35
Homeland Security Coordinating and Guiding Federal, State, and Private Sector Cybersecurity Initiatives Seán Paul McGurk, Director Control Systems Security U.S. Department of Homeland Security

Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

Embed Size (px)

Citation preview

Page 1: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Coordinating and Guiding Federal, State,

and Private Sector Cybersecurity Initiatives

Seán Paul McGurk, DirectorControl Systems SecurityU.S. Department of Homeland Security

Page 2: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

How do we define Cyberspace?Cyberspace is composed of hundreds of thousands of globally interconnected

computers, servers, routers, switches, and cables that allow the critical infrastructures to work. – It transcends physical, organizational and geopolitical boundaries and thus has

global stakeholders from both the public and private sectors.

It encompasses the logical layer where software applications, Web sites, bulletin boards, chat rooms, e-mail, and electronic exploits (e.g., viruses, Botnets, etc) operate.

While the Internet is part of cyberspace, it also includes the local and wide area networks, as well as the users connected to the Internet.

These networks contain a wealth of information that includes proprietary, classified and private data and operate many of the nation’s critical infrastructure and key resources.

Page 3: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Bush establishes the President’s

Critical Infrastructure

Protection Board

Clinton releases National Plan for

Information Systems

Protection

Clinton signs Year 2000 Readiness and

Responsibility Act

1999

Clinton creates Year 2000 Conversion

Council

U.S. Directives on Cybersecurity

1977

Federal Control Systems Protection

Act introduced.

1984

Reagan signs National Security Decision

Directive 145

1988

Reagan signs Computer

Security Act of 1987

1998

Clinton signs Presidential Decision

Directive 63

2000

Rep. Horn issues cybersecurity report

cards for federal agencies

1996

Clinton creates the President’s

Commission on Critical

Infrastructure Protection

2001 2002

Bush signs Homeland

Security Act of 2002

Bush signs Cybersecurity Research and Development

Act

2003

Bush releases National Strategy to Secure Cyberspace

Bush signs NSPD-54/ HSPD-23 (CNCI)

2008 Feb 2009

May2009

Obama requests 60 day cyber

review

Obama releases Cyberspace Policy

Review and announces creation of WH Cyber Official

Presenter
Presentation Notes
Federal Control Systems Protection Act – The first federal legislation that specifically dealt with computer crimes. National Security Decision Directive 145: Telecommunications and Automated Information Systems Security – The directive was enacted to improve the federal government’s capabilities for securing telecommunications and automated information systems from threats and exploitation. Computer Security Act of 1987 – Enacted to provide the foundation for a comprehensive and consistent approach to computer security throughout the federal government. President’s Commission on Critical Infrastructure Protection (PCCIP) – Established to provide advice to the President for protecting the nation’s critical infrastructure from cyber and physical threats and to propose a national strategy for these efforts. Year 2000 Conversion Council – Established to develop policies for federal agencies to ensure systems transition smoothly from 1999 to 2000. The Council also was responsible for ensuring coordination between the federal government and state, local and tribal governments for addressing the Y2K problem. Presidential Decision Directive 63 – Issued to improve the nation’s ability to protect critical infrastructure “from intentional acts that would significantly diminish the abilities of: the Federal Government to perform essential national security missions and to ensure the general public health and safety; state and local governments to maintain order and to deliver minimum essential public services; the private sector to ensure the orderly functioning of the economy and the delivery of essential telecommunications, energy, financial and transportation services” by the year 2000. [DOJ, White Paper: The Clinton Administration’s Policy on Critical Infrastructure Protection] Year 2000 Readiness and Responsibility Act – National Plan for Information Systems Protection – Requires that the executive branch assess the cyber vulnerabilities of the nation’s critical infrastructures – information and communications, energy, banking and finance, transportation, water supply, emergency services, and public health, as well as those authorities responsible for the continuity of federal, state and local governments. President’s Critical Infrastructure Protection Board – Established by President G.W. Bush to “coordinate cyber-related federal efforts and programs associated with protecting our nation’s critical infrastructures.” [GAO, Critical Infrastructure Protection: Significant Homeland Security Challenges Need to Be Addressed] Homeland Security Act of 2002 – Established the Department of Homeland Security Cybersecurity Research and Development Act – Authorized funding for computer network security R&D and research fellowship programs National Strategy to Secure Cyberspace – Created by the Bush administration with the strategic objectives to (1) prevent cyber attacks against America’s critical infrastructure (2) reduce national vulnerability to cyber attacks and (3) minimize damage and recovery time from cyber attacks that do occur. NSPD 54/ HSPD 23 – Formalized the Comprehensive National Cybersecurity Initiative.
Page 4: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Comprehensive National Cybersecurity Initiative Goals• To establish a front line of defense against today’s immediate

threats by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions.

