CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT .

2y ago
19 Views
2 Downloads
1.40 MB
27 Pages
Last View : Today
Last Download : 3m ago
Upload by : Wade Mabry
Transcription

CRISIS MANAGEMENTAND FIRST AID: WHENGOVERNMENTCONTRACTORS ARETHE HEADLINERSWELCOME

CYBER CRISISMANAGEMENT:ARE YOU PREPARED?Evan WolffDavid BodenheimerKelly CurrieKate Growley

Overview Cybersecurity Framework and E.O. 13636updates DoD’s NIST shift & DFARS requirements Cloud security, FedRAMP, & DoD’s special rules Unruly information security rules Responding to a data breach Managing legal, regulatory, business, and publicrelations implications after a data breach105

Executive Order 13636 § 7: Cyber standards for critical infrastructure § 8: Voluntary adoption program § 8(e): Explore possible FAR amendments § 10(a): Assess regulatory authorities106

The CSF Core107

Defining “Adoption” DHS managing voluntary adoption program“An organization adopts the CSF when it uses the concepts depicted bythe CSF as a key part of its systematic process for identifying, assessing,prioritizing, and/or communicating:– cybersecurity risks,– current approaches and efforts to address those risks, and– Steps needed to reduce cybersecurity risks as part of its managementof the organization’s broader risks and priorities.” Sector-specific v. company-specific NIST & DHS public meetings108

Government Contracting ImpactGSA/DOD Report Feasibility – Security Benefits – Relative Merits –Harmonization Six major recommendations1.2.3.4.5.6.Baseline cybersecurity requirementsTrainingCommon definitionsDevise risk management strategy CSFPurchases from OEM, authorized reseller, trusted sourcesIncrease government accountability FISMA ABA Comments submitted109

DoD’s Cyber Game-ChangersDoD’s New Cyber Rules DFARS Security RuleDeath of DIACAPDoD’s Shift to NISTDoD’s Special CloudDoD’s Patchwork Rules110

DFARS Rule on Safeguarding DataKey Requirements Scope– “controlled technical information”– E.g., R&D data, specs, standards Minimum Security Controls– 51 mandatory controls (NIST 800-53) Incident Reporting– Within 72 hours of discovery– Damage assessments & data retention Subcontractor Flowdown– Commercial contractors also78 Fed. Reg. 69273 (Nov. 18, 2013)111

DFARS Rule on Safeguarding DataAre You DFAR’ed? Broad Reach of DFARS Rule– All solicitations & contracts– Technical information everywhere Mandatory Controls– Comply – or else– PCO waiver: Can you get it? Incident Reporting– No safe harbor– Incident response team ready? Subcontractor Flowdown– Who reports what, where & to whom?Noncompliance Risks?Too Soon to Tell but . . . . . . Default Termination Out of Competitive Range Lost Awards & ProtestsWhat’s Next? Prime/Sub Disputes Debarment (e.g., L-3) FCA Claims (e.g., PlastiLam)112

DoD’s Shift to NIST & FISMADeath of DIACAP Dying Slowly– DoD participation in NIST process– DoD Instruction 8582.01 (June 2012)– DFARS Rule (Nov. 2013) DoD Shifts to NIST/FISMA (Finally)– “compulsory and binding” by statute(40 U.S.C. § 11331)– DoD Instruction 8510.01 (Mar. 2014)– DoD Instruction 8500.01 (Mar. 2014)– But see DFARS 239.7102-1 (Olden) DoD replaces DIACAP FISMA & NIST recognized NIST Risk ManagementFramework adopted NIST security controls used113

DoD’s Shift to NIST & FISMADoD Risk FrameworkNIST on Steroids?DoD Theory Harmony with NIST Deductive DIACAP changesImplementation Reality Same DoD security staff Decades of DIACAP history DoD Cloud vs. FedRAMP Watch Out!114

DoD’s Special CloudDoD Cloud ControlsSummary of Controls115

DoD’s Special CloudDoD Cloud ControlsDoD Policy Memo Centralized Control– DISA as Cloud Service Broker Scope– Commercial Cloud Services– Low Impact only Security Controls– Over & above FedRAMP– Matrix of controls116

DoD’s Special CloudDoD Cloud Matrix Physical Access– DoD access to CSP data center Personnel Access– U.S. citizens only Nondisclosure Agreements– NDAs for all CSP personnel Indemnification– CSPs indemnify DoD Insurance– CSPs must have cyber insuranceAcquisition Issues Commercial Items– Standard commercial practices Competition– Unduly restrictive specifications FedRAMP– Government-wide program Executive Order– Harmonization of standards Public Notice & Comment– APA standards117

DoD’s Cyber DisharmonyDoD’s Cyber Crazy Quilt NDAA § 941– “Rapid reporting” requirement– “successful penetration” DFARS Safeguarding Rule– Reporting within 72 hours of discovery– “possible exfiltration, manipulation” DoD Cloud Policy– Notify DoD within 60 minutes– Reporting a “breach” of data DoD Healthcare Data– HIPAA reporting requirementsHarmonization Good Cyber Executive Order– Objective for harmonization DoD/GSA Report– Better security with consistentsecurity rules FedRAMP– Government-wide– Approve once, use often ABA Comments– Need for harmonization118

