100 likes | 111 Views
This guide outlines the process of developing and implementing cyber security plans for local government entities. It covers working with municipal boards and staff, creating policies and procedures, gathering information, and initiating changes for continuity and security.
E N D
Developing Your Own Local Government Cyber Security Plans Stan France & Mary Ball stan@co.schoharie.ny.us Keeping you Running Part II
Outline • Working with municipal boards • Working with municipal staff and officials • Policies and procedures • Gathering information • Turning information into plans • Initiating changes for continuity and security
Working with Municipal BoardsInitial Buy in Talking Points • Continuity • Cases of fire, oil spills, floods • Citizen needs • Cyber security • Information protection • (State Comptroller, E-Ticket) • Personal identity information disclosure law • Public embarrassment • Loss of work time • Cost to repair
Working with Municipal BoardsNeed for Policy and Procedures • Establish roles when a response is needed • Identify impact of changes on operations • Different personnel • Different operations • Make clear government resource usage
Working With Municipal Staff and Officials • Establish what needs to be accomplished • Continuity • Cyber security • Establish roles for the process • Utilize existing strengths • Coordination • Information gathering
Policies and Procedures • Model Continuity of Operations Policy • Model Continuity of Operations Plan • Model Cyber Security Policy • Model Acceptable Use Policy
Gathering Information • Basic information gathering form • Remote operations requirements form • Continuity of Operations by Function form
Turning Information IntoContinuity Policy and Plans • Model continuity of operations policy • Purpose • Scope • Policy • Model Continuity of operations Plan • Overall responsibility • Priorities • Plans and procedures by function
Model Cyber Security Policy • Responsible person • Physical protection • Access control • Information protection • Incident reporting • Training • Media Disposal • Acceptable use policy • Policy review
Initiating Changes • Information Security Officer (ISO) role • Regular security software updates • Regular back-up and offsite storage • Annual review