• To defend against the full spectrum of threats by enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies.

• To strengthen the future cybersecurity environment by expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.

Page 5: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Comprehensive National Cybersecurity InitiativeTrusted Internet Connections

(reduce and consolidate external access points)

Deploy Passive Sensors Across Federal Systems

(Einstein 2)

Pursue Deployment of Intrusion Prevention

System (Einstein 3)

Coordinate and Redirect R&D Efforts

Establish a front line of defense

Connect Current Cyber Centers to Enhance Cyber

Situational Awareness (National Cyber Security Center)

Develop Government Wide Cyber Counterintelligence

Plan

Increase the Security of the Classified Networks

Expand Education

Demonstrate resolve to secure U.S. cyberspace & set conditions for long-term success

Define and Develop Enduring Leap Ahead Technology, Strategies & Programs

Define and Develop Enduring Deterrence

Strategies & Programs

Develop Multi-Pronged Approach for Global Supply Chain Risk

Management

Define the Federal Role for Extending

Cybersecurity into Critical Infrastructure

Domains

Shape the future environment to demonstrate resolve to secure U.S. technological advantage and address new attack and defend vectors

Presenter
Presentation Notes
CNCI was developed to achieve three key objectives: To anticipate cyber threats and technologies; To involve all elements of national power and influence; and To direct the collection, analysis, and dissemination of information related to cyber threats against the United States. The department coordinates six of 12 initiatives, which counters the treats on the federal government’s networks. Specifically, DHS leads (or co-leads) coordinated efforts on: Trusted Internet Connections, which manages federal enterprise’s network as a single network enterprise; Deploying intrusion detection system, passive sensors across the Federal enterprise (EINSTEIN). (3) Pursuing deployment of intrusion prevention systems across the Federal enterprise. (8) Expanding cyber education to build the federal cyber workforce. (11) Developing a multi-pronged approach for global supply chain risk management to protect U.S. Government networks. (12) Project 12 calls for a plan to work with the private sector, which owns and operates most the U.S. critical cyber infrastructure.
Page 6: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Authorities in Cyberspace

Page 7: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

DHS Cybersecurity Organizations

National Protection and Programs Directorate

Cybersecurity and Communications

National Cybersecurity and Communication Integration Center

Department of Homeland Security

National Cybersecurity Center

• Ensures the security, resiliency and reliability of the nation’s cyber and communications infrastructure

• Improves our nation’s readiness for natural disasters in terms of preparedness, response and recovery

• Guards against terrorism • Provides assessments of physical and cyber threats to critical

infrastructure (Intelligence and Analysis Directorate)• Safeguards the payment and financial systems of the U.S. by

investigating crimes involving computer and telecommunications fraud (U.S. Secret Service)

• Coordinates and integrates information across the interagency (.mil, .gov, and .ic domains) to develop strategic reporting as well as mitigation strategies based on identified risks

• Builds and maintains an effective national cyberspace response system

• Implements a cyber-risk management program for protection of critical infrastructure

• Reduces security risks across both physical and cyber infrastructure as well as telecommunications

• Oversees the Departments CNCI efforts

• Provides response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) through:

• Information sharing and coordination • alert, warning and analysis, • response and assistance

