SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
by
Mike McConnell
mcconnell_mike@bah.com
Sedar Labarre
labarre_sedar@bah.com
David Sulek
sulek_david@bah.com
Marcia McGowan
mcgowan_marcia@bah.com
The Cybersecurity Executive Order
Exploiting Emerging Cyber Technologies and Practices for Collaborative Success
1
The Cybersecurity Executive Order
Exploiting Emerging Cyber Technologies and Practices for Collaborative Success
Executive Order (EO) 13636, “Improving Critical
Infrastructure Cybersecurity,” calls for government to
collaborate more closely with critical infrastructure owners
and operators to strengthen cybersecurity, particularly
by sharing information about cyber threats and jointly
developing a framework of cybersecurity standards and
best practices. Elements of the framework may later be
incorporated into government regulations or voluntarily
adopted by industry. Many owners and operators recognize
the value of these efforts but worry that the EO will result in
burdensome regulation rather than strengthened security.
They are cautiously supportive, waiting to see how the EO
will differ from previous efforts to improve government-
industry collaboration. Others question if the EO goes far
enough, suggesting cybersecurity legislation is required to
make a difference.
At Booz Allen Hamilton, we believe the EO offers reason
for optimism. While it is true that the general concepts
and goals of the EO are similar to earlier initiatives, such
as the 1998 Presidential Decision Directive 63 and the
2003 Homeland Security Presidential Directive 7, cyber
technologies and practices have evolved in significant
ways since those directives were issued. For example,
new continuous monitoring capabilities ensure that
government and industry collect enormous amounts of
data that enhance the value of information sharing. The
development of powerful analytics makes that data even
more valuable because of the potential insights that can be
gleaned by sharing intelligence and data. In addition, cyber
professionals have developed stronger cybersecurity skills
and better understand how to exploit the accumulating
threat and network data. And cyber experts have used their
experience to identify cybersecurity best practices and
create standards and maturity models that can be applied
across critical infrastructure sectors.
These changes offer government and industry opportunities
to strengthen cybersecurity. We have identified five key
steps for exploiting these new technologies and practices to
achieve collaborative success:
•	 Establish flexible, risk-based cybersecurity standards
of practice (such as a Cybersecurity Framework) that
provide a foundation for measuring the growing maturity
of an organization’s security program
•	 Accelerate the adoption of continuous monitoring and
data analytics
•	 Create an information sharing broker (or brokers) to
help government and industry share threat information
efficiently and effectively
•	 Revitalize the public-private partnership based on
shared interests
•	 Explore and develop norms guiding the use of “active
cyber defense”
We don’t discount the challenges of bringing together
a diverse group of critical infrastructure stakeholders;
however, we believe that emerging cyber technologies and
capabilities have created opportunities for collaborative
success that did not exist 15 years ago when government
first initiated "whole-of-government" efforts similar to the
EO. By building on their common interests, government and
industry can build a partnership that grows and matures to
counter cyber threats today and into the future.
2
Introduction
Executive Order (EO) 13636, “Improving Critical
Infrastructure Cybersecurity,” is designed to provide
critical infrastructure owners and operators with
assistance to address cyber threats and manage risks,
but owners and operators are wary. Among its major
goals, the EO calls for government to collaborate more
closely with industry by sharing information about
cyber threats and jointly developing a framework of
cybersecurity standards and best practices. Elements
of the framework may later be incorporated into
government regulations or voluntarily adopted by
industry. Owners and operators recognize the value
of public-private partnership, information sharing,
and security practices, but many worry that the EO
will result in burdensome regulation rather than
strengthened security. Others regard the EO as offering
little new over existing processes for government-
industry collaboration, saying the order has raised but
not resolved previous controversies surrounding how
best to implement cybersecurity protections. Even
supporters view the order as a modest first step that
will require cybersecurity legislation and additional
guidance to make progress. As a result, many are
taking a wait-and-see approach before fully committing
to the new EO.
At Booz Allen, we believe there is much greater reason
for optimism. While it is true that the general concepts
and goals of the EO are similar to earlier initiatives,
such as the 1998 Presidential Decision Directive 63
and the 2003 Homeland Security Presidential Directive
7 (HSPD-7), the cyber environment has evolved in
significant ways since those directives were issued.
For example, the rise and maturing of continuous
monitoring and automated threat-detection capabilities
mean that government and industry are now collecting
enormous amounts of data that enhance the value of
information sharing. The simultaneous development of
powerful analytics makes that data even more valuable,
because of the potential insights that government and
industry can glean by sharing intelligence and data.
At the same time, cyber professionals have developed
stronger cybersecurity skills over the past decade and
better understand how to exploit the accumulating
threat and network data. They have also used their
experience and skills to identify cybersecurity best
practices and create standards and maturity models—
with many already in use by some critical infrastructure
owners and operators—that can now be used across
the critical infrastructure sectors. Although many of
the issues that previously hindered collaboration
still remain, government and industry now have
much greater incentive to find solutions because the
potential value of collaboration is so much greater.
We believe the EO can, in fact, provide a
strong foundation for improving critical
infrastructure cybersecurity.
Finding the right balance in the proposed partnership
and reaching agreement on new processes for
information sharing, the cybersecurity framework,
and other EO provisions will not be easy. The issues
are admittedly complex, and disagreement persists
among stakeholders. Nevertheless, we believe the EO
can, in fact, provide a strong foundation for improving
critical infrastructure cybersecurity—if government and
industry take advantage of new cyber technologies and
practices that create opportunities for collaborative
success. This viewpoint will examine how government
and industry can use the EO to achieve their
cybersecurity goals.
The Cybersecurity Executive Order
The White House issued the EO to counter growing
threats to the nation’s 16 critical infrastructure
sectors from state and non-state actors, hacktivists,
organized crime, extremists, and others. “Repeated
cyber intrusions into critical infrastructure demonstrate
3
1 Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” February 12,
2013, Section 1, Policy.
the need for improved cybersecurity,” the February 12
order states. “The cyber threat to critical infrastructure
continues to grow and represents one of the most
serious national security challenges we must
confront. The national and economic security of the
United States depends on the reliable functioning
of the Nation's critical infrastructure in the face of
such threats.”1
One of the EO’s main goals is to improve government
information sharing with critical infrastructure owners
and operators regarding cyber threats, including attack
signatures and other technical data. The EO directs
the US Department of Homeland Security (DHS),
the Department of Justice, and the Office of the
Director of National Intelligence to produce and share
unclassified and classified cyber threat reports that
identify specific targeted and victim entities. DHS will
expand the Enhanced Cyber Security Initiative to all
critical infrastructure sectors, thereby making classified
cyber threat data and technical information available
to eligible critical infrastructure owners and operators.
