1 / 13

Homeland Security Cyber Threat Discussion INFRAGARD 2012

Homeland Security Cyber Threat Discussion INFRAGARD 2012. UNCLASSIFIED/FOR OFFICIAL USE ONLY. Richard C. Baron Executive Director Ohio Homeland Security Homeland Security Advisor to Ohio. What Does Cyber Threat Mean. Risk = Threat X Vulnerability X Consequence. Risk = What is at risk.

cid
Download Presentation

Homeland Security Cyber Threat Discussion INFRAGARD 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Security Cyber Threat Discussion INFRAGARD 2012 UNCLASSIFIED/FOR OFFICIAL USE ONLY Richard C. Baron Executive Director Ohio Homeland Security Homeland Security Advisor to Ohio

  2. What Does Cyber Threat Mean Risk = Threat X Vulnerability X Consequence Risk = What is at risk Threat = What is the threat Vulnerability= What is the vulnerability Consequence = What is the consequence UNCLASSIFIED/FOR OFFICIAL USE ONLY

  3. Cyber Space UNCLASSIFIED/FOR OFFICIAL USE ONLY

  4. Focus of CYBER Security Private Sector Systems People UNCLASSIFIED/FOR OFFICIAL USE ONLY

  5. Focus of CYBER Security Public Sector Systems People UNCLASSIFIED/FOR OFFICIAL USE ONLY

  6. Rick’s Rules #1 The time to plan is not at the time of crisis! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY Source U.S Cyber Command

  7. Rick’s Rules #2 The event causing the crisis de jour was most likely not an event that could not be anticipated! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY

  8. Gordon Graham’s General Rule If it is predictable its preventable! Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY

  9. What Are We Trying To Protect Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY

  10. Fundamental Principles Similar crimes are committed by similar personalities that do similar things. Multi-State ISAC (MS-ISAC) Just Like Similar systems and operating systems have similar processes and behave in similar ways. UNCLASSIFIED/FOR OFFICIAL USE ONLY

  11. Considerations for Planning • Work through existing support channels INFRAGARD • Pre-coordinate with: • State CIO / CISO • State OHS/EMA • DHS coordinators for the state • Local FBI representatives • NORTHCOM EPLO (Emergency Preparedness Liaison Officer) • National Guard JFHQ (Joint Operations Center) for ANG and ARNG capabilities (NWS and CND teams) • Multi use Title 10 / Title 32 / State AD / DSCA • The common technology base in the NG provides ability for use both in combat operations or response to state emergencies • Commercial providers – Technical extension, ability to mix contract service providers with DOD tactical systems, local cyber response elements • Academic assets, Universities and Cyber training schools Multi-State ISAC (MS-ISAC) UNCLASSIFIED/FOR OFFICIAL USE ONLY

  12. Discussion UNCLASSIFIED/FOR OFFICIAL USE ONLY

  13. Contact Information UNCLASSIFIED/FOR OFFICIAL USE ONLY

More Related