SlideShare una empresa de Scribd logo
1 de 23
Weaving cyber events into emergency management plans
Dave Sweigert, CISSP, CISA, PMP
January, 2014

1/14/2014
Intended audience
• Cyber security personnel working with
emergency planners, Crisis Management
Teams (CMT), Emergency Operation Plan
developers and business continuity
planners relying on current best practices

1/14/2014
Objective
• Assist cyber practitioners in leveraging
techniques to integrate cyber specific
plans into larger basic plans
• Provide background in best practice
planning processes
• Foster inter-disciplinary dialogue in the
emergency planning domain

1/14/2014
BACKGROUND

1/14/2014
Different plans for different objectives
• Strategic, Operational, Tactical Plans
i.

Strategic – goals and objectives set by
senior leadership
ii. Ops – roles and responsibilities,
integrated with partners (state,
regional, local, contractors, utilities)
iii. Tactical – personnel, equipment,
resources (standard operating
procedures (SOP))
1/14/2014
Planning backdrop
• Comprehensive Preparedness Guide (CPG)
101, Developing and Maintaining
Emergency Operations Plans as a guide
• Three types of threats: natural,
adversarial, technology (cyber)
• FEMA’s Emergency Support Function # 2
addresses cyber security (drafting ESF
#18 Cyber)

1/14/2014
Plans that support and supplement
the comprehensive basic plan
•
•
•
•
•
•

Administrative Plans
Preparedness Plans
Continuity Plans
Recovery Plans
Mitigation Plans
Prevention and Protection Plans

1/14/2014
Terms: CIKR, COOP , COG & DRP
Critical Infrastructure/Key Resources (CIKR)
Continuity of Operations (COOP)
Continuity of Government (COG)
Disaster Recovery Planning (DRP)
(I.T. specific recovery)
• DRP defines knowledge, skills and abilities
of technical personnel
• DRP defines specific guidelines to carryout specific functions
•
•
•
•

1/14/2014
Other plans orbiting the basic plan
• Organizational/agency specific plans
(planning can be to department level)
• Business Continuity (memorandums of
understanding/agreement (MOU/A))
• Business Safety plans (OSHA)
• Hazard Mitigation (identified major
threats, union strikes, terrorism)
• Home Safety Plans for essential personnel
(develop family preparedness mindset)

1/14/2014
Emergency Operations Plans (EOPs)
• Potential integration with National Incident
Management System (NIMS) and National
Response Framework (NRF)
• Describes how incidents are handled
• Base plan (organization-wide) with hazard
specific annexes (cyber specific)
• Information sharing between private-public
partners

1/14/2014
EOPs:
• Identification of response and recovery
actions, agencies, key resources
• Direction, control, sequence of events
• Specific communications procedures
• Identify triggers and processes to activate
personnel, resources, partners
• Times, periods, anticipation of needs
• Appendix (support material)
• Annex (threat / capability specific)

1/14/2014
PLANNING PROCESS

1/14/2014
The Planning table
• Identify community partners (law
enforcement, utilities, colleges)
• Build relationship (cross-functional)
• Identify resources (needed capabilities)
• Know the processes needed and
specialized procedures to acquire timely
resources (pre-existing vendor
agreements)

1/14/2014
Planning process issues
• Get the right folks at the table
• Walk thru your organizational structure
• Develop common vocabulary (avoid use of
career specific jargon and buzz words)
• Incentivizing participants: developing a
“hook” to retain participants
• Develop team around a planning scenario
common to all participants (72 hour
power black-out)

1/14/2014
Best practices
•
•
•
•
•
•
•
•

Project objective (create living document)
Core planning team (stakeholders)
Project schedule (tasks, durations)
Plan development (templates)
Plan preparation and review
Plan vetting and commentary
Final draft reviewed in workshop
Approval

1/14/2014
Project Management issues
• Need buy-in from top management
(compliance issues HIPAA, SOX, PCI)
• Scope statement (catalyst)
• Define clear objectives
• Project manager’s role defined
• Scope creep (focus on a functional plan)