DHS will also expand programs that provide security
clearances to private sector employees of critical
infrastructure and bring private sector subject matter
experts into the US federal government.
Another major goal is to develop a Cybersecurity
Framework of standards and best practices for
reducing risk to critical infrastructure. Under the EO,
the National Institute of Standards and Technology
(NIST) will work with the Sector-Specific Agencies
(SSAs), Sector Coordinating Councils (SCCs), and other
stakeholders to develop the Cybersecurity Framework.
NIST officials want owners and operators to actively
participate in this process.
The EO also calls for DHS to establish a voluntary
program for framework adoption by owners and
operators. As part of this program, the SSAs will
work with their respective SCCs to review the
Cybersecurity Framework and develop implementation
guidance to support its voluntary adoption. DHS will
use a similar consultative process to identify the
high-priority critical infrastructure using a risk-based
approach. Finally, DHS and the US Departments of
Treasury and Commerce will recommend incentives
to promote industry’s participation in these efforts.
Overall, the EO emphasizes the importance of
government-industry collaboration in protecting critical
assets, systems, networks, and functions from cyber
attacks, stating, “We can achieve these goals through
a partnership with the owners and operators of critical
infrastructure to improve cybersecurity information
sharing and collaboratively develop and implement risk-
based standards.”2
In tandem with the EO, the White House issued the
complementary Presidential Policy Directive 21 (PPD-
21) on Critical Infrastructure Security and Resilience,
which replaces HSPD-7. The EO and PPD-21 contain
ambitious milestones for implementing the planned
cybersecurity initiatives. For example, within 120 days,
DHS and other named agencies must recommend
2 Executive Order 13636, Section 1, Policy.
4
incentives for obtaining the private sector’s voluntary
participation in the Critical Infrastructure Cybersecurity
Program and adoption of cybersecurity practices. Within
180 days, agencies must develop the baseline data
and system requirements for a framework to facilitate
information exchange among government agencies and
critical infrastructure owners and operators. NIST must
develop a preliminary Cybersecurity Framework within
240 days, and a final framework within a year.
The chief challenge facing government and industry is
finding common ground to achieve meaningful results
in such short timeframes. On the industry side, owners
and operators are concerned that the government will
create and then impose a one-size-fits-all Cybersecurity
Framework. Many prefer instead that each sector
develop for itself the strategy and techniques best
suited to its unique business model and requirements.
Moreover, some sectors have already put in place
rigorous controls and they worry about getting locked
into a framework that complicates rather than
enhances security. But while industry wants to proceed
with caution, government is pressed to move quickly
to meet established deadlines. Consequently, given
the complexity of the issues and the many differing
voices regarding how best to proceed, the danger is
that government and industry will settle on solutions
that do little to change the status quo or substantially
improve cybersecurity in order to keep activities
progressing toward fast-approaching deadlines.
The Changing Cyber Landscape
Many of industry’s questions and concerns are the
same as those that hindered previous efforts to forge
a stronger government-industry partnership. Although
the essential issues have not changed, the cyber
environment in which government and industry operate
has changed in important ways. These changes create
new opportunities for meaningful collaboration:
•	 Continuous Monitoring. Continuous monitoring
uses powerful algorithms to constantly scan for
anomalies, analyze them, and then communicate
them through automatic, immediate warnings
and alerts. By removing the human element,
the automatic warnings significantly improve the
5
speed and effectiveness of responses and provide
decision-makers with information on the current
health of their networks, effectiveness of certain
controls, and areas of risk. In addition, near
real-time monitoring of the threat environment
is enabling organizations to predict and prevent
attacks. Such processes are generating enormous
amounts of data about threats, vulnerabilities, and
other network activities that could provide significant
value if it were shared and then combined and
analyzed with other data within sectors, across
sectors, and across government.
•	 Data Analytics. Powerful analytical tools not
only enable organizations to conduct continuous
monitoring of their own activities, but they also
enable them to sift through volumes of open source
data to uncover timely insights. For example,
intelligence tools can quickly analyze global news
sources, social media feeds, malicious databases,
etc., to enhance situational awareness and identify
rising threats, attack vectors, trends, and other
valuable information. In addition, sophisticated
text analytics, sentiment analysis, and language
processing technologies can provide insight into an
organization’s own unique environment and help
prioritize response activities before threats escalate.
And using modern computational capabilities,
organizations can scale their analytic processes
beyond their own network data to include nearly
limitless amounts of threat data gathered by partner
organizations in government and industry. The data
generated through continuous monitoring and data
analytics provide a powerful incentive for information
sharing and collaboration.
• 	Cybersecurity Human Capital Skills. Data and data
analytics are much more valuable today because
the cyber professionals who work with the data
are so much smarter. Cyber experts have greater
knowledge and expertise in analyzing network data,
spotting trends, and developing analytic programs
and tools than they did a decade ago. And, this
trend is predicted to continue. A recent study
found that “information security is a stable
and growing profession [and] the number of
professionals is projected to continuously grow
more than 11 percent annually over the next
five years.”3 Cyber professionals develop skills
across multiple systems and environments, and
work together in cybersecurity communities and
associations to identify needed skills, share best
practices, and promote the highest standards of
training and certification. Their skills enhance the
value of collaboration.
•	 Cybersecurity Maturity Models. Just as
cybersecurity human capital skills have improved,
so too have the models and approaches that
organizations use to protect their networks and
systems and manage risk. Organizations and
sectors are beginning to embrace cyber risk
management approaches that allow organizations
to ascertain the maturity of an enterprise's
security posture within the context of the business
and, in some cases, across the dimensions of
people, process, and technology. New risk-based
models in both government and industry provide
proven frameworks for measuring, managing, and
systematically maturing cybersecurity, helping
organizations to allocate cyber resources efficiently
while continuously improving security. Proven
maturity models now exist to inform the planned
Cybersecurity Framework.
Keys to Success
These four changes, along with related developments
within the cyber environment, have important
implications for strengthening critical infrastructure
cybersecurity. They not only enhance the potential
benefits of industry-government collaboration—in
sharing information, creating a Cybersecurity
Framework, and other EO activities, but they also make
3 Frost  Sullivan and Booz Allen Hamilton, The 2013 (ISC)2 Global Information Security
Workforce Study, p. 3.
6
those benefits easier to obtain. Equally important, an
understanding of these changes provides insight into
how government and industry can work together to
implement the EO and improve cybersecurity. These
actions are key to collaborative success:
1.	Establish flexible, risk-based cybersecurity
standards of practice (e.g., Cybersecurity
Framework) that provide a foundation
for measuring the growing maturity of an
organization’s security program. The standards
of practice should be flexible to guide strategy
and approach rather than prescribing specific
