SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information.
A Holistic Approach for Reimagining Cyber Defense
23 February 2016
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Introduction
The Approach
• Know
• Protect
• Respond
• Mature
Sector Study- The Electric Utility Sector
Agenda
2
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Mission
Booz Allen Hamilton partners with clients to solve their most important and complex problems,
making their mission our mission and delivering results that endure
What We Bring
Expertise, objectivity, and the capabilities of exceptional people —combined with the
institutional experience of helping clients succeed for 100 years
What Distinguishes Us
Booz Allen combines a consultant’s unique problem-solving orientation with deep technical
knowledge and strong execution to help clients achieve success in their critical missions
The Firm
 Annual Revenue — $4 billion
 Public corporation
 Founded in 1914
Scale and Scope
 Over 24,000 talented people, serving
clients from more than 80 offices
 Approx. 300 staff in Hawaii
 Office in Honolulu for over 20 years
Booz Allen Hamilton is a leading strategy & technology
consulting firm and solutions provider
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Asset Management- Realizing tailored asset management systems
that enable proper classification, tracking, protection, configuration,
and usage of those assets.
Situational Awareness- Establishing real-time visibility into your
cyber ecosystem, providing insights into activities that impact your
unique environment.
Threat Intelligence- Providing clear insights on current and
emerging threat activity in order to drive more informed and precise
decision making.
Vulnerability Management- Identifying, quantifying, and prioritizing
the vulnerabilities in systems, networks, processes, or applications,
and developing plans for intelligently reducing vulnerability.
Know- Understand your business and the cyber risk within
it
4
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Specific alerts and warnings relevant to the client are more
valuable than generic reports of vulnerabilities
5
Cyber4Sight- Booz Allen developed the line of Cyber4Sight® to provide cyber
threat alerting and warning services, on-call intelligence analysis, and deep web
intelligence that warn our clients of threats in near real-time.
Insider4Sight- Rogue internal employees fly under the radar of organizations that
use network audit tools to prevent outside threats. I4S was created to identify
insider threats using advanced detection and analytical tools.
Global4Sight- Our line of threat and competitive intelligence Global4Sight™
products combine open-source cloud architecture with social media research and
intelligence analysis to give clients key information on global threats and global
market opportunities.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
 Application Security- Developing and deploying software assurance processes,
controls, and countermeasures to secure software applications throughout the product
lifecycle--from design to maintenance.
 Identity & Access Management- Enabling program design support and deployment
of solutions to assure that information is derived from a trusted source and is only
available to authorized entities.
 Information Protection- Cross-disciplinary solutions to protect sensitive information
from unauthorized access, use, disclosure, disruption, modification, recording, and
destruction.
 Infrastructure & Mobile Security- Providing a stable and resilient baseline
infrastructure, along with a flexible and secure mobile platform that meets mission and
business needs.
 Supplier Security Management- Applying industry-leading, vendor-agnostic
solutions to carefully identify, prioritize, and manage risk in your supply chain and
across your supplier community.
Protect- Secure your organization, operations, products,
and services
6
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Continuous Monitoring can help Compliance and Network
Management/Defense needs across the Enterprise.
7
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Incident Response- Support to assess incidents,
mitigate the issue, determine the extent of exposure, and
manage communications.
Postmortem Analysis- Analysis of security incidents to
support investigations, document lessons learned, and
improve the overall incident response process.
Remediation- Development and implementation of
targeted action plans for short-term incident containment
and longer-term ecosystem resilience.
Respond- Triage, respond, and learn from cyber incidents
8
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Automated First Responder (AFR) – arms analysts with a
proven tool to identify and eradicate APTs
APT-specific suite of tools that can rapidly identify
APTs and their malicious code
Software Distribution
Server
Collection
Server
Enterprise
Workstations/Servers
Standalone Analysis
Environment
Processing
Server
Analyst
1
2
3
4 5
9
Analyst
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
 Awareness- Development and deployment of tailored and impactful training content
to ensure organization-wide awareness and adoption of cyber security priorities.
 Governance- Establishment of environment-specific cyber strategy, policies, and
procedures, along with impactful organizational designs and operating models.
 Human Capital Development- Fostering and maintaining a secure cyber
environment via attracting, developing, and retaining a high-performing cyber
workforce.
 Information Risk Management- Design and delivery of processes and tools for
methodically identifying, analyzing, prioritizing, responding to, and monitoring cyber
risks.
 Organizational Change Management- Holistically managing the transition of
business processes, technologies, and cultures from a current state to a desired
target state.
Mature- Build and manage a world-class cyber program and
workforce.
10
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Effective governance requires a comprehensive and
detailed strategy backed by clear and effective policies
11
Functional and
enabling controls
Functional controls are more technical/operational in nature (e.g., application security,
vulnerability assessment), while enabling controls pertain to governance, risk management, and
other organizational functions that support (i.e., enable) the technical operations
Appropriate Level
Views- high and
low
Logically organized objectives and measures that are used to pinpoint and evaluate specific
aspects of your security program
Address all
dimensions
People, process, and technology dimensions – Multifaceted views that let you evaluate each
control area in its key component parts
Maturity Spectrum A maturity spectrum of granular and measureable details – A clear scale of maturity, defined by
characteristics and indicators to accurately assess your level of maturity
Best Practices A foundation grounded in established best practices – Developed from best practices across
industry, government, and academia.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Current state of the industry
Where it is going
Implications
Case Study- The electric utility industry
12
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
All investor and privately held utilities are regulated by state
regulatory commissions and federal agencies
Why Regulated?
 Utilities are “natural monopolies”
• Major scale economies on distribution
• Generation not a “natural monopoly”
• Retail not a “natural monopoly” although significant scale economies apply
 Utilities provide a public “good”
• Integral to function of society and economy
• Safety and reliability issues
State Utility
Commissions
DOE,
NERC, DOT,
et. al.
FERC
Rates and Services
Service Complaints
Reliability
Service Territory
Expansions /
Investments
Ownership
Reporting
Ownership
Reliability
Access
Reporting
Reliability
Safety
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
An electric transaction in a market with a single buyer and
competitive generation
Utility
Transmission
Residential
Customers
Commercial
Customers
Industrial
Customers
Utility Buyer
Utility Generation
Distribution
Independent
Generation
Independent
Generation
Examples: Georgia, Alabama
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
An electric transaction in a market with wholesale /
industrial competition
Utility
Transmission
Distribution
Regulated Utility
Generation
Independent
Generation
Independent
Generation
Wholesale
Marketers
System
Operations
Residential
Customers
Small
Commercial
Customers
Industrial
Customers
Large
Commercial
Customers
Generation
Coordinator
Examples: New York, California
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Due to regulation, utilities have limited options for making
and spending money
Utilities’ profit is almost always best on a regulated rate
of return on capital investment
Operations and Maintenance (including fuel for those
that generate) is usually a pass through, but must be
justified before the regulators (PUS/PSC)
Reliability is their key metric
• Used to justify new capital investments
• Poor reliability gets a lot of negative attention from
customers and politicians
• Regulators respond to this negative attention
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Historically, severe weather accounts for the majority of grid
reliability issues, but physical attacks are a growing concern
Major Grid Disturbances
0
20
40
60
80
100
120
140
160
2003 2004 2005 2006 2007 2008 2014
Weather Equipment Control Systems Human Error Load Shedding Other
Number
Of
Incidents
Source: EIA, BAH Analysis
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Compliance Example- DTE Cyber Program Development
18
Detroit Edison (DTE)
Cyber Security Program Assessment and Gap Analysis, Procedure Development
Client
Challenge
Detroit Edison (DTE) sought an outside perspective on their position relative to key
milestone requirements for implementation of NEI 08-09, and support to create a
compliance roadmap including resource estimates to meet required deadlines.
Booz Allen
Solution
To support DTE, Booz Allen:
 Reviewed existing DTE procedures against the requirements of NEI 08-09
 Formulated recommendations to address compliance gaps
 Helped to quantify the LOE required for CDA Assessments, Critical System and
CDA identification and documentation, and sustaining program support (excluding
remediation required from initial assessments)
 Assessed DTE’s level of compliance with 2012 milestones, and made
recommendations to re-deploy labor to meet this year’s deadlines in the area of
Critical System/CDA identification and documentation
 Initiated effort to support development of the set of additional needed required
procedures
Results DTE implemented recommendations for labor re-direction and is on track to meet all
2012 milestones. Procedures are currently under development to allow full compliance
within the required timeline.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Because of these reasons cyber security has been only a
compliance issue, but things are changing
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
As the grid transforms it will become more dependent upon
“smart” technology- increasing the need for cyber security
20

