130 likes | 345 Views
Homeland Security Cyber Threat Discussion INFRAGARD 2012. UNCLASSIFIED/FOR OFFICIAL USE ONLY. Richard C. Baron Executive Director Ohio Homeland Security Homeland Security Advisor to Ohio. What Does Cyber Threat Mean. Risk = Threat X Vulnerability X Consequence. Risk = What is at risk.
E N D
Homeland Security Cyber Threat Discussion INFRAGARD 2012 UNCLASSIFIED/FOR OFFICIAL USE ONLY Richard C. Baron Executive Director Ohio Homeland Security Homeland Security Advisor to Ohio
What Does Cyber Threat Mean Risk = Threat X Vulnerability X Consequence Risk = What is at risk Threat = What is the threat Vulnerability= What is the vulnerability Consequence = What is the consequence UNCLASSIFIED/FOR OFFICIAL USE ONLY
Cyber Space UNCLASSIFIED/FOR OFFICIAL USE ONLY
Focus of CYBER Security Private Sector Systems People UNCLASSIFIED/FOR OFFICIAL USE ONLY
Focus of CYBER Security Public Sector Systems People UNCLASSIFIED/FOR OFFICIAL USE ONLY
Rick’s Rules #1 The time to plan is not at the time of crisis! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY Source U.S Cyber Command
Rick’s Rules #2 The event causing the crisis de jour was most likely not an event that could not be anticipated! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY
Gordon Graham’s General Rule If it is predictable its preventable! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY
What Are We Trying To Protect Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY
Fundamental Principles Similar crimes are committed by similar personalities that do similar things. Multi-State ISAC (MS-ISAC) Just Like Similar systems and operating systems have similar processes and behave in similar ways. UNCLASSIFIED/FOR OFFICIAL USE ONLY
Considerations for Planning • Work through existing support channels INFRAGARD • Pre-coordinate with: • State CIO / CISO • State OHS/EMA • DHS coordinators for the state • Local FBI representatives • NORTHCOM EPLO (Emergency Preparedness Liaison Officer) • National Guard JFHQ (Joint Operations Center) for ANG and ARNG capabilities (NWS and CND teams) • Multi use Title 10 / Title 32 / State AD / DSCA • The common technology base in the NG provides ability for use both in combat operations or response to state emergencies • Commercial providers – Technical extension, ability to mix contract service providers with DOD tactical systems, local cyber response elements • Academic assets, Universities and Cyber training schools Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY
Discussion UNCLASSIFIED/FOR OFFICIAL USE ONLY
Contact Information UNCLASSIFIED/FOR OFFICIAL USE ONLY