technologies and solutions. This will give owners
and operators the flexibility to adopt measures that
best suit their sectors and business imperatives,
as well as the agility to adjust quickly to evolving
threats, vulnerabilities, and risks. The standards
of practice should be risk-based to guide the
effective allocation of resources. It is impossible for
organizations to protect all assets, systems, and
functions, particularly when the threat landscape
is constantly evolving. Consequently, rather than
relying solely on checklists of required technologies
or references to national and international
standards, a risk-based approach will be informed
by business priorities and tied to overall enterprise
risk. And, they will use quantitative measures and
controls to assess risk and allocate resources
proactively to mitigate that risk.
	 A risk-based approach also supports a maturity-
based framework that defines the expected security
practices for a given maturity level. This enables
managers to readily ascertain the maturity of an
enterprise’s cybersecurity posture across the
dimensions of people, processes, and technology,
and then to develop custom-tailored solutions to
improve maturity and mitigate risk. Additionally,
a risk-based approach lends itself to repeatable
measures, thus enabling the organizations to
assess the effectiveness of current security controls
against identified threats (again, across multiple
dimensions) as they relate to business goals,
objectives, and risk tolerance.
	 In addition to being flexible and adaptive to the
individual requirements of each sector, the new
standards of practice should also be broad enough
to incorporate the entire cyber ecosystem, thus
recognizing the wider connections among the public-,
private-, and civil communities within the ecosystem.
In this way, the risk-based approach will include
enterprise-wide, sector-wide, and ecosystem risks,
as opposed to traditional models that focus narrowly
on system risks. Finally, the standards of practice
can provide a foundation for developing agreed-upon
international cybersecurity standards, which would
eliminate duplicative and conflicting requirements
across multiple countries.
	 Overall, the standards of practice embody a
common understanding of risk from the perspective
of multiple stakeholders and provide a basis for
determining how effectively a cybersecurity program
is protecting the business, as opposed to merely
protecting information technology systems.
The standards of practice can provide a
foundation for developing agreed-upon
international cybersecurity standards, which
would eliminate duplicative and conflicting
requirements across multiple countries.
	 A focus on risk will also help organizations visualize
and prepare for the full spectrum of cyber threats.
It enables organizations to respond with agility to
changing threats and incorporate new strategies,
technologies, and approaches into the framework.
Moreover, a framework of standards of practice
will have the ability to “learn” and adapt to
an evolving cyber landscape. In this way, the
7
community avoids both a one-size-fits-all approach
and a strict regulatory regime, which tends to create
a focus on checklists and compliance rather than
genuine security.
2.	Accelerate the adoption of continuous monitoring
and data analytics. Government and industry
already have access to enormous amounts of data
related to the protection of critical infrastructure, but
they currently lack the capability to fully process and
analyze this data to address complex cybersecurity
challenges. Organizations can improve their analytic
capabilities by tapping into emerging cloud-based
analytics. Such capabilities would enhance
significantly the value of information sharing among
stakeholders because they would be able to quickly
analyze data and respond to threats. Similarly,
continuous monitoring capabilities would generate
even more data regarding the health of networks
within a sector and rapid responses based on data,
as opposed to fear or premonitions about potential
threats. While it is true that an individual sector
could create these capabilities on its own, sharing
capabilities and information across sectors, as well
as across government agencies, provides much
greater value. This is the goal that government and
industry should be striving for, and federal initiatives
such as the Big Data Research and Development
Initiative, Digital Government Strategy, and the
Cloud First Strategy directly support a movement
in this direction. Agencies that have embraced
these efforts are building the capacity to more
effectively monitor their networks and exploit
cybersecurity data.
3.	Create an information-sharing broker (or brokers).
Both government and industry need help sharing
information efficiently and effectively. The owners
and operators want data that can help them
address their cybersecurity challenges, but they do
not have the resources to sift through mountains
of information unrelated to the threats they face.
They need information that is delivered in a way
that helps them understand why the information
is relevant to businesses within their sector and
how they can use it. However, the government
agencies that collect this information do not have
the resources to create this context—that is,
address these questions—for each stakeholder. An
information broker could provide these services for
both government and industry.
	 An information broker could take many forms and
serve a number of essential functions. For example,
the broker could serve as a “trusted aggregator” of
threat data with the expertise to address privacy,
security, and other issues that often hinder data
sharing. It could also provide “risk ratings,”
evaluating the level of risk that a reported threat
posed to the company (or sector) receiving the
report. Such a broker would refine and sharpen
data to reduce substantially the friction in data
sharing processes, thus making the data easier for
government to share and more valuable for industry
to receive. And because the information-sharing
8
4 Office of the Press Secretary, “Executive Order on Improving Critical Infrastructure
Cybersecurity,” February 12, 2013.
broker is focused on providing this service, it would
continuously improve its own capabilities and the
value of the data as it flows between government
and industry.
4.	Revitalize the public-private partnership based on
shared interests. When issuing the EO, the White
House said, “The Executive Order strengthens
the US Government’s partnership with critical
infrastructure owners and operators to address
cyber threats.”4 However, many in industry are
skeptical of the term “partnership,” uncertain of
its precise meaning and wary of its implications for
moving forward. Consequently, government
and industry should use the EO and PPD-21
as an opportunity to clearly define roles,
responsibilities, and processes for collaboration
among major stakeholders.
	 The starting place is finding common ground.
Too often, discussions focus on the unique
requirements or issues separating stakeholders,
and they lose sight of the overlapping vital interests
that have brought them together. For example, both
government and industry have a shared interest
in ensuring that networks are up and running at
all times. All agree on the value of continuous
monitoring in protecting networks and on the value
of sharing threat data derived from continuous
monitoring and other sources. Most would probably
agree on the value of creating a robust framework
that could be applied consistently across all
sectors. These and other shared interests provide
opportunities for collaboration and leadership.
	 An approach that focuses on common interests also
helps to shape the adoption of key components of
the EO. For example, in developing a Cybersecurity
Framework, government and industry will want to
create a framework at a high enough conceptual
level to address the requirements of all sectors.
Moreover, the framework must be flexible to adapt
to both a changing cyber environment and a more
mature understanding of common interests.
	 This approach also suggests that the current
partnership model should be expanded to include
the civil sector—that is, cyber and risk management
experts from academia, think tanks, and others
among the general public—because government
and industry also have shared interests with the
civil sector. The civil society has always played
an important role in developing and shaping
the Internet, and its members can contribute
