u to All o f Our Spo nso rs!

  4. Upc o ming Se c tio n Me e ting s c h 13 th T opic s/ Spe ake r s in De ve lopme nt: Mar F utur e Date s: - April 10 th - E thic s with L APE L S – April o r May Building the F irst - Ma y 8 th - Nic k Sa nds – June “Ste a mship” in Histo ry - June 5 th - Pa ul Gruhn – tb d - July 10 th - Cha mpio n T e c hno lo g ie s – tb d - Aug ust 7 th - Pe tro te c h – tb d - Pro c e ss So lutio ns - tb d

  5. Othe r Upc o ming I SA Ac tivitie s • Distr ic t 7 L e ade r ship Me e ting – April 20-21 – Ga lve sto n, T X – T o pic s o n Ag e nda – Ho w to b ring ne w le a de rship in the lo c a l se c tio ns – Spo nso rship b e st pra c tic e s – to b e pre se nte d b y De a n Bic ke rto n – Using te c hno lo g y suc h a s we b -b a se d me e ting s

  6. Cyb e rse c urity a nd I SA I SA is the de ve lo pe r a nd a pplic a tio ns- fo c use d tho ug ht le a de r b e hind the wo rld’ s o nly c o nse nsus-b a se d industria l c yb e rse c urity sta nda rd. I SA’ s a ppro a c h to the c yb e rse c urity c ha lle ng e is ho listic , b ridg ing the g a p b e twe e n o pe ra tio ns a nd info rma tio n te c hno lo g y; a nd b e twe e n pro c e ss sa fe ty a nd c yb e rse c urity.

  7. Cyb e rse c urity Re so urc e s ISA Cybe r se c ur ity Re sour c e s • – Sta nda rds – T ra ining – Ce rtific a tio n Pro g ra ms – White pa pe rs – Co nfo rmity Asse ssme nt isa.or g – T e c hnic al T opic s – Cybe r se c ur ity

  8. E xe c utive Orde r 13636 Signe d F e br uar y 12, 2013 E xe c utive Orde r 13636 o utline s re spo nsib ilitie s fo r F e de ra l De pa rtme nts a nd Ag e nc ie s to a id in I mpro ving Cr e Cyb e rse c urity. itic al Infr astr uc tur I n summa ry, it a ssig ns the se re spo nsib ilitie s a nd e sta b lishe s the po lic y tha t, “I t is the po lic y o f the Unite d Sta te s to e nha nc e the se c urity a nd re silie nc e o f the Na tio n’ s c r e a nd to ma inta in a c yb e r itic al infr astr uc tur e nviro nme nt tha t e nc o ura g e s e ffic ie nc y, inno va tio n, a nd e c o no mic pro spe rity while pro mo ting sa fe ty, se c urity, b usine ss c o nfide ntia lity, priva c y, a nd c ivil lib e rtie s.” https:/ / www.white ho use .g o v/ the -pre ss-o ffic e / 2013/ 02/ 12/ pre side ntia l- po lic y-dire c tive -c ritic a l-infra struc ture -se c urity-a nd-re sil

  9. 16 Critic a l I nfra struc ture Se c to rs Che mic a l Co mme rc ia l Co mmunic a tio n Critic a l Da ms F a c ilitie s Ma nufa c turing De fe nse E me rg e nc y E ne rg y F ina nc ia l F o o d a nd Ind ustria l Ba se Se rvic e s Se rvic e s Ag ric ulture Go ve rnme nt Wa te r a nd Info rma tio n Nuc le a r Re a c to rs, T ra nspo rta tio n He a lthc a re a nd F a c ilitie s T e c hno lo g y Ma te ria ls a nd Wa ste Wa ste wa te r Pub lic He a lth https:/ / www.dhs.g o v/ c ritic a l-infra struc ture -se c to rs

  10. Wha t is NI ST ? National Institute for Standar ds and T e c hnology F o unde d in 1901, NI ST is a no n-re g ula to ry fe de ra l a g e nc y within the U.S. De par c e . tme nt of Comme r NI ST 's missio n is to pro mo te U.S. inno va tio n a nd industria l c o mpe titive ne ss b y a dva nc ing me a sure me nt sc ie nc e , sta nda rds, a nd te c hno lo g y in wa ys tha t e nha nc e e c o no mic se c urity a nd impro ve o ur q ua lity o f life . NIST Cybe r se c ur ity Mission: T o imple me nt pra c tic a l c yb e rse c urity a nd priva c y thro ug h o utre a c h a nd e ffe c tive a pplic a tio n o f sta nda rds a nd b e st pra c tic e s ne c e ssa ry fo r the U.S. to a do pt c yb e rse c urity https:/ / www.nist.gov/ c a pa b ilitie s.