Presenter
Presentation Notes
Partnerships Department of Homeland Security – Central to this effort is the collection, protection, evaluation and dissemination of information to the American public, state and local governments and the private sector National Protection and Programs Directorate – Coordinates with federal, state, local and tribal governments as well as the private sector and international partners National Cybersecurity Center – Brings together federal cybersecurity organizations to gain a clear understanding of the overall cybersecurity picture of federal networks Includes: IC-IRC, NTOC, NCIJTF, DC3, JTF-GNO, US-CERT Cybersecurity and Communications – Actively engages the public and private sectors as well as international partners to prepare for prevent, and respond to catastrophic incidents that could degrade or overwhelm strategic assets. National Cybersecurity Division – Works collaboratively with public, private and international entities to secure cyberspace and America’s cyber assets US-CERT – Shares information and collaborates with state and local governments, industry and international partners
Page 8: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Vision

• The NCCIC incorporates the interrelated missions of the following organizations to prevent, protect and respond to threats and incidents affecting the national information and communications infrastructure:

– National Communications System (OMNCS), National Coordinating Center (NCC)– National Cyber Security Division (NCSD), United States Computer Emergency Readiness

Team (US-CERT)– National Cyber Security Division (NCSD), Industrial Control System Cyber Emergency

Response Team (ICS-CERT)– Office of Intelligence and Analysis (I&A) – National Cybersecurity Center (NCSC) – Department and Agency Security Operations Centers– Law Enforcement and Intelligence Community Representatives– Private Sector

• The NCCIC supports the overall cyber mission of DHS by:– Providing support to the decision making process for the Federal Government;– Enabling incident response through shared situational awareness; and – Supporting the missions of components.

Page 9: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Components of the NCCIC

• NCCIC is comprised of organizational components and operational liaisons. –Components refers to DHS organizations that

have a major presence on the NCCIC floor, such as US-CERT, NCC, NCSC, and I&A

–Operational Liaisons refers to representatives from the federal departments and agencies, intelligence community, law enforcement, and private sector that participate in the NCCIC physically and/or virtually.

• While each component maintains their own operating mission, the execution of NCCIC’s mission relies on coordinated operations that contribute to all products and services.

-

Law Enforcement

ISA

Cs

DO

DN

ICC

NCSC

NCC

ICS-CERTI&A

US-CERT

DHS NOC

Intelligence Community

Industry

D/A

SO

C

Page 10: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Cyberspace Threat VectorsThreat Level 1

“Garden Variety”• Inexperienced• Limited funding• Opportunistic behavior• Target known vulnerabilities• Use viruses, worms,

rudimentary trojans, bots• Acting for thrills, bragging

rights• Easily detected

Threat Level 2“Mercenary”

• Higher-order skills• Well-financed• Targeted activity• Target known vulnerabilities• Use viruses, worms, trojans, bots as

means to introduce more sophisticated tools

• Target and exploit valuable data• Detectable, but hard to attribute

Threat Level 3“Nation State”

• Very sophisticated tradecraft• Foreign intel agencies• Very well financed• Target technology as well as info• Use wide range of tradecraft• Establish covert presence on

sensitive networks• Difficult to detect• Supply Interdiction/hardware

implants

Page 11: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Cyber Threat Profile

The Threat• The threats are large and diverse, ranging

from independent, unsophisticated, opportunistic hackers to very technically competent intruders and nation states using state-of-the-art intrusion techniques.

• Malicious actors are increasingly acquiring information technology skills to launch malicious attacks designed to steal information and disrupt, deny access to, degrade or destroy critical information and infrastructure systems.

• Hacker groups already possess the necessary skills to launch a successful cyber attack and may be “talent-for-hire” available to terrorist, criminal organizations, and nation states

• Attackers do not need to be technically savvy as free and commercial automated tools are simplifying attack methods

• Both actors and system vulnerabilities put infrastructure at risk.

Reliance on Cyberspace• Society increasingly relies on technology and

telecommunications to support our economy and business operations and critical functions of government

• Global wireless and cellular usage is on the rise

• To put individual demand in perspective,

• 1.5 billion individuals currently utilize the Internet and this number is growing

• Over 200 billion emails are sent per day

• 8 hours of YouTube are uploaded every minute

Presenter
Presentation Notes
The Implications of the Threat The cyber threats to these systems are very real, growing and evolving. We are not just concerned with the loss of sensitive data, but also with the corruption of that data from false information or altered code. An attack could disrupt critical infrastructure and key resources, jeopardizing the public and private sector’s ability to provide critical services. It could have cascading effects across the country.
Page 12: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Hackers Update Conficker Worm, Evade CountermeasuresGregg Keizer, Computerworld

Tuesday, March 10, 2009 7:17 AM PDT

Computers infected with the Conficker worm are being updated with a new variant that sidesteps an industry effort to sever the link between the worm and its hacker controllers, researchers at Symantec Corp. said Friday.

