cybersecurity
play

Cybersecurity Introductions Skyline Technology Solutions Tom - PowerPoint PPT Presentation

The Why, What, and How of Cybersecurity Introductions Skyline Technology Solutions Tom Burgoon - BD ITS Practice Laura Gomez-Martin Cybersecurity Compliance Advisor Chip Stewart Principal Consultant Mission Secure


  1. The Why, What, and How of Cybersecurity

  2. Introductions • Skyline Technology Solutions • Tom Burgoon - BD ITS Practice • Laura Gomez-Martin – Cybersecurity Compliance Advisor • Chip Stewart – Principal Consultant • Mission Secure • Rick Tiene –VP, Government and Critical Infrastructure

  3. DOT Networks Leased Circuits PSTN & Private APN ITS Assets Cellular Internet Commodity Internet Roadside Internet of things Fixed Wireless Road Side Devices Field Network Trusted Network External Networks

  4. Cybersecurity Quick Primer

  5. Road Side Devices Road Side Devices Field Network Trusted Network External Networks

  6. Field Network Road Side Devices Field Network Trusted Network External Networks

  7. Trusted Network Road Side Devices Field Network Trusted Network External Networks

  8. External Networks Road Side Devices Field Network Trusted Network External Networks

  9. Insider Threats Road Side Devices Field Network Trusted Network External Networks

  10. Security is simple – not easy

  11. What is Cybersecurity • Policy • Detailed Controls and Configurations • Continuous Monitoring • Incident Response

  12. What Cybersecurity is Not • Total Elimination of Risk • One Tool Solution • A Traditional IT Function

  13. Informative Resources • CIS Top 20 • ISO 27001 • NIST SP 800-53R4

  14. Recent Critical Infrastructure Developments 2014: 2013: Executive Framework for Order 13636 Improving Critical Improving Infrastructure Cybersecurity in Cybersecurity Infrastructure v1.0 2014: 2017: Cybersecurity Framework for Enhancement Act Improving Critical Infrastructure Cybersecurity v1.1

  15. Framework for Improving Critical Infrastructure Cybersecurity

  16. Cybersecurity Program for Maryland DoIT

  17. Cybers rsecurity P Pro rogra ram

  18. Research Identify Data and Systems Research and Choose Standard Perform Risk Define acceptable Compare where level of risk, Assessment/Gap you are to end- downtime, data goal Analysis loss Joint Effort and Communication

  19. Design Realistic Identify & Identify Existing and Cost- Prioritize Essential Create Resources Effective Initiatives Roles

  20. Adopt Leadership • Involvement Support in Process Authoritative Power Availability of Documents Education Program

  21. Implementation Actionable Steps • Research new tools • Procure new tools Train Personnel Configure Existing Technology Implement New Technology Ensure New Equipment Meets Standards

  22. Monitor Continuous Incident Evaluation of Continuous Monitoring of Identification Effectiveness Improvement Threats

  23. Incident Response Create Standards and Processes Table-top Exercises Staff to perform Adequate incident coordination, Lessons Learned forensic analysis, and Staffing reverse engineering Cybersecurity Insurance

  24. What does a mature program look like?

  25. Organizations with an Established Program • Audit to check whether personnel, technology, and processes are in line with Program Requirements • Automatic • Manual • Create a compliance division and routinely check status and identify improvements

  26. Where Does My Organization Start? • Where does my organization stand today? • How do I find out if my organization has a program? • Who should I contact?

  27. Review • Why – Risk, • What – Definition and Resources that offer Frameworks • How – Programs take energy, resources, and 24/7 attention

  28. Questions?

Recommend


More recommend