many useful ideas, as well as valuable data and
intelligence necessary to predict, prevent, and
respond to cyber threats. By viewing the cyber
ecosystem as a collection of communities,
rather than a limited number of sectors, the EO can
strengthen both the partnership among stakeholders
and the security of critical infrastructure. In fact,
this is how cyber adversaries come together and
operate: As communities with similar interests
that share tactics and resources. A strong public-
private-civil sector partnership can build an
effective network to defeat the adversary's network.
9
Each partner, through data analytics and continuous
monitoring, has richer data to inform collaborative
efforts and determine what needs to be done to
address systemic risks, which have the potential to
adversely impact all.
	 A new type of leadership is needed to galvanize
strategic connectivity and unity of effort among
these diverse partners. The National Preparedness
Leadership Initiative (NPLI) at Harvard developed
a framework and practice around meta-
leadership, which offers insight into the leadership
skills required to foster collaboration among
interdependent entities in the pursuit of shared
goals. NPLI characterizes meta-leaders as those who
lead advances down into their own group, but who
also lead up to gain their leaders’ support. Although
team players, meta-leaders are not afraid to speak
“truth to power,” if necessary, to those more senior.
They also lead across agencies, extending their
influence among stakeholder organizations, and
they develop situational awareness to create a path
forward, often in the face of incomplete information.
Meta-leaders think beyond personal, bureaucratic,
or business interests to achieve a higher purpose.
They recognize that optimizing effectiveness and
achieving high performance demand a spirit of
collaboration, combined with tangible mechanisms
that activate collaboration and partnership.
Meta-leaders think beyond personal,
bureaucratic, or business interests to achieve a
higher purpose.
	 A partnership forged on shared interests and
guided by meta-leadership will create a stronger
Cybersecurity Framework, develop more effective
information sharing processes, and implement
more meaningful changes to strengthen critical
infrastructure cybersecurity. And these efforts will, in
turn, strengthen the partnership.
5.	Explore and develop norms guiding the use of
“active cyber defense.” Private sector organizations
are developing the capability to identify more
precisely the source of cyber attacks using honey
pots to attract and study threats and advanced
forensics to track down attackers. The ability
to identify attackers provides an opportunity for
organizations to go beyond simply preventing or
deterring attacks to actually striking back at an
attacker’s networks and systems. An organization
might engage in active cyber defense through
collective action with other sector members or by
turning to other communities of interest to address
the threat. Such action might be especially tempting
if the government were seen as unable or unwilling
to protect the organization.
	 The concept and potential use of active cyber
defense is another area of compelling shared
interest between government and industry.
Employing active cyber defenses against attackers is
already being widely discussed among cybersecurity
professionals as an option, given the severity of
the threats and the risks they pose. However, such
activities could create a “Wild West” environment
of vigilantism, attacks on innocent parties, and
escalating attacks that draw the US government
into conflict, potentially beyond cyberspace.
Consequently, as government and industry
collaborate on sharing information and building
security frameworks, they also should address this
emerging area of cyber policy and strategy.
10
Conclusion
We are optimistic that the United States can
strengthen critical infrastructure cybersecurity through
a government-industry partnership that builds a
robust Cybersecurity Framework, shares threat
data, and collaborates on achieving national cyber
goals. Although we don’t discount the challenges
of bringing together such large and diverse
groups of stakeholders, we believe that emerging
cyber technologies and capabilities have created
opportunities for success that did not exist 15
years ago when government first initiated whole of
government efforts similar to the EO. In particular,
continuous monitoring, data analytics, a more
expert cybersecurity workforce, and a maturing of
cybersecurity standards and models provide a much
stronger foundation for collaboration. The potential
gains resulting from partnership are significantly
greater; and, if efforts fail, the potential damage to
the nation’s economy and security is significantly
greater as well. These two facts provide compelling
incentive for stakeholders to work together to improve
critical infrastructure cybersecurity. By building on their
common interests, government and industry can create
a partnership that grows and matures to counter cyber
threats today and into the future.
11
Contact Information
12
Mike McConnell
Vice Chairman
mcconnell_mike@bah.com
703-984-1812
Sedar Labarre
Principal
labarre_sedar@bah.com
202-346-9201
David Sulek
Principal
sulek_david@bah.com
703-984-0798
Marcia McGowan
Senior Associate
mcgowan_marcia@bah.com
703-984-3715
About Booz Allen
To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton
publications, visit www.boozallen.com.
Booz Allen Hamilton has been at the forefront of
strategy and technology consulting for nearly a
century. Today, Booz Allen is a leading provider of
management and technology consulting services
to the US government in defense, intelligence, and
civil markets, and to major corporations, institutions,
and not-for-profit organizations. In the commercial
sector, the firm focuses on leveraging its existing
expertise for clients in the financial services,
healthcare, and energy markets, and to international
clients in the Middle East. Booz Allen offers clients
deep functional knowledge spanning strategy and
organization, engineering and operations, technology,
and analytics—which it combines with specialized
expertise in clients’ mission and domain areas to
help solve their toughest problems.
The firm’s management consulting heritage is
the basis for its unique collaborative culture and
operating model, enabling Booz Allen to anticipate
needs and opportunities, rapidly deploy talent and
resources, and deliver enduring results. By combining
a consultant’s problem-solving orientation with deep
technical knowledge and strong execution, Booz Allen
helps clients achieve success in their most critical
missions—as evidenced by the firm’s many client
relationships that span decades. Booz Allen
helps shape thinking and prepare for future
developments in areas of national importance,
including cybersecurity, homeland security, healthcare,
and information technology.
Booz Allen is headquartered in McLean, Virginia,
employs approximately 25,000 people, and had
revenue of $5.86 billion for the 12 months ended
March 31, 2012. For over a decade, Booz Allen’s
high standing as a business and an employer has
been recognized by dozens of organizations and
publications, including Fortune, Working Mother,
G.I. Jobs, and DiversityInc. More information is
available at www.boozallen.com. (NYSE: BAH)
13
www.boozallen.com
The most complete, recent list of offices and their addresses and telephone numbers can be found on
www.boozallen.com
Principal Offices
Huntsville, Alabama
Montgomery, Alabama
Sierra Vista, Arizona
Los Angeles, California
San Diego, California
San Francisco, California
Colorado Springs, Colorado
Denver, Colorado
District of Columbia
Pensacola, Florida
Sarasota, Florida
Tampa, Florida
Atlanta, Georgia
Honolulu, Hawaii
O’Fallon, Illinois
Indianapolis, Indiana
Leavenworth, Kansas
Radcliff, Kentucky
Aberdeen, Maryland
Annapolis Junction, Maryland
Lexington Park, Maryland
Linthicum, Maryland
Rockville, Maryland
Troy, Michigan
Kansas City, Missouri
Omaha, Nebraska
Red Bank, New Jersey
New York, New York
Rome, New York
Fayetteville, North Carolina
Cleveland, Ohio
Dayton, Ohio
Philadelphia, Pennsylvania
Charleston, South Carolina
Houston, Texas
San Antonio, Texas
Abu Dhabi, United Arab Emirates
Alexandria, Virginia
Arlington, Virginia
Chantilly, Virginia
Charlottesville, Virginia
Falls Church, Virginia
Herndon, Virginia
McLean, Virginia
Norfolk, Virginia
Stafford, Virginia
Seattle, Washington
©2013 Booz Allen Hamilton Inc.
BA13-051