1/14/2014
Planning Characteristics
• Reduction of unknowns
• Continual process (living document)
• Appropriate actions based on what is
likely to happen based on facts, typical
behavior, capabilities
• Training, education, exercises
• Testing the plans, revise and improve

1/14/2014
INTEGRATING
PLANS

1/14/2014
Integrated Emergency Planning
• Horizontal integration: developing
partnerships across your organization
• Synchronization and integration of plans
(your plan may be part of another)
• Promotes complementary goals
• Reduces fragmentation
• Ensures common focus
• Work out MOUs/MOAs (legal review)

1/14/2014
Linkages to promote integration
• Conduct gap analysis to determine shortfalls
• Convert needs to capabilities (need 72 hours
of power  mobile generators with fuel)
• Understand the missions of public-private
partners (law enforcement, contractors)
• Developing crosswalk of plan components
with partner plans to improve integration
• Identify all appropriate stakeholders

1/14/2014
CONCLUSION

1/14/2014
Planning for the cyber incident
• Understand that the cyber event plan is
part of a broader integrated approach to
emergency management
• Pre-response planning with partners can
greatly reduce impact (ounce of
prevention) of the event
• Strive to ensure your cyber plan is
integrated into the total response

1/14/2014
About the author:
An Air Force veteran, Dave Sweigert acquired significant
security engineering experience with military and defense
contractors before earning two Masters’ degrees (Project
Management and Information Security).
He holds the Certified Information Security Systems
Professional (CISSP), Certified Information Systems Auditor
(CISA) and Project Management Professional (PMP)
certifications.
Mr. Sweigert has over twenty years experience in information
assurance, risk management, governance frameworks and
litigation support.

1/14/2014

Más contenido relacionado

Destacado

Impress redes sociales
Impress redes socialesImpress redes sociales
Impress redes socialeshollyb02
 
AIESEC international school project
AIESEC international school projectAIESEC international school project
AIESEC international school projectSherry Yujing Cai
 
格安ラルフローレンのシャツ個々のソリューションの保護
格安ラルフローレンのシャツ個々のソリューションの保護格安ラルフローレンのシャツ個々のソリューションの保護
格安ラルフローレンのシャツ個々のソリューションの保護boxian674
 
Magnetic attraction
Magnetic attractionMagnetic attraction
Magnetic attractionbhagwadgeeta
 
Youth Sermon Ideas - Primary Tasks of a Mentor
Youth Sermon Ideas - Primary Tasks of a MentorYouth Sermon Ideas - Primary Tasks of a Mentor
Youth Sermon Ideas - Primary Tasks of a MentorKen Sapp
 
Question 1 powerpoint
Question 1 powerpointQuestion 1 powerpoint
Question 1 powerpointjackdavies28
 
Hypertrophic cardiomyopathy
Hypertrophic cardiomyopathyHypertrophic cardiomyopathy
Hypertrophic cardiomyopathydrucsamal
 

Destacado (10)

Impress redes sociales
Impress redes socialesImpress redes sociales
Impress redes sociales
 
AIESEC international school project
AIESEC international school projectAIESEC international school project
AIESEC international school project
 
格安ラルフローレンのシャツ個々のソリューションの保護
格安ラルフローレンのシャツ個々のソリューションの保護格安ラルフローレンのシャツ個々のソリューションの保護
格安ラルフローレンのシャツ個々のソリューションの保護
 
Magnetic attraction
Magnetic attractionMagnetic attraction
Magnetic attraction
 
Youth Sermon Ideas - Primary Tasks of a Mentor
Youth Sermon Ideas - Primary Tasks of a MentorYouth Sermon Ideas - Primary Tasks of a Mentor
Youth Sermon Ideas - Primary Tasks of a Mentor
 
Richard ibarra
Richard ibarraRichard ibarra
Richard ibarra
 
Question 1 powerpoint
Question 1 powerpointQuestion 1 powerpoint
Question 1 powerpoint
 