Each day news stories illustrate that cyber incidents are increasing in frequency, scale, and sophistication

Government computersunder attackGreg Masters February 17, 2009

Records show that cyberattacks on federal computer networks increased 40 percent last year, and that figure is likely low as it reflects on the reported attacks.

Based on data provided to USA Today by US-CERT, unauthorized access to government computers and installations of hostile programs rose from a combined 3,928 incidents in 2007 to 5,444 in 2008.

TJX theft tops 45.6 million card numbersRobert Lemos, SecurityFocus 2007-03-30

More than three months after detecting a breach of its systems, retail giant TJX Companies released this week its best guess at the number of customers whose credit-card information and other data were stolen by online thieves.

Information from at least 45.6 million credit cards had been stolen by unknown attackers who had breached the company's computer transaction processing systems between July 2005 and mid-January 2007, TJX stated in its annual report

Page 13: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Cyber systems are essential national and economic security, and the provision of critical government functions and services

Emergency Services

Banking & Finance

Energy

Transportation

Government

Cyber Infrastructure

Illustrative examples only -- not all inclusive

Cyber Infrastructure, which represents the convergence of information technology and communications systems, is inherent to nearly every aspect of modern life

Presenter
Presentation Notes
As this slide depicts, this is important because cyber systems and networks are fundamental to all facets of daily life. Both your ATM transaction and the Federal Reserve’s fund transfers travel the along the same fiber optic cyber corridor. Your flight reservation and the FAA’s air traffic control system depend upon the same internet And the technology that allows homeowners to adjust the temperature of their residences remotely it’s the same technology that allows power companies to increase or decrease remotely power production based on demand. In other words, we are all interconnected and dependent on cyber systems and networks That is why cybersecurity and addressing the very real threats to cyber systems is a responsibility shared by all.
Page 14: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Rail Transportation

Lessons learned: Do not rely on protocol

obscurity for security

Apply appropriate access controls to all field devices

Event: January 2008, A Polish teenager modifies a TV remote and hacks Lodz Tram system

Impact: 12 people injured, 4 derailments

Specifics: The 14-year-old modified a TV remote control so that it could be used to change track points. Local police said the youngster trespassed in tram depots to gather information needed to build the device. The teenager told police that he modified track setting for a prank.

Page 15: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Traffic Control SystemsEvent: Feb, 2009 Italian authorities investigating unauthorized changes to traffic enforcement systemImpact: Rise of over 1,400 traffic tickets costing > 250K Euros in two month period Specifics: Engineer accused of conspiring with local authorities to rig traffic lights to have shorter yellow light causing spike in camera enforced traffic tickets

Lessons learned:

Do not underestimate the insider threat

Ensure separation of duties and auditing

Page 16: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Smart Grid Systems

Event: July 28, 2009, Duke Energy in Cincinnati OH sends incorrect signal sent to 18,000 air condition units.Impact: 18,000 households participating in Duke Energy's energy saving program for three hours. Specifics: An erroneous message was broadcasted by Duke Energy that shut down 18,000 households for three hours. Human error was the blame for the incident and all units were restored by 8:30 pm.

Lessons learned: Consider all design parameters

when implementing broad control. (load shedding versus peak load conservation)

Identify controls to minimize human error.