Más contenido relacionado

La actualidad más candente

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? N-iX
 
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...Alexander Major
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceMunich Re
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019Ulf Mattsson
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Valdes Nzalli
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 

La actualidad más candente (20)

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing?
 
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...
Another Prologue to Cybersecurity Regulations: CUI - What Contractors Need to...
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 

Destacado

The Defense Industry Under Attack
The Defense Industry Under AttackThe Defense Industry Under Attack
The Defense Industry Under AttackBooz Allen Hamilton
 
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Booz Allen Hamilton
 
What's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InWhat's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InBooz Allen Hamilton
 
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...Booz Allen Hamilton
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Supply Chain Data Standards in Healthcare
Supply Chain Data Standards in HealthcareSupply Chain Data Standards in Healthcare
Supply Chain Data Standards in HealthcareBooz Allen Hamilton
 
RightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyRightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyBooz Allen Hamilton
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationBooz Allen Hamilton
 
Re-Imagined Infrastructure System: US 2040 Economy
Re-Imagined Infrastructure System: US 2040 EconomyRe-Imagined Infrastructure System: US 2040 Economy
Re-Imagined Infrastructure System: US 2040 EconomyBooz Allen Hamilton
 
Rethinking Mega-Region Air Travel
Rethinking Mega-Region Air TravelRethinking Mega-Region Air Travel
Rethinking Mega-Region Air TravelBooz Allen Hamilton
 

Destacado (20)

The Defense Industry Under Attack
The Defense Industry Under AttackThe Defense Industry Under Attack
The Defense Industry Under Attack
 
Technology Injection
Technology InjectionTechnology Injection
Technology Injection
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
 
Mission Readiness
Mission ReadinessMission Readiness
Mission Readiness
 
What's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh InWhat's Ahead for EHRs: Experts Weigh In
What's Ahead for EHRs: Experts Weigh In
 
3-D Program Management
3-D Program Management3-D Program Management
3-D Program Management
 
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...
Affidavit of Eligibility and Release Associated with the Degas/Cassatt Like t...
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Dynamic Defense
Dynamic DefenseDynamic Defense
Dynamic Defense
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Supply Chain Data Standards in Healthcare
Supply Chain Data Standards in HealthcareSupply Chain Data Standards in Healthcare
Supply Chain Data Standards in Healthcare
 
Polaris Product Fact Sheet
Polaris Product Fact SheetPolaris Product Fact Sheet
Polaris Product Fact Sheet
 
Reform Playbook
Reform PlaybookReform Playbook
Reform Playbook
 
RightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyRightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT Efficiency
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Re-Imagined Infrastructure System: US 2040 Economy
Re-Imagined Infrastructure System: US 2040 EconomyRe-Imagined Infrastructure System: US 2040 Economy
Re-Imagined Infrastructure System: US 2040 Economy
 
Rethinking Mega-Region Air Travel
Rethinking Mega-Region Air TravelRethinking Mega-Region Air Travel
Rethinking Mega-Region Air Travel
 
Bah risk-ecosystem-survey[1]
Bah risk-ecosystem-survey[1]Bah risk-ecosystem-survey[1]
Bah risk-ecosystem-survey[1]
 

Similar a The Cybersecurity Executive Order

Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfaccacloud
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessCXT Group
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
Information security governance framework
Information security governance frameworkInformation security governance framework
Information security governance frameworkMing-Chang (Bright) Wu
 
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
Running head IT SECURITY POLICYIT SECURITY POLICY              .docxRunning head IT SECURITY POLICYIT SECURITY POLICY              .docx
Running head IT SECURITY POLICYIT SECURITY POLICY .docxcharisellington63520
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 

Similar a The Cybersecurity Executive Order (20)

Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Data Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdfData Privacy in the Cloud.pdf
Data Privacy in the Cloud.pdf
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Information security governance framework
Information security governance frameworkInformation security governance framework
Information security governance framework
 
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
Running head IT SECURITY POLICYIT SECURITY POLICY              .docxRunning head IT SECURITY POLICYIT SECURITY POLICY              .docx
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 

