1 / 13

Topics & Trends in Cybersecurity

Topics & Trends in Cybersecurity. Fort Bragg Ed Fair January 25, 2016 Panel members : Nicole M. Winget, James Robertson, Alan Rynarzewski, Matthew Gonzalez; and Craig Gruber. Agenda.

jmargarita
Download Presentation

Topics & Trends in Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Topics & Trends in Cybersecurity Fort Bragg Ed Fair January 25, 2016 Panel members: Nicole M. Winget, James Robertson, Alan Rynarzewski, Matthew Gonzalez; and Craig Gruber

  2. Agenda • Identify - Nicole M. Winget, Instructor of Homeland Security and Criminal Justice, Campbell University • Protect - James Robertson, Ed.D., Program Chair, Software Development, Security and Computer Science, University of Maryland University College • Detect - Alan Rynarzewksi, Business & IT Faculty, Kaplan University • Respond - Matthew Gonzalez, PhD, Cyber Program Director, University of Charleston • Recover - Craig W. Gruber, PhD, Director of MA in Homeland Security, Northeastern University • Moderator, COL Jeffrey S. Cairns, USA (ret), Director Strategic Relations & Development, Norwich University

  3. NIST: National Institutes of Standards and TechnologyCyber Security Framework

  4. ISACA: International Information Systems Organization Info Graphic on Cybersecurity Job Market:

  5. Identify • What is it? • Asset Management • Business Environment • Governance • Risk Assessment • Risk Management Strategy • How do you accomplish it? • Examples Nicole M. Winget Instructor of Homeland Security and Criminal Justice Campbell University

  6. Protect Categories • Access Control: Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions • Awareness and Training: The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements. • Data Security: Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information. • Information Protection Processes and Procedures: Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities),processes, and procedures are maintained and used to manage protection of information systems and assets. • Maintenance: Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures. • Protective Technology: Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements James Robertson, Ed.D. Program Chair, Software Development, Security and Computer Science University of Maryland University College

  7. Access Control Best Practices • Building/Facility security • Least Privilege • Maintain an Accurate Inventory of Devices • Develop and Enforce Policies on Mobile Devices • Establish Role-Based Access Controls • Login Attempts • Implement a logging (and monitoring) capability James Robertson, Ed.D. Program Chair, Software Development, Security and Computer Science University of Maryland University College

  8. Trending Threats & Mitigations • Ransomware • Machine learning accelerates social engineering attacks • IoT malware opens a backdoor into the home • Drone-jacking - threats in the sky Recruiters Search for Cyber Talent Outside of Security Non-technical Security Professionals need will increase James Robertson, Ed.D. Program Chair, Software Development, Security and Computer Science University of Maryland University College

  9. References 1. 10 Basic Cybersecurity Measures - Best Practices to Reduce Exploitable Weaknesses and Attacks, June 2015 retrieved from https://ics-cert.us-cert.gov/sites/default/files/documents/10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf January 22, 2017 2. Framework for Improving Critical Infrastructure Cybersecurity, February 12, 2014. Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf January 22, 2017 3. DHS and GSA Should Address Cyber Risk to Building and Access Control Systems, January 12, 2015 Retrieved from http://www.gao.gov/assets/670/667512.pdf January 21, 2017 4. The Top 17 Security Predictions for 2017, January 8, 2017 Retrieved from http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-17-security-predictions-for-2017.html January 23, 2017. James Robertson, Ed.D. Program Chair, Software Development, Security and Computer Science University of Maryland University College

  10. Detect • Hurdles • Methods of Detection • Visibility • Amount of data • End user adventures • Qualified candidates & education Alan Rynarzewksi Business & IT Faculty Kaplan University

  11. CYBER RESPONSE TRENDS & OUTLOOK TRENDS: 1. 75% CULTURAL FABRIC 2. 57% OPERATIONAL AUTOMATION 3. TRADE SECRET RIGHTS 4. PHYSICAL RELIABILITY OUTLOOK: • Presidential Policy Directive PPD-41: • Threat Response • Asset Response • Intelligence Support • Vision: • Cyber Review Team • Military • Law Enforcement • Private • Tasks Force Coordination • Enhance U.S. Cyber Command Matthew Gonzalez, PhD Cyber Program Director University of Charleston

  12. Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications. NIST Cybersecurity Framework - RECOVER Craig W. Gruber, PhD Director of MA in Homeland Security Northeastern University

  13. Questions?

More Related