Presenter
Presentation Notes
Duke Energy Accidently Shuts Down A/C At 18,000 Homes Wrong Signal Shuts Down Cooling Systems For Three Hours POSTED: 10:27 am EDT July 28, 2009�UPDATED: 12:42 pm EDT July 28, 2009 CINCINNATI -- About 18,000 Duke Energy customers participating in an energy-saving program saved more energy than expected on Monday evening. The customers are part of the Power Manager program that installs a box on air conditioning units that cycles the cooling system off for a few minutes during peak usage times. But Monday night, an incorrect signal was sent to the boxes, a Duke Energy spokeswoman said. Instead of cycling, the boxes shut down the units for three hours. The utility said it had never had a problem like it before and said human error was to blame. All units were back in operation by 8:30 p.m. What is Power Manager®? Power Manager is a voluntary program that pays you for reducing your air conditioning use during times of high demand for electricity.
Page 17: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Smart Meters

Lessons learned: Do not rely on protocol

obscurity for security Apply appropriate access

controls to all field devices Do not underestimate the

financial motivation

Event: October 2009

Impact: Altered “SmartGrid” electric meters discovered

Specifics: Spot checks discovered approx 10% of meters checked were altered by methods that included changing the meter’s software settings.

Meters were altered for various costs, depending on the meter model.

Meters reported less consumption, and reduced electricity bill by one half or three quarters.

Page 18: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

SCADA Server accessed via Internet

Event: January 2010 - Cyber researcher used new search engine “SHODAN” to identify an online link to a utility company’s SCADA system. The system was then accessed using the default user name and passwords

Impact: None, the researcher only “looked around,” but touched nothing

Specifics: Key word internet searching revealed the default information

Lessons learned: Change system default user

names and passwords

Avoid posting system details to public facing devices

Not all public facing system details are obviously visible

Page 19: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Searching for SCADA in SHODAN

Page 20: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

SHODAN devices labeled “SCADA”

Page 21: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

One Device has SCADA Web Login

Page 22: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Searching for Default Vendor Credentials

Page 23: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

User accesses system with ‘ADMIN’ rights

Page 24: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

User accesses system with ‘ADMIN’ rights

Page 25: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

‘Safe Harboring’ using ICS systems Event: Foreign hacker penetrated security at a water filtering plantImpact: The intruder planted malicious software on the industrial control network which remained undetected by the enterprise network security systemsSpecifics: The infection occurred through the Internet and did not seem to be an attack that directly targeted the control system

Lessons learned: Secure remote computers Defense-in-depth strategies,

Firewalls & Intrusion Detection Systems

Critical patches and Anti-virus needs to be applied and updated regularly

Page 26: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Interdependencies between physical and cyber infrastructures can lead to cascading effects in an attack or catastrophic event

Presenter
Presentation Notes
That interdependency is graphically illustrated by this slide. More importantly, this slide shows how the interaction between the cyber infrastructure and the physical infrastructure can lead to potentially disastrous effects if threat actors breach cybersecurity. For example, an internet cyber breach (blue) into the water resources critical infrastructure (red) could lead to dam failure or water treatment plant failures in the physical infrastructure (tan) Likewise, a cyber breach in the control systems (blue) of the energy critical infrastructure (red) could result in power grid failure in the power production physical infrastructure (tan). But these examples do not exist in isolation. Because of the inherent interrelationship between and among infrastructures, each could have potentially cascading effects across other, seemingly unrelated critical and physical infrastructures. For example, flooding caused by a dam failure (tan) could have a dramatic impact on agricultural and food production (red) and the public health sector (red). Likewise a power grid failure caused by a control system cyber breach (blue) would necessarily impact any critical system dependent on electricity such as hospitals (tan)..
Page 27: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

National Cyber Security Division

The National Cyber Security Division (NCSD) is the federal government’s lead agency for assessing, mitigating and responding to cyber risks in collaboration with public and private sectors.MissionTo work collaboratively with public, private, and international partners to secure cyberspace and America’s cyber infrastructure.Goals•Manage cyber risk to the nation and integrate cybersecurity into public and private sector efforts;•Maintain and enhance national cyber response capabilities; and•Build and maintain a world-class organization to advance the nation’s cybersecurity preparedness, and raise awareness across the Nation on cybersecurity.

Presenter
Presentation Notes
At DHS, the lead agency responsible for assessing, responding to and mitigating to cyber threats is the National Cyber Security Division (NCSD). Put simply, NCSD works with public, private and international partners to help secure the nation’s cyberspace and cyber infrastructure. It identifies cyber risks, proposes cyber mitigation and response strategies, promotes situational awareness of cyber threats and challenges and works to ensure that that the nation has the sophisticated and versatile workforce needed to address current and future cyber challenges.
Page 28: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

United States Computer Emergency Readiness Team (US-CERT)

Operational readiness and mitigation: Leads efforts in response to cyber activity for the (non-Department of Defense and Intelligence) Federal Executive Branch cyber infrastructure.