Más de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 

Más de Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Último

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

The Cybersecurity Executive Order

  • 1. by Mike McConnell mcconnell_mike@bah.com Sedar Labarre labarre_sedar@bah.com David Sulek sulek_david@bah.com Marcia McGowan mcgowan_marcia@bah.com The Cybersecurity Executive Order Exploiting Emerging Cyber Technologies and Practices for Collaborative Success
  • 2.
  • 3. 1 The Cybersecurity Executive Order Exploiting Emerging Cyber Technologies and Practices for Collaborative Success Executive Order (EO) 13636, “Improving Critical Infrastructure Cybersecurity,” calls for government to collaborate more closely with critical infrastructure owners and operators to strengthen cybersecurity, particularly by sharing information about cyber threats and jointly developing a framework of cybersecurity standards and best practices. Elements of the framework may later be incorporated into government regulations or voluntarily adopted by industry. Many owners and operators recognize the value of these efforts but worry that the EO will result in burdensome regulation rather than strengthened security. They are cautiously supportive, waiting to see how the EO will differ from previous efforts to improve government- industry collaboration. Others question if the EO goes far enough, suggesting cybersecurity legislation is required to make a difference. At Booz Allen Hamilton, we believe the EO offers reason for optimism. While it is true that the general concepts and goals of the EO are similar to earlier initiatives, such as the 1998 Presidential Decision Directive 63 and the 2003 Homeland Security Presidential Directive 7, cyber technologies and practices have evolved in significant ways since those directives were issued. For example, new continuous monitoring capabilities ensure that government and industry collect enormous amounts of data that enhance the value of information sharing. The development of powerful analytics makes that data even more valuable because of the potential insights that can be gleaned by sharing intelligence and data. In addition, cyber professionals have developed stronger cybersecurity skills and better understand how to exploit the accumulating threat and network data. And cyber experts have used their experience to identify cybersecurity best practices and create standards and maturity models that can be applied across critical infrastructure sectors. These changes offer government and industry opportunities to strengthen cybersecurity. We have identified five key steps for exploiting these new technologies and practices to achieve collaborative success: • Establish flexible, risk-based cybersecurity standards of practice (such as a Cybersecurity Framework) that provide a foundation for measuring the growing maturity of an organization’s security program • Accelerate the adoption of continuous monitoring and data analytics • Create an information sharing broker (or brokers) to help government and industry share threat information efficiently and effectively • Revitalize the public-private partnership based on shared interests • Explore and develop norms guiding the use of “active cyber defense” We don’t discount the challenges of bringing together a diverse group of critical infrastructure stakeholders; however, we believe that emerging cyber technologies and capabilities have created opportunities for collaborative success that did not exist 15 years ago when government first initiated "whole-of-government" efforts similar to the EO. By building on their common interests, government and industry can build a partnership that grows and matures to counter cyber threats today and into the future.
  • 4. 2 Introduction Executive Order (EO) 13636, “Improving Critical Infrastructure Cybersecurity,” is designed to provide critical infrastructure owners and operators with assistance to address cyber threats and manage risks, but owners and operators are wary. Among its major goals, the EO calls for government to collaborate more closely with industry by sharing information about cyber threats and jointly developing a framework of cybersecurity standards and best practices. Elements of the framework may later be incorporated into government regulations or voluntarily adopted by industry. Owners and operators recognize the value of public-private partnership, information sharing, and security practices, but many worry that the EO will result in burdensome regulation rather than strengthened security. Others regard the EO as offering little new over existing processes for government- industry collaboration, saying the order has raised but not resolved previous controversies surrounding how best to implement cybersecurity protections. Even supporters view the order as a modest first step that will require cybersecurity legislation and additional guidance to make progress. As a result, many are taking a wait-and-see approach before fully committing to the new EO. At Booz Allen, we believe there is much greater reason for optimism. While it is true that the general concepts and goals of the EO are similar to earlier initiatives, such as the 1998 Presidential Decision Directive 63 and the 2003 Homeland Security Presidential Directive 7 (HSPD-7), the cyber environment has evolved in significant ways since those directives were issued. For example, the rise and maturing of continuous monitoring and automated threat-detection capabilities mean that government and industry are now collecting enormous amounts of data that enhance the value of information sharing. The simultaneous development of powerful analytics makes that data even more valuable, because of the potential insights that government and industry can glean by sharing intelligence and data. At the same time, cyber professionals have developed stronger cybersecurity skills over the past decade and better understand how to exploit the accumulating threat and network data. They have also used their experience and skills to identify cybersecurity best practices and create standards and maturity models— with many already in use by some critical infrastructure owners and operators—that can now be used across the critical infrastructure sectors. Although many of the issues that previously hindered collaboration still remain, government and industry now have much greater incentive to find solutions because the potential value of collaboration is so much greater. We believe the EO can, in fact, provide a strong foundation for improving critical infrastructure cybersecurity. Finding the right balance in the proposed partnership and reaching agreement on new processes for information sharing, the cybersecurity framework, and other EO provisions will not be easy. The issues are admittedly complex, and disagreement persists among stakeholders. Nevertheless, we believe the EO can, in fact, provide a strong foundation for improving critical infrastructure cybersecurity—if government and industry take advantage of new cyber technologies and practices that create opportunities for collaborative success. This viewpoint will examine how government and industry can use the EO to achieve their cybersecurity goals. The Cybersecurity Executive Order The White House issued the EO to counter growing threats to the nation’s 16 critical infrastructure sectors from state and non-state actors, hacktivists, organized crime, extremists, and others. “Repeated cyber intrusions into critical infrastructure demonstrate
  • 5. 3 1 Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” February 12, 2013, Section 1, Policy. the need for improved cybersecurity,” the February 12 order states. “The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends on the reliable functioning of the Nation's critical infrastructure in the face of such threats.”1 One of the EO’s main goals is to improve government information sharing with critical infrastructure owners and operators regarding cyber threats, including attack signatures and other technical data. The EO directs the US Department of Homeland Security (DHS), the Department of Justice, and the Office of the Director of National Intelligence to produce and share unclassified and classified cyber threat reports that identify specific targeted and victim entities. DHS will expand the Enhanced Cyber Security Initiative to all critical infrastructure sectors, thereby making classified cyber threat data and technical information available to eligible critical infrastructure owners and operators. DHS will also expand programs that provide security clearances to private sector employees of critical infrastructure and bring private sector subject matter experts into the US federal government. Another major goal is to develop a Cybersecurity Framework of standards and best practices for reducing risk to critical infrastructure. Under the EO, the National Institute of Standards and Technology (NIST) will work with the Sector-Specific Agencies (SSAs), Sector Coordinating Councils (SCCs), and other stakeholders to develop the Cybersecurity Framework. NIST officials want owners and operators to actively participate in this process. The EO also calls for DHS to establish a voluntary program for framework adoption by owners and operators. As part of this program, the SSAs will work with their respective SCCs to review the Cybersecurity Framework and develop implementation guidance to support its voluntary adoption. DHS will use a similar consultative process to identify the high-priority critical infrastructure using a risk-based approach. Finally, DHS and the US Departments of Treasury and Commerce will recommend incentives to promote industry’s participation in these efforts. Overall, the EO emphasizes the importance of government-industry collaboration in protecting critical assets, systems, networks, and functions from cyber attacks, stating, “We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk- based standards.”2 In tandem with the EO, the White House issued the complementary Presidential Policy Directive 21 (PPD- 21) on Critical Infrastructure Security and Resilience, which replaces HSPD-7. The EO and PPD-21 contain ambitious milestones for implementing the planned cybersecurity initiatives. For example, within 120 days, DHS and other named agencies must recommend 2 Executive Order 13636, Section 1, Policy.