Malla curricular
Malla curricularMalla curricular
Malla curricular
 
Coursera MH8C4EX72VZU
Coursera MH8C4EX72VZUCoursera MH8C4EX72VZU
Coursera MH8C4EX72VZU
 
Hypertrophic cardiomyopathy
Hypertrophic cardiomyopathyHypertrophic cardiomyopathy
Hypertrophic cardiomyopathy
 

Similar a Integration of Cyber Events into Emergency Planning

Event Management - AK2012
Event Management - AK2012Event Management - AK2012
Event Management - AK2012Andre Knipe
 
Disaster Resistance City- Denizli
Disaster Resistance City- DenizliDisaster Resistance City- Denizli
Disaster Resistance City- DenizliDr. Yilmaz Ozmen
 
Presentation_DRRM Mainstreaming in the Planning Cycle.pptx
Presentation_DRRM Mainstreaming in the Planning Cycle.pptxPresentation_DRRM Mainstreaming in the Planning Cycle.pptx
Presentation_DRRM Mainstreaming in the Planning Cycle.pptxClarenceCasapao
 
Becoming an Accessibility Champion
Becoming an Accessibility ChampionBecoming an Accessibility Champion
Becoming an Accessibility ChampionKevin Rydberg
 
ITS and Emergency Management: An organisation-focused approach
ITS and Emergency Management: An organisation-focused approachITS and Emergency Management: An organisation-focused approach
ITS and Emergency Management: An organisation-focused approachAndre Dantas
 
Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Numaan Tole
 
Contingency action plan in disaster managment
Contingency action plan in disaster managmentContingency action plan in disaster managment
Contingency action plan in disaster managmentSamraiz Tejani
 
Incident management summit gauteng
Incident management summit gautengIncident management summit gauteng
Incident management summit gautengRoland2015
 
Developing a toolkit to assess the resilience of socio-ecological land and se...
Developing a toolkit to assess the resilience of socio-ecological land and se...Developing a toolkit to assess the resilience of socio-ecological land and se...
Developing a toolkit to assess the resilience of socio-ecological land and se...Bioversity International
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16Benita Rowe
 
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...Medi Ambient. Generalitat de Catalunya
 
Common Ground between the Paris Agreement and the Sendai Framework – National...
Common Ground between the Paris Agreement and the Sendai Framework – National...Common Ground between the Paris Agreement and the Sendai Framework – National...
Common Ground between the Paris Agreement and the Sendai Framework – National...NAP Global Network
 
disaster training programs.pptx
disaster training programs.pptxdisaster training programs.pptx
disaster training programs.pptxrajendra gopal
 
MEAL Advisor Iraq -TOR
MEAL Advisor Iraq -TORMEAL Advisor Iraq -TOR
MEAL Advisor Iraq -TORNir Dahal
 

Similar a Integration of Cyber Events into Emergency Planning (20)

Event Management - AK2012
Event Management - AK2012Event Management - AK2012
Event Management - AK2012
 
Disaster Resistance City- Denizli
Disaster Resistance City- DenizliDisaster Resistance City- Denizli
Disaster Resistance City- Denizli
 
lood Resilience Workshop Introduction and Activities | Tim Godson and Susanna...
lood Resilience Workshop Introduction and Activities | Tim Godson and Susanna...lood Resilience Workshop Introduction and Activities | Tim Godson and Susanna...
lood Resilience Workshop Introduction and Activities | Tim Godson and Susanna...
 