Alert, Warning, and Analysis: Detects, compiles, analyzes and shares information about cyber incidents.

Response and Assistance: Providing timely technical assistance to operators of agency information systems regarding security incidents, including guidance on detecting and handling information security incidents.

The US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) as well as information sharing and collaboration with State and local government, industry and international partners.

Presenter
Presentation Notes
The United States Computer Emergency Readiness Team (US-CERT) is the pointed end of NCSD’s cyber spear. US-CERT is responsible for the operational aspects of NCSD’s mission to help protect federal networks and systems from cyber threats…It leads non-defense related cyber warning, mitigation and response efforts…And provides technical assistance to sister agencies regarding cyber incidents.
Page 29: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)

Presenter
Presentation Notes
The prior slides focused on where we find ourselves today and the emerging threat. This next section looks at what the ICS-CERT is, and the capabilities that it brings to address the situation.
Page 30: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Partnership

Department of Homeland SecurityNational Cyber Security Division

Law Enforcement and First Responder Communities

Private Sector

State and Local GovernmentsFederal Departments and Agencies

Presenter
Presentation Notes
To counter emerging cyber threats, the department relies upon its critical partnerships to counter cybercrime and espionage. Sector-specific planning and coordination are addressed through private sector and government coordi­nating councils that are established for each sector. Sector Coordinating Councils (SCCs) are comprised of private sector representatives. These councils create a structure through which representative groups from all levels of government and the private sector can collaborate or share existing consensus approaches to CI/KR protection.
Page 31: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Developing a Strong Cybersecurity Posture

PUBLIC SECTOR PRIVATE SECTOR

Lacks…• A qualified cyber workforce

• Recruitment and retention of qualified personnel

• A comprehensive training and education curricula for the current cyber workforce

• Enhanced awareness of cyberspace

• Enforcement authority to combat cyber crime and industrial espionage.

• Sufficient information sharing between departments and agencies

• Agreement with the private sector on the way forward

• A common cyber language

Need to increase

collaboration and information

sharing between the public and

private sectors

Lacks…• A comprehensive understanding of

cyber threats and vulnerabilities

• An established relationship with the public sector to determine the way forward

• Sufficient information sharing among private corporations

Presenter
Presentation Notes
It is well known that 80% of our critical infrastructure and key resources (CIKR) are owned and operated by the private sector. In order to maintain the security of our CIKR as a whole, a strong partnership between the public and private sectors is imperative.
Page 32: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Strategy for Securing Control Systems

In 2009, the DHS’ National Cyber Security Division (NCSD) issued the Strategy for Securing Control Systems, which focuses on the vision and elements necessary for coordinating activities to improve control systems security in the nation’s critical infrastructures.

As the lead federal agency involved in industrial control systems cybersecurity for Critical Infrastructure and Key Resources (CIKR), NCSD continues to coordinate security efforts among stakeholders across critical infrastructure sectors.

Page 33: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

Web Based Training “Cyber Security for Control Systems

Engineers and Operators” “Operational Security (OPSEC) for Control

Systems”*Instructor Led Courses

Introduction to Control Systems Security for the Information Technology Professionals

Intermediate Control Systems Security Cyber Security Advanced Training and

WorkshopInternational Training

30 countries have participated Provided basic, intermediate and advanced

training

Education & Training

*IOSS first place award 2008

Page 34: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity

The Way Forward

• Incentivize recruitment and retention of qualified workforce

• Promote/integrate new partnerships within cyber related exercises– E.g. Cyberstorm III

• Improve cyber awareness with state, local and tribal governments

• Increase information sharing between the public and private sector

• Increase information sharing and communications with our international partners

Page 35: Coordinating and Guiding Federal, State, and Private ... · Cyber Counterintelligence Plan . ... \爀屲The department coordinates six of 12 initiatives, which counters the treats

HomelandSecurity