Contenu connexe

Tendances

NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through SecurityEnergySec
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 

Tendances (20)

NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 

En vedette

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopEnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & ElasticsearchFrom Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & ElasticsearchSematext Group, Inc.
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Cloudflare
 

En vedette (16)

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion Workshop
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & ElasticsearchFrom Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014
 

Similaire à Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
Hicx briefing (nov16)
Hicx briefing (nov16)Hicx briefing (nov16)
Hicx briefing (nov16)Grant Watling
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Superdistribution by David Worlock
Superdistribution by David WorlockSuperdistribution by David Worlock
Superdistribution by David WorlockDave Kellogg
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxmccormicknadine86
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxtiffanyd4
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEIJNSA Journal
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Conference – iHT2
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Hiten Sethi
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBooz Allen Hamilton
 
Utility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance CapabilitiesUtility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance CapabilitiesBooz Allen Hamilton
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 

Similaire à Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense (20)

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Hicx briefing (nov16)
Hicx briefing (nov16)Hicx briefing (nov16)
Hicx briefing (nov16)
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Superdistribution by David Worlock
Superdistribution by David WorlockSuperdistribution by David Worlock
Superdistribution by David Worlock
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
 
Case Study
Case StudyCase Study
Case Study
 
Analytics for Water utilities
Analytics for Water utilitiesAnalytics for Water utilities
Analytics for Water utilities
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
 
Utility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance CapabilitiesUtility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance Capabilities
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 

Plus de EnergySec

Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesEnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityEnergySec
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationEnergySec
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveEnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorEnergySec
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEnergySec
 

Plus de EnergySec (14)

Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s Perspective
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for Utilities
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense

  • 1. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. A Holistic Approach for Reimagining Cyber Defense 23 February 2016
  • 2. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Introduction The Approach • Know • Protect • Respond • Mature Sector Study- The Electric Utility Sector Agenda 2
  • 3. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Mission Booz Allen Hamilton partners with clients to solve their most important and complex problems, making their mission our mission and delivering results that endure What We Bring Expertise, objectivity, and the capabilities of exceptional people —combined with the institutional experience of helping clients succeed for 100 years What Distinguishes Us Booz Allen combines a consultant’s unique problem-solving orientation with deep technical knowledge and strong execution to help clients achieve success in their critical missions The Firm  Annual Revenue — $4 billion  Public corporation  Founded in 1914 Scale and Scope  Over 24,000 talented people, serving clients from more than 80 offices  Approx. 300 staff in Hawaii  Office in Honolulu for over 20 years Booz Allen Hamilton is a leading strategy & technology consulting firm and solutions provider
  • 4. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Asset Management- Realizing tailored asset management systems that enable proper classification, tracking, protection, configuration, and usage of those assets. Situational Awareness- Establishing real-time visibility into your cyber ecosystem, providing insights into activities that impact your unique environment. Threat Intelligence- Providing clear insights on current and emerging threat activity in order to drive more informed and precise decision making. Vulnerability Management- Identifying, quantifying, and prioritizing the vulnerabilities in systems, networks, processes, or applications, and developing plans for intelligently reducing vulnerability. Know- Understand your business and the cyber risk within it 4
  • 5. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Specific alerts and warnings relevant to the client are more valuable than generic reports of vulnerabilities 5 Cyber4Sight- Booz Allen developed the line of Cyber4Sight® to provide cyber threat alerting and warning services, on-call intelligence analysis, and deep web intelligence that warn our clients of threats in near real-time. Insider4Sight- Rogue internal employees fly under the radar of organizations that use network audit tools to prevent outside threats. I4S was created to identify insider threats using advanced detection and analytical tools. Global4Sight- Our line of threat and competitive intelligence Global4Sight™ products combine open-source cloud architecture with social media research and intelligence analysis to give clients key information on global threats and global market opportunities.
  • 6. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .  Application Security- Developing and deploying software assurance processes, controls, and countermeasures to secure software applications throughout the product lifecycle--from design to maintenance.  Identity & Access Management- Enabling program design support and deployment of solutions to assure that information is derived from a trusted source and is only available to authorized entities.  Information Protection- Cross-disciplinary solutions to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, recording, and destruction.  Infrastructure & Mobile Security- Providing a stable and resilient baseline infrastructure, along with a flexible and secure mobile platform that meets mission and business needs.  Supplier Security Management- Applying industry-leading, vendor-agnostic solutions to carefully identify, prioritize, and manage risk in your supply chain and across your supplier community. Protect- Secure your organization, operations, products, and services 6
  • 7. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Continuous Monitoring can help Compliance and Network Management/Defense needs across the Enterprise. 7
  • 8. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Incident Response- Support to assess incidents, mitigate the issue, determine the extent of exposure, and manage communications. Postmortem Analysis- Analysis of security incidents to support investigations, document lessons learned, and improve the overall incident response process. Remediation- Development and implementation of targeted action plans for short-term incident containment and longer-term ecosystem resilience. Respond- Triage, respond, and learn from cyber incidents 8
  • 9. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Automated First Responder (AFR) – arms analysts with a proven tool to identify and eradicate APTs APT-specific suite of tools that can rapidly identify APTs and their malicious code Software Distribution Server Collection Server Enterprise Workstations/Servers Standalone Analysis Environment Processing Server Analyst 1 2 3 4 5 9 Analyst
  • 10. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .  Awareness- Development and deployment of tailored and impactful training content to ensure organization-wide awareness and adoption of cyber security priorities.  Governance- Establishment of environment-specific cyber strategy, policies, and procedures, along with impactful organizational designs and operating models.  Human Capital Development- Fostering and maintaining a secure cyber environment via attracting, developing, and retaining a high-performing cyber workforce.  Information Risk Management- Design and delivery of processes and tools for methodically identifying, analyzing, prioritizing, responding to, and monitoring cyber risks.  Organizational Change Management- Holistically managing the transition of business processes, technologies, and cultures from a current state to a desired target state. Mature- Build and manage a world-class cyber program and workforce. 10
  • 11. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Effective governance requires a comprehensive and detailed strategy backed by clear and effective policies 11 Functional and enabling controls Functional controls are more technical/operational in nature (e.g., application security, vulnerability assessment), while enabling controls pertain to governance, risk management, and other organizational functions that support (i.e., enable) the technical operations Appropriate Level Views- high and low Logically organized objectives and measures that are used to pinpoint and evaluate specific aspects of your security program Address all dimensions People, process, and technology dimensions – Multifaceted views that let you evaluate each control area in its key component parts Maturity Spectrum A maturity spectrum of granular and measureable details – A clear scale of maturity, defined by characteristics and indicators to accurately assess your level of maturity Best Practices A foundation grounded in established best practices – Developed from best practices across industry, government, and academia.
  • 12. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Current state of the industry Where it is going Implications Case Study- The electric utility industry 12
  • 13. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . All investor and privately held utilities are regulated by state regulatory commissions and federal agencies Why Regulated?  Utilities are “natural monopolies” • Major scale economies on distribution • Generation not a “natural monopoly” • Retail not a “natural monopoly” although significant scale economies apply  Utilities provide a public “good” • Integral to function of society and economy • Safety and reliability issues State Utility Commissions DOE, NERC, DOT, et. al. FERC Rates and Services Service Complaints Reliability Service Territory Expansions / Investments Ownership Reporting Ownership Reliability Access Reporting Reliability Safety
  • 14. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . An electric transaction in a market with a single buyer and competitive generation Utility Transmission Residential Customers Commercial Customers Industrial Customers Utility Buyer Utility Generation Distribution Independent Generation Independent Generation Examples: Georgia, Alabama
  • 15. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . An electric transaction in a market with wholesale / industrial competition Utility Transmission Distribution Regulated Utility Generation Independent Generation Independent Generation Wholesale Marketers System Operations Residential Customers Small Commercial Customers Industrial Customers Large Commercial Customers Generation Coordinator Examples: New York, California
  • 16. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Due to regulation, utilities have limited options for making and spending money Utilities’ profit is almost always best on a regulated rate of return on capital investment Operations and Maintenance (including fuel for those that generate) is usually a pass through, but must be justified before the regulators (PUS/PSC) Reliability is their key metric • Used to justify new capital investments • Poor reliability gets a lot of negative attention from customers and politicians • Regulators respond to this negative attention
  • 17. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Historically, severe weather accounts for the majority of grid reliability issues, but physical attacks are a growing concern Major Grid Disturbances 0 20 40 60 80 100 120 140 160 2003 2004 2005 2006 2007 2008 2014 Weather Equipment Control Systems Human Error Load Shedding Other Number Of Incidents Source: EIA, BAH Analysis
  • 18. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Compliance Example- DTE Cyber Program Development 18 Detroit Edison (DTE) Cyber Security Program Assessment and Gap Analysis, Procedure Development Client Challenge Detroit Edison (DTE) sought an outside perspective on their position relative to key milestone requirements for implementation of NEI 08-09, and support to create a compliance roadmap including resource estimates to meet required deadlines. Booz Allen Solution To support DTE, Booz Allen:  Reviewed existing DTE procedures against the requirements of NEI 08-09  Formulated recommendations to address compliance gaps  Helped to quantify the LOE required for CDA Assessments, Critical System and CDA identification and documentation, and sustaining program support (excluding remediation required from initial assessments)  Assessed DTE’s level of compliance with 2012 milestones, and made recommendations to re-deploy labor to meet this year’s deadlines in the area of Critical System/CDA identification and documentation  Initiated effort to support development of the set of additional needed required procedures Results DTE implemented recommendations for labor re-direction and is on track to meet all 2012 milestones. Procedures are currently under development to allow full compliance within the required timeline.
  • 19. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Because of these reasons cyber security has been only a compliance issue, but things are changing
  • 20. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . As the grid transforms it will become more dependent upon “smart” technology- increasing the need for cyber security 20