3. Scott Geye – CISSP, CISA
Experience
• Certified Information Systems Security Professional (CISSP)
• Certified Information Systems Auditor (CISA)
• 8 years of Information Technology experience focused on networking and information security
• Served as an Information Security Analyst for a large university
• Participated in the execution of SOC 1 and SOC 2 engagements
• Participated in in the execution of SOX 404 engagements and implementations
• Performed IT engagements in multiple industries, including technology, manufacturing, public sector,
oil and gas, and healthcare
• Advised clients regarding process and control improvement to minimize risk
• Provided guidance to clients regarding system evaluation and implementation
• Perform IT Risk Assessments and Security Audits
EDUCATION
Masters in Information Technology Service Management
University of Dallas
Bachelors in Management Information Systems (MIS)
University of Texas at Arlington
Bio
2
7. There are numerous
definitions, but most
include data “that allow
the identification of a
person directly or
indirectly” or similar
language.
Definition ofPersonal Data
6
42. Hacktivism (continued)
41
• City of Denver – Website shutdown after police
shooting on 4/12/2016. Members of New World Hackers
(NWH), a division of Anonymous, launched a Distributed
Denial of Service (DDoS) attack against the City’s
website. This attack took the City’s website down for the
day.
• Cincinnati and Miami Police Departments – Members
of these Departments were “Doxed” by Anonymous, and
personal details were leaked online.
Security Newspaper – Anonymous Shuts Down
City of Denver Website….
43. Hacktivism (continued)
Identity Theft Resource Center
42
Missouri Sheriff’s Association
In retaliation to the arrest of members of the group
Anonymous, hackers breached the association’s website
and released personal information on 7,000 officers. 76
other law enforcement agencies were also targeted in the
attack.
49. Resources forLocal Governments
Cyber Guide for Counties
48
Critical Infrastructure Partnership Advisory Council (CIPAC)
“A partnership between government and critical infrastructure owners
and operators, which provides a forum to engage in a broad spectrum of
critical infrastructure protection activities, like the Cross-Sector
Cybersecurity Working Group”
http://www.dhs.gov/critical-infrastructure-partnership-advisory-council
50. Resources forLocal Governments (continued)
Cyber Guide for Counties49
Information Technology Government Coordinating Council (IT-
GCC)
“Brings together diverse federal, state, local, and tribal interests to
identify and develop collaborative strategies that advance IT critical
infrastructure protection. The IT-GCC serves as a counterpart to the IT
Sector Coordinating Council (IT-SCC)”
http://www.dhs.gov/critical-infrastructure-sector-partnerships
51. Resources forLocal Governments (continued)
Cyber Guide for Counties
50
Multi-State Information Sharing and Analysis Center (MS-ISAC)
“A division of the not-for-profit Center for Internet Security, is a collaborative effort based on a strong
partnership with the Department of Homeland Security (DHS) and State, Local, Tribal, and Territorial
(SLTT) Cybersecurity Engagement program. The MS-ISAC has been designated by DHS as the key
resource for cyber threat prevention, protection, response, and recovery for the Nations SLTT
governments. Through its state-of-the-art 24/7 Security Operations Center, the MS-ISAC serves as a
central resource for situational awareness and incident response for SLTT governments, at no cost to
its members.”
http://msisac.cisecurity.org/
If you would like to leverage the MS-ISAC for malware analysis, computer forensics, network forensics,
incident response, or onsite response, contact the 7x24 Security Operations Center at 1-866-787-4722
or soc@msisac.org
52. Resources forLocal Governments (continued)
Cyber Guide for Counties51
Cyber Resilience Review
“Provided by DHS to SLTT governments as a free service and involves
a one-day, onsite interview that examines the overall practice,
integration and health of an organization’s cybersecurity program.”
https://www.us-cert.gov/ccubedvp/self-service-crr
53. Resources forLocal Governments (continued)
Cyber Guide for Counties
52
Exercises
“Directly supports state, local, tribal, and territorial cyber exercise,
design, development, and execution. Cyber exercises familiarize SLTT
cyber stakeholders with the roles, responsibilities, policies, plans, and
procedures related to cyber incidents.”
CEP@dhs.gov
54. Resources forLocal Governments (continued)
Cyber Guide for Counties
53
National Cybersecurity Communications Integration Center
(NCCIC)
“A 24x7 cyber monitoring, analysis, incident response, and management
center that is the national nexus of cyber and communications incident
integration for the federal domain, intelligence networks, law
enforcement, the private sector, State, local, tribal, and territorial
governments, and international partners.”
https://www.us-cert.gov/nccic
55. Resources forLocal Governments (continued)
Cyber Guide for Counties
54
United States Computer Emergency Readiness Team (US-CERT)
“Brings advanced network and digital media analysis expertise to bear on
malicious activity targeting our nations networks. US-CERT develops timely and
actionable information for distribution to federal departments and agencies,
state and local governments, private sector organizations, and international
partners. In addition, US-CERT operates the National Cybersecurity Protection
System (NCPS), which provides intrusion detection and prevention capabilities
to covered federal departments and agencies. The US-CERT’s National Cyber
Alert System (NCAS) delivers timely and actionable information and threat
productions including alerts, bulletins and tips.”
https://www.us-cert.gov/
56. Resources forLocal Governments (continued)
Cyber Guide for Counties
55
Trusted Purchasing Alliance
“Designed to drive down the price of security products by combining
state and local government purchases into bulk buys. The alliance
works with public agencies to pinpoint the areas of greatest need, and
then negotiates with vendors for discounted pricing. Product choices
are vetted by a review board stocked with analysts and security
experts.”
http://alliance.cisecurity.org/
57. Resources forLocal Governments (continued)
NIST Special Publication 800 Series
56
NIST Special Publications (SP):
NIST SP 800 series - Computer Security (December 1990-present):
NIST's primary mode of publishing computer/cyber/information security
guidelines, recommendations and reference materials.
• This framework can provide the “meat” for the Texas Cybersecurity
Framework