Presentation_DRRM Mainstreaming in the Planning Cycle.pptx
Presentation_DRRM Mainstreaming in the Planning Cycle.pptxPresentation_DRRM Mainstreaming in the Planning Cycle.pptx
Presentation_DRRM Mainstreaming in the Planning Cycle.pptx
 
UNYCC Information Security Discussion
UNYCC Information Security DiscussionUNYCC Information Security Discussion
UNYCC Information Security Discussion
 
NAP-GSP Cambodia Stocktaking Mission Debriefing
NAP-GSP Cambodia Stocktaking Mission DebriefingNAP-GSP Cambodia Stocktaking Mission Debriefing
NAP-GSP Cambodia Stocktaking Mission Debriefing
 
Becoming an Accessibility Champion
Becoming an Accessibility ChampionBecoming an Accessibility Champion
Becoming an Accessibility Champion
 
ITS and Emergency Management: An organisation-focused approach
ITS and Emergency Management: An organisation-focused approachITS and Emergency Management: An organisation-focused approach
ITS and Emergency Management: An organisation-focused approach
 
Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)Contingency action plan - (Disaster Management)
Contingency action plan - (Disaster Management)
 
Contingency action plan in disaster managment
Contingency action plan in disaster managmentContingency action plan in disaster managment
Contingency action plan in disaster managment
 
Water Research Impact and Uptake Workshop wrap up
Water Research Impact and Uptake Workshop   wrap upWater Research Impact and Uptake Workshop   wrap up
Water Research Impact and Uptake Workshop wrap up
 
Tttikm1
Tttikm1Tttikm1
Tttikm1
 
Incident management summit gauteng
Incident management summit gautengIncident management summit gauteng
Incident management summit gauteng
 
Developing a toolkit to assess the resilience of socio-ecological land and se...
Developing a toolkit to assess the resilience of socio-ecological land and se...Developing a toolkit to assess the resilience of socio-ecological land and se...
Developing a toolkit to assess the resilience of socio-ecological land and se...
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16
 
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...
Efforts in the field of adaptation in the Alpine space . outcomes of the C3-A...
 
Common Ground between the Paris Agreement and the Sendai Framework – National...
Common Ground between the Paris Agreement and the Sendai Framework – National...Common Ground between the Paris Agreement and the Sendai Framework – National...
Common Ground between the Paris Agreement and the Sendai Framework – National...
 
disaster training programs.pptx
disaster training programs.pptxdisaster training programs.pptx
disaster training programs.pptx
 
IFPRI - Results and Impact Management System (RIMS)
IFPRI - Results and Impact Management System (RIMS)IFPRI - Results and Impact Management System (RIMS)
IFPRI - Results and Impact Management System (RIMS)
 
MEAL Advisor Iraq -TOR
MEAL Advisor Iraq -TORMEAL Advisor Iraq -TOR
MEAL Advisor Iraq -TOR
 

Más de David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

Más de David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Último

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Integration of Cyber Events into Emergency Planning