  11. Wha t is the NI ST F ra me wo rk? NIST F r ame wor k • – E na b le s o rg a niza tio ns to a pply the princ iple s a nd b e st pra c tic e s o f r isk manage me nt to impro ving the se c urity a nd re silie nc e o f c ritic a l infra struc ture . – Pro vide s o r ganizatio n, str uc tur e and c o nsiste nc y to c yb e rse c urity b y a sse mb ling sta nda rds, g uide line s, a nd pra c tic e s tha t a re wo rking e ffe c tive ly in industry to da y. – Co nsists o f thre e pa rts – F ra me wo rk Co re – F ra me wo rk I mple me nta tio n T ie rs – F ra me wo rk Pro file https:/ / www.nist.gov/ c ybe r fr ame wor k

  12. Framework Identify Understanding to manage cybersecurity risk to systems, assets, data, and capabilities Framework Core Protect Safeguards to ensure delivery of critical infrastructure services Framework Implementation Tiers Detect Identify the occurrence of a cybersecurity event Framework Profile Respond Action regarding a detected cybersecurity event Recover Maintain plans for resilience • Restore any capabilities or services •

  13. Functions Func Categ egories Subcateg egories es Informative R e Refer eren ence Framework IDEN ENTI TIFY ID Framework Core PROT OTECT Framework PR Implementation Tiers DE DETECT CT Framework Profile DE RE RESPO POND RS RECOVER RC

  14. Framework Function Categ egory I Iden entifier er Category ID.AM Asset Management IDENTIFY ID.BE Business Environment IDENTIFY PROTECT ID.GV Governance (ID) ID.RA Risk Assessment DETECT ID.RM Risk Management Strategy RESPOND RECOVER

  15. Framework Function Categ egory I Iden entifier er Category PR.AC Access Control IDENTIFY PR.AT Awareness and Training PROTECT PR.DS Data Security PROTECT (PR) Information Protection Processes and PR.IP Procedures DETECT PR.MA Maintenance PR.PT Protective Technology RESPOND RECOVER

  16. Framework Function Categ egory I Iden entifier er Category DE.AE Anomalies and Events IDENTIFY DETECT DE.CM Security Continuous Monitoring (DE) PROTECT DE.DP Detection Processes DETECT RESPOND RECOVER

  17. Framework Function Categ egory I Iden entifier er Category RS.RP Response Planning IDENTIFY RS.CO Communications RESPOND PROTECT RS.AN Analysis (RS) RS.MI Mitigation DETECT RS.IM Improvements RESPOND RECOVER

  18. Framework Function Categ egory I Iden entifier er Category RC.RP Recovery Planning IDENTIFY RECOVER RC.IM Improvements (RC) PROTECT RC.CO Communications DETECT RESPOND RECOVER

  19. Framework Cybersecurity Risks Framework Core Manage Risks Framework Implementation Tiers Framework Profile Risk Partial Adaptive Repeatable Informed Consideration • Risk management practices, threat environment, legal & regulatory req., objectives & constraints

  20. Ri Risk Inte tegrate ted R Risk Ex External Management Management P Program Parti ticipati tion Pro rocess Limited awareness Tier 1 r 1 • Not formalized • Irregular risk management No external collaboration • Reactive Partial ial • Private information • More awareness • Approved practices Risk-informed, processes & Tier 2 r 2 • • Not formalized to interact & Not widely use as procedures • share information Risk I Informed ed policy Adequate resources • Internal sharing • Organization approach • Risk-informed, processes & Tier 3 r 3 • Approved as Policy Collaborate • • procedures defined & implemented Update regularly Receive information Repea eatable • • as intended, and reviewed Knowledge & skills • Risk-informed, processes & • Tier 4 r 4 Continuous procedures for potential events Actively shares information improvement Continuous awareness Adap aptiv ive • Actively •

  21. Framework Alignment of Framework Core and business requirements, risk tolerance & resources Framework Core Establish roadmap to reduce risk aligned with Framework organizational and sector goals Implementation Tiers Framework Profile Describe current and desired state of specific events Action plan to address gaps

  22. 1. Prioritize Create or and Scope improve a 7. Implement 2. Orient Action Plan program 6. Determine, 3. Create Analyze & current profile Prioritize Gaps 5. Create target 4. Conduct Risk profile assessment

  23. Our Gue st Spe a ke rs Matthe w Pe tr auskas Gaby Kor e n Vic e Pre side nt, Ame ric a s Re g io na l Ac c o unt Dire c to r

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend