governmant technology presentation breach powerpoint pdf 4-28-15
DESCRIPTION
Government Technology presentation Breach - When Bad Things Happen to Good GovernmentsTRANSCRIPT
-
When Bad Things Happento Good Governments
-
First Second Third
Our Panel Members:
-
Cyber Security
BreachHackDDoS
MalwarePhishingMalwareSpywareRansom-ware
VirusesWormsBotnets
Information Security
-
Source: Center for Digital Government, Digital States, Counties, Cities, 2014.
Public IT Priorities
1. Cybersecurity2. Shared Services3. Cloud4. Mobility5. Staffing
1. Cybersecurity2. Staffing3. Shared Services4. Mobility5. Cost Control
1. Open Gov/Data2. Mobility3. Cybersecurity4. Staffing/Portal5. DR/ COOP
STATE CIOs COUNTY CIOs CITY CIOs
-
Elected & Appointed Officials
What they want in a network:
0% 20% 40% 60% 80% 100%
Redundancy
Ease of Maintenance
Availability
Security
Source: Center for Digital Government, 2015.
-
How Did We Get Here?
-
Sources: ABC | KRON TV | WCPO TV | WWLP TV | WOCH TV |WTNH TV | WH.gov
Ripped from the Headlines
-
Career-defining Breaches
-
The Rise of Hacking CrewsVikingdom2015: From Russia with Malice
-
Missouri Severely Tested
-
Michael Brown
August 9, 2014
-
Dateline: Ferguson
Flickr: Chuck Jines
-
Sources: Operation Ferguson/ Al Jazeera America
Global-Local Hacktivism
-
Meanwhile in the Capitol
Google Maps
-
War Room 24/7
colorofchange.org
-
Launch and Learn
Flickr: Steve Warren
The one unfinished part of the states cybersecurity program and plan when crisis hit:
DDoS
-
Dateline: Jefferson City
Flickr: Steve Warren
DAYS AS WORLDWIDE
Hacktivist Target: 123
-
Target: Governor Nixon
Flickr: Steve Warren
-
Target: Governor Nixon
colorofchange.org
-
The Grand Jury Decision
Scott Olson/ Getty Images
November 24, 2014
-
What Have We Learned?
Flickr: Steve Warren
1 Understand attacker motives and methods.2 Assess your network and infrastructure.3 Integrate ops centers (network & security). 4 Prioritize assets. 5 Develop a plan.6 Establish and exercise a war room.7 Engage partners early (public & private). 8 Monitor social media.9 Remain nimble and adaptable.10 Everyone has a role.
-
Slides available at www.govtech.com/events
(Past Events tab)
govtech.com/security
-
From the War Room
There is Something for Everyone to Do
To paraphrase a classic film title:
Dr. Strangelove: How I Learned to Stop Worrying and Love Cybersecurity
-
Cybersecurity = risk management. Incidents are inevitable. Prepare. Fund and support. Plan for PR.
Elected and Appointed Officials
What Have We Learned?The Little Red Breach Book
-
What Have We Learned?The Little Red Breach Book
Chief Information/ Technology Officers
Own the plan.Keep stakeholders informed. No
surprises. Champion a strong security
culture.
-
Identify best practices. Evaluate strategies, programs and
tools. Monitor critical systems and
infrastructure.
Chief Information Security Officers
What Have We Learned?The Little Red Breach Book
-
Take it seriously! Scrutinize the delivery systems. Rally agency resources.
Agency or Line of Business Managers
What Have We Learned?The Little Red Breach Book
-
Understand the importance of their own roles.
Train. See something, say something.Dont click on it.
Front Line Employees
What Have We Learned?The Little Red Breach Book
-
Adopt best practices. Adhere to requirements. Share timely information.
Service Delivery Partners PrivateNon Profit
What Have We Learned?The Little Red Breach Book
-
Encouraged through awareness campaigns to:
Do the basics. Stay alert for common tricks. Be a cybercrime-fighter.
General Public - Netizens
What Have We Learned?The Little Red Breach Book