  • 1. Weaving cyber events into emergency management plans Dave Sweigert, CISSP, CISA, PMP January, 2014 1/14/2014
  • 2. Intended audience • Cyber security personnel working with emergency planners, Crisis Management Teams (CMT), Emergency Operation Plan developers and business continuity planners relying on current best practices 1/14/2014
  • 3. Objective • Assist cyber practitioners in leveraging techniques to integrate cyber specific plans into larger basic plans • Provide background in best practice planning processes • Foster inter-disciplinary dialogue in the emergency planning domain 1/14/2014
  • 5. Different plans for different objectives • Strategic, Operational, Tactical Plans i. Strategic – goals and objectives set by senior leadership ii. Ops – roles and responsibilities, integrated with partners (state, regional, local, contractors, utilities) iii. Tactical – personnel, equipment, resources (standard operating procedures (SOP)) 1/14/2014
  • 6. Planning backdrop • Comprehensive Preparedness Guide (CPG) 101, Developing and Maintaining Emergency Operations Plans as a guide • Three types of threats: natural, adversarial, technology (cyber) • FEMA’s Emergency Support Function # 2 addresses cyber security (drafting ESF #18 Cyber) 1/14/2014
  • 7. Plans that support and supplement the comprehensive basic plan • • • • • • Administrative Plans Preparedness Plans Continuity Plans Recovery Plans Mitigation Plans Prevention and Protection Plans 1/14/2014
  • 8. Terms: CIKR, COOP , COG & DRP Critical Infrastructure/Key Resources (CIKR) Continuity of Operations (COOP) Continuity of Government (COG) Disaster Recovery Planning (DRP) (I.T. specific recovery) • DRP defines knowledge, skills and abilities of technical personnel • DRP defines specific guidelines to carryout specific functions • • • • 1/14/2014
  • 9. Other plans orbiting the basic plan • Organizational/agency specific plans (planning can be to department level) • Business Continuity (memorandums of understanding/agreement (MOU/A)) • Business Safety plans (OSHA) • Hazard Mitigation (identified major threats, union strikes, terrorism) • Home Safety Plans for essential personnel (develop family preparedness mindset) 1/14/2014
  • 10. Emergency Operations Plans (EOPs) • Potential integration with National Incident Management System (NIMS) and National Response Framework (NRF) • Describes how incidents are handled • Base plan (organization-wide) with hazard specific annexes (cyber specific) • Information sharing between private-public partners 1/14/2014
  • 11. EOPs: • Identification of response and recovery actions, agencies, key resources • Direction, control, sequence of events • Specific communications procedures • Identify triggers and processes to activate personnel, resources, partners • Times, periods, anticipation of needs • Appendix (support material) • Annex (threat / capability specific) 1/14/2014
  • 13. The Planning table • Identify community partners (law enforcement, utilities, colleges) • Build relationship (cross-functional) • Identify resources (needed capabilities) • Know the processes needed and specialized procedures to acquire timely resources (pre-existing vendor agreements) 1/14/2014
  • 14. Planning process issues • Get the right folks at the table • Walk thru your organizational structure • Develop common vocabulary (avoid use of career specific jargon and buzz words) • Incentivizing participants: developing a “hook” to retain participants • Develop team around a planning scenario common to all participants (72 hour power black-out) 1/14/2014
  • 15. Best practices • • • • • • • • Project objective (create living document) Core planning team (stakeholders) Project schedule (tasks, durations) Plan development (templates) Plan preparation and review Plan vetting and commentary Final draft reviewed in workshop Approval 1/14/2014
  • 16. Project Management issues • Need buy-in from top management (compliance issues HIPAA, SOX, PCI) • Scope statement (catalyst) • Define clear objectives • Project manager’s role defined • Scope creep (focus on a functional plan) 1/14/2014
  • 17. Planning Characteristics • Reduction of unknowns • Continual process (living document) • Appropriate actions based on what is likely to happen based on facts, typical behavior, capabilities • Training, education, exercises • Testing the plans, revise and improve 1/14/2014
  • 19. Integrated Emergency Planning • Horizontal integration: developing partnerships across your organization • Synchronization and integration of plans (your plan may be part of another) • Promotes complementary goals • Reduces fragmentation • Ensures common focus • Work out MOUs/MOAs (legal review) 1/14/2014
  • 20. Linkages to promote integration • Conduct gap analysis to determine shortfalls • Convert needs to capabilities (need 72 hours of power  mobile generators with fuel) • Understand the missions of public-private partners (law enforcement, contractors) • Developing crosswalk of plan components with partner plans to improve integration • Identify all appropriate stakeholders 1/14/2014
  • 22. Planning for the cyber incident • Understand that the cyber event plan is part of a broader integrated approach to emergency management • Pre-response planning with partners can greatly reduce impact (ounce of prevention) of the event • Strive to ensure your cyber plan is integrated into the total response 1/14/2014
  • 23. About the author: An Air Force veteran, Dave Sweigert acquired significant security engineering experience with military and defense contractors before earning two Masters’ degrees (Project Management and Information Security). He holds the Certified Information Security Systems Professional (CISSP), Certified Information Systems Auditor (CISA) and Project Management Professional (PMP) certifications. Mr. Sweigert has over twenty years experience in information assurance, risk management, governance frameworks and litigation support. 1/14/2014