  • 6. 4 incentives for obtaining the private sector’s voluntary participation in the Critical Infrastructure Cybersecurity Program and adoption of cybersecurity practices. Within 180 days, agencies must develop the baseline data and system requirements for a framework to facilitate information exchange among government agencies and critical infrastructure owners and operators. NIST must develop a preliminary Cybersecurity Framework within 240 days, and a final framework within a year. The chief challenge facing government and industry is finding common ground to achieve meaningful results in such short timeframes. On the industry side, owners and operators are concerned that the government will create and then impose a one-size-fits-all Cybersecurity Framework. Many prefer instead that each sector develop for itself the strategy and techniques best suited to its unique business model and requirements. Moreover, some sectors have already put in place rigorous controls and they worry about getting locked into a framework that complicates rather than enhances security. But while industry wants to proceed with caution, government is pressed to move quickly to meet established deadlines. Consequently, given the complexity of the issues and the many differing voices regarding how best to proceed, the danger is that government and industry will settle on solutions that do little to change the status quo or substantially improve cybersecurity in order to keep activities progressing toward fast-approaching deadlines. The Changing Cyber Landscape Many of industry’s questions and concerns are the same as those that hindered previous efforts to forge a stronger government-industry partnership. Although the essential issues have not changed, the cyber environment in which government and industry operate has changed in important ways. These changes create new opportunities for meaningful collaboration: • Continuous Monitoring. Continuous monitoring uses powerful algorithms to constantly scan for anomalies, analyze them, and then communicate them through automatic, immediate warnings and alerts. By removing the human element, the automatic warnings significantly improve the
  • 7. 5 speed and effectiveness of responses and provide decision-makers with information on the current health of their networks, effectiveness of certain controls, and areas of risk. In addition, near real-time monitoring of the threat environment is enabling organizations to predict and prevent attacks. Such processes are generating enormous amounts of data about threats, vulnerabilities, and other network activities that could provide significant value if it were shared and then combined and analyzed with other data within sectors, across sectors, and across government. • Data Analytics. Powerful analytical tools not only enable organizations to conduct continuous monitoring of their own activities, but they also enable them to sift through volumes of open source data to uncover timely insights. For example, intelligence tools can quickly analyze global news sources, social media feeds, malicious databases, etc., to enhance situational awareness and identify rising threats, attack vectors, trends, and other valuable information. In addition, sophisticated text analytics, sentiment analysis, and language processing technologies can provide insight into an organization’s own unique environment and help prioritize response activities before threats escalate. And using modern computational capabilities, organizations can scale their analytic processes beyond their own network data to include nearly limitless amounts of threat data gathered by partner organizations in government and industry. The data generated through continuous monitoring and data analytics provide a powerful incentive for information sharing and collaboration. • Cybersecurity Human Capital Skills. Data and data analytics are much more valuable today because the cyber professionals who work with the data are so much smarter. Cyber experts have greater knowledge and expertise in analyzing network data, spotting trends, and developing analytic programs and tools than they did a decade ago. And, this trend is predicted to continue. A recent study found that “information security is a stable and growing profession [and] the number of professionals is projected to continuously grow more than 11 percent annually over the next five years.”3 Cyber professionals develop skills across multiple systems and environments, and work together in cybersecurity communities and associations to identify needed skills, share best practices, and promote the highest standards of training and certification. Their skills enhance the value of collaboration. • Cybersecurity Maturity Models. Just as cybersecurity human capital skills have improved, so too have the models and approaches that organizations use to protect their networks and systems and manage risk. Organizations and sectors are beginning to embrace cyber risk management approaches that allow organizations to ascertain the maturity of an enterprise's security posture within the context of the business and, in some cases, across the dimensions of people, process, and technology. New risk-based models in both government and industry provide proven frameworks for measuring, managing, and systematically maturing cybersecurity, helping organizations to allocate cyber resources efficiently while continuously improving security. Proven maturity models now exist to inform the planned Cybersecurity Framework. Keys to Success These four changes, along with related developments within the cyber environment, have important implications for strengthening critical infrastructure cybersecurity. They not only enhance the potential benefits of industry-government collaboration—in sharing information, creating a Cybersecurity Framework, and other EO activities, but they also make 3 Frost Sullivan and Booz Allen Hamilton, The 2013 (ISC)2 Global Information Security Workforce Study, p. 3.
  • 8. 6 those benefits easier to obtain. Equally important, an understanding of these changes provides insight into how government and industry can work together to implement the EO and improve cybersecurity. These actions are key to collaborative success: 1. Establish flexible, risk-based cybersecurity standards of practice (e.g., Cybersecurity Framework) that provide a foundation for measuring the growing maturity of an organization’s security program. The standards of practice should be flexible to guide strategy and approach rather than prescribing specific technologies and solutions. This will give owners and operators the flexibility to adopt measures that best suit their sectors and business imperatives, as well as the agility to adjust quickly to evolving threats, vulnerabilities, and risks. The standards of practice should be risk-based to guide the effective allocation of resources. It is impossible for organizations to protect all assets, systems, and functions, particularly when the threat landscape is constantly evolving. Consequently, rather than relying solely on checklists of required technologies or references to national and international standards, a risk-based approach will be informed by business priorities and tied to overall enterprise risk. And, they will use quantitative measures and controls to assess risk and allocate resources proactively to mitigate that risk. A risk-based approach also supports a maturity- based framework that defines the expected security practices for a given maturity level. This enables managers to readily ascertain the maturity of an enterprise’s cybersecurity posture across the dimensions of people, processes, and technology, and then to develop custom-tailored solutions to improve maturity and mitigate risk. Additionally, a risk-based approach lends itself to repeatable measures, thus enabling the organizations to assess the effectiveness of current security controls against identified threats (again, across multiple dimensions) as they relate to business goals, objectives, and risk tolerance. In addition to being flexible and adaptive to the individual requirements of each sector, the new standards of practice should also be broad enough to incorporate the entire cyber ecosystem, thus recognizing the wider connections among the public-, private-, and civil communities within the ecosystem. In this way, the risk-based approach will include enterprise-wide, sector-wide, and ecosystem risks, as opposed to traditional models that focus narrowly on system risks. Finally, the standards of practice can provide a foundation for developing agreed-upon international cybersecurity standards, which would eliminate duplicative and conflicting requirements across multiple countries. Overall, the standards of practice embody a common understanding of risk from the perspective of multiple stakeholders and provide a basis for determining how effectively a cybersecurity program is protecting the business, as opposed to merely protecting information technology systems. The standards of practice can provide a foundation for developing agreed-upon international cybersecurity standards, which would eliminate duplicative and conflicting requirements across multiple countries. A focus on risk will also help organizations visualize and prepare for the full spectrum of cyber threats. It enables organizations to respond with agility to changing threats and incorporate new strategies, technologies, and approaches into the framework. Moreover, a framework of standards of practice will have the ability to “learn” and adapt to an evolving cyber landscape. In this way, the
  • 9. 7 community avoids both a one-size-fits-all approach and a strict regulatory regime, which tends to create a focus on checklists and compliance rather than genuine security. 2. Accelerate the adoption of continuous monitoring and data analytics. Government and industry already have access to enormous amounts of data related to the protection of critical infrastructure, but they currently lack the capability to fully process and analyze this data to address complex cybersecurity challenges. Organizations can improve their analytic capabilities by tapping into emerging cloud-based analytics. Such capabilities would enhance significantly the value of information sharing among stakeholders because they would be able to quickly analyze data and respond to threats. Similarly, continuous monitoring capabilities would generate even more data regarding the health of networks within a sector and rapid responses based on data, as opposed to fear or premonitions about potential threats. While it is true that an individual sector could create these capabilities on its own, sharing capabilities and information across sectors, as well as across government agencies, provides much greater value. This is the goal that government and industry should be striving for, and federal initiatives such as the Big Data Research and Development Initiative, Digital Government Strategy, and the Cloud First Strategy directly support a movement in this direction. Agencies that have embraced these efforts are building the capacity to more effectively monitor their networks and exploit cybersecurity data. 3. Create an information-sharing broker (or brokers). Both government and industry need help sharing information efficiently and effectively. The owners and operators want data that can help them address their cybersecurity challenges, but they do not have the resources to sift through mountains of information unrelated to the threats they face. They need information that is delivered in a way that helps them understand why the information is relevant to businesses within their sector and how they can use it. However, the government agencies that collect this information do not have the resources to create this context—that is, address these questions—for each stakeholder. An information broker could provide these services for both government and industry. An information broker could take many forms and serve a number of essential functions. For example, the broker could serve as a “trusted aggregator” of threat data with the expertise to address privacy, security, and other issues that often hinder data sharing. It could also provide “risk ratings,” evaluating the level of risk that a reported threat posed to the company (or sector) receiving the report. Such a broker would refine and sharpen data to reduce substantially the friction in data sharing processes, thus making the data easier for government to share and more valuable for industry to receive. And because the information-sharing
  • 10. 8 4 Office of the Press Secretary, “Executive Order on Improving Critical Infrastructure Cybersecurity,” February 12, 2013. broker is focused on providing this service, it would continuously improve its own capabilities and the value of the data as it flows between government and industry. 4. Revitalize the public-private partnership based on shared interests. When issuing the EO, the White House said, “The Executive Order strengthens the US Government’s partnership with critical infrastructure owners and operators to address cyber threats.”4 However, many in industry are skeptical of the term “partnership,” uncertain of its precise meaning and wary of its implications for moving forward. Consequently, government and industry should use the EO and PPD-21 as an opportunity to clearly define roles, responsibilities, and processes for collaboration among major stakeholders. The starting place is finding common ground. Too often, discussions focus on the unique requirements or issues separating stakeholders, and they lose sight of the overlapping vital interests that have brought them together. For example, both government and industry have a shared interest in ensuring that networks are up and running at all times. All agree on the value of continuous monitoring in protecting networks and on the value of sharing threat data derived from continuous monitoring and other sources. Most would probably agree on the value of creating a robust framework that could be applied consistently across all sectors. These and other shared interests provide opportunities for collaboration and leadership. An approach that focuses on common interests also helps to shape the adoption of key components of the EO. For example, in developing a Cybersecurity Framework, government and industry will want to create a framework at a high enough conceptual level to address the requirements of all sectors. Moreover, the framework must be flexible to adapt to both a changing cyber environment and a more mature understanding of common interests. This approach also suggests that the current partnership model should be expanded to include the civil sector—that is, cyber and risk management experts from academia, think tanks, and others among the general public—because government and industry also have shared interests with the civil sector. The civil society has always played an important role in developing and shaping the Internet, and its members can contribute many useful ideas, as well as valuable data and intelligence necessary to predict, prevent, and respond to cyber threats. By viewing the cyber ecosystem as a collection of communities, rather than a limited number of sectors, the EO can strengthen both the partnership among stakeholders and the security of critical infrastructure. In fact, this is how cyber adversaries come together and operate: As communities with similar interests that share tactics and resources. A strong public- private-civil sector partnership can build an effective network to defeat the adversary's network.
  • 11. 9 Each partner, through data analytics and continuous monitoring, has richer data to inform collaborative efforts and determine what needs to be done to address systemic risks, which have the potential to adversely impact all. A new type of leadership is needed to galvanize strategic connectivity and unity of effort among these diverse partners. The National Preparedness Leadership Initiative (NPLI) at Harvard developed a framework and practice around meta- leadership, which offers insight into the leadership skills required to foster collaboration among interdependent entities in the pursuit of shared goals. NPLI characterizes meta-leaders as those who lead advances down into their own group, but who also lead up to gain their leaders’ support. Although team players, meta-leaders are not afraid to speak “truth to power,” if necessary, to those more senior. They also lead across agencies, extending their influence among stakeholder organizations, and they develop situational awareness to create a path forward, often in the face of incomplete information. Meta-leaders think beyond personal, bureaucratic, or business interests to achieve a higher purpose. They recognize that optimizing effectiveness and achieving high performance demand a spirit of collaboration, combined with tangible mechanisms that activate collaboration and partnership. Meta-leaders think beyond personal, bureaucratic, or business interests to achieve a higher purpose. A partnership forged on shared interests and guided by meta-leadership will create a stronger Cybersecurity Framework, develop more effective information sharing processes, and implement more meaningful changes to strengthen critical infrastructure cybersecurity. And these efforts will, in turn, strengthen the partnership. 5. Explore and develop norms guiding the use of “active cyber defense.” Private sector organizations are developing the capability to identify more precisely the source of cyber attacks using honey pots to attract and study threats and advanced forensics to track down attackers. The ability to identify attackers provides an opportunity for organizations to go beyond simply preventing or deterring attacks to actually striking back at an attacker’s networks and systems. An organization might engage in active cyber defense through collective action with other sector members or by turning to other communities of interest to address the threat. Such action might be especially tempting if the government were seen as unable or unwilling to protect the organization. The concept and potential use of active cyber defense is another area of compelling shared interest between government and industry. Employing active cyber defenses against attackers is already being widely discussed among cybersecurity professionals as an option, given the severity of the threats and the risks they pose. However, such activities could create a “Wild West” environment of vigilantism, attacks on innocent parties, and escalating attacks that draw the US government into conflict, potentially beyond cyberspace. Consequently, as government and industry collaborate on sharing information and building security frameworks, they also should address this emerging area of cyber policy and strategy.
  • 12. 10 Conclusion We are optimistic that the United States can strengthen critical infrastructure cybersecurity through a government-industry partnership that builds a robust Cybersecurity Framework, shares threat data, and collaborates on achieving national cyber goals. Although we don’t discount the challenges of bringing together such large and diverse groups of stakeholders, we believe that emerging cyber technologies and capabilities have created opportunities for success that did not exist 15 years ago when government first initiated whole of government efforts similar to the EO. In particular, continuous monitoring, data analytics, a more expert cybersecurity workforce, and a maturing of cybersecurity standards and models provide a much stronger foundation for collaboration. The potential gains resulting from partnership are significantly greater; and, if efforts fail, the potential damage to the nation’s economy and security is significantly greater as well. These two facts provide compelling incentive for stakeholders to work together to improve critical infrastructure cybersecurity. By building on their common interests, government and industry can create a partnership that grows and matures to counter cyber threats today and into the future.
  • 13. 11
  • 14. Contact Information 12 Mike McConnell Vice Chairman mcconnell_mike@bah.com 703-984-1812 Sedar Labarre Principal labarre_sedar@bah.com 202-346-9201 David Sulek Principal sulek_david@bah.com 703-984-0798 Marcia McGowan Senior Associate mcgowan_marcia@bah.com 703-984-3715
  • 15. About Booz Allen To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit www.boozallen.com. Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. The firm’s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant’s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen helps clients achieve success in their most critical missions—as evidenced by the firm’s many client relationships that span decades. Booz Allen helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012. For over a decade, Booz Allen’s high standing as a business and an employer has been recognized by dozens of organizations and publications, including Fortune, Working Mother, G.I. Jobs, and DiversityInc. More information is available at www.boozallen.com. (NYSE: BAH) 13
  • 16. www.boozallen.com The most complete, recent list of offices and their addresses and telephone numbers can be found on www.boozallen.com Principal Offices Huntsville, Alabama Montgomery, Alabama Sierra Vista, Arizona Los Angeles, California San Diego, California San Francisco, California Colorado Springs, Colorado Denver, Colorado District of Columbia Pensacola, Florida Sarasota, Florida Tampa, Florida Atlanta, Georgia Honolulu, Hawaii O’Fallon, Illinois Indianapolis, Indiana Leavenworth, Kansas Radcliff, Kentucky Aberdeen, Maryland Annapolis Junction, Maryland Lexington Park, Maryland Linthicum, Maryland Rockville, Maryland Troy, Michigan Kansas City, Missouri Omaha, Nebraska Red Bank, New Jersey New York, New York Rome, New York Fayetteville, North Carolina Cleveland, Ohio Dayton, Ohio Philadelphia, Pennsylvania Charleston, South Carolina Houston, Texas San Antonio, Texas Abu Dhabi, United Arab Emirates Alexandria, Virginia Arlington, Virginia Chantilly, Virginia Charlottesville, Virginia Falls Church, Virginia Herndon, Virginia McLean, Virginia Norfolk, Virginia Stafford, Virginia Seattle, Washington ©2013 Booz Allen Hamilton Inc. BA13-051