FedRAMP Changes ComingFedRAMP 2.0 Security Controls– Low & Moderate impact only– Not High impact (only 20% high) Personnel Access– Add additional security controls– Update to NIST 800-53, Rev. 4 Federal Agencies & FedRAMP– Many agencies not adding controlsFedRAMP Changes“The General Services Administration isupdating government-wide standards forsecuring cloud solutions and expects torelease those changes within the next threemonths. The 298 security controls underFedRAMP are based on National Institute ofStandards and Technology guidelines, whichgovern how agencies should secure theirinformation technology systems. NISTupdated those guidelines last year. GSA willrelease plans in the coming weeks for cloudproviders under FedRAMP to transition to thenew standards, said Matt Goodrich, programmanager for FedRAMP.”“GSA to Update Federal Cloud Standards,”Federal Times (Apr. 2, 2014)119

120

Anatomy of a Cyber Event121

Interested Agencies Law Enforcement: FBI, DHS/U.S. Secret ServiceSEC – Reporting and governanceFTC – Recent ‘fairness’ casesDHS – Voluntary adoption programsCritical Sector Lead Agencies:– DOE/FERC– DOT– USCG122

Law Enforcement Resources“[I]n the future, resources devoted to cyberbased threats will equal or even eclipse theresources devoted to non-cyber based terroristthreats.”-- FBI Director James B. ComeyNovember 14, 2013123

Government Response:Coordination and Connecting the DotsNational Cyber Investigative Joint Task Force(NCIJTF) 19 Agencies, led by FBI Includes NSA, CIA, other Intelligence Agencies Includes DHS, U.S. Secret Service Includes military components Liaison with Foreign counterparts124

Coordination and Connecting the DotsNational Cybersecurity & CommunicationsIntegration Center (NCCIC) DHS led Federal departments, agencies, state & locals Private Sector, International entities Information Sharing, Prevention; NotInvestigations & Enforcement125

Do You Know Your LocalCyber Task Force? Cyber Task Forces (56 Across the Country)–––– Investigations of Cyber CrimesActive Outreach to Private Sector, Universities, etc.Best Practices, Information SharingClassified Threat Briefings24-Hour Command Center – CyWatch– Email: cywatch@ic.fbi.gov or– Voice: 1-855-292-3937126

The ProsecutorsDepartment of JusticeComputer Crimes Intellectual Property Section (CCIPS)U.S. Attorney’s Offices (e.g. EDVA, DC, MD)127

Before Your (Next) CybersecurityIncident Does your Information Security Officer KnowWho to Contact? Does Your Inside or Outside Counsel Knowthe Prosecutors?– DOJ/CCIPS– US Attorney’s Offices128

Questions?David e Growley202-624-2698kgrowley@crowell.comKelly Currie212-895-4257kcurrie@crowell.comEvan Wolff202-624-2615ewolff@crowell.com129

Death of DIACAP Dying Slowly – DoD participation in NIST process – DoD Instruction 8582.01 (June 2012) – DFARS Rule (Nov. 2013) DoD Shifts to NIST/FISMA (Finally) – “compulsory and binding” by statute (40 U.S.C. § 11331) – DoD Instruction 8510.01 (Mar. 2014) – D

Related Documents:

Foreign aid has various different forms; economic aid, social aid and "other aid" components are the main ones. Economic aid is a form of physical capital, aid to both infrastructure and the production stage, social aid refers to aid in form of human capital whereas other aid components entail food and emergency aid (Akramova 2012, 119-120).

Crisis Lessons Learned In Crisis Management practice, few absolutes except: An effective Crisis Management program, that has adequate funding and management support, will only be put in place when facing an impending crisis that will produce significant losses. Every Crisis Is Different; If you've seen one crisis, you've seen one crisis.

ACCESS TO GENESEE COUNTY CRISIS SERVICES 08-2012 Additional Crisis Support Needed Emergency Department Refer to Hospital Emergency Dept. for emergent crisis needs that are unable to be met in community. Crisis Call Center GCCMH 24/7 Crisis Line (810) 257-3740 Crisis Needs Met With Crisis Call Center Phone Support CIRT

4 Crisis Management Planning 06 4.1 Organisational Responsibility 06 4.2 Crisis Management Plan 06 4.2.1 Key Pillars of Crisis Response 07 4.2.1.1 Communications and Reporting 07 4.2.1.2 Crisis Management Team (CMT) 07 4.2.1.3 Incident Management Team (IMT) 09 5 Crisis Management 10 5.1 Operational Response 10 5.2 Human Resources Management 11

The 4R Theory of Crisis Management ,which is composed by 4 stages—— Reduction, Readiness, Response, Recovery, was first put forward in the book named Crisis Management by the U.S. crisis management expert Robert Heath[6]. As is shown in the figure: Fig.1: 4R-model of Crisis Management . Crisis reduction management is the core

Operational Training Financial Aid Step Action 1. Click on the FINANCIAL AID option from the menu or click on the REVIEW & ACCEPT FINANCIAL AID hyperlink in the Financial Aid box. Step Action In the GIFT AID section, you will see aid that cannot be modified by a student. Gift Aid includes: Scholarships, Tuition Assistance, Grants, etc.

curriculum developers First Aid trainers Laypeople performing & receiving first aid What is Cochrane First Aid? Thematic Field of Cochrane Mission: Forming a global network of people advocating for the development, dissemination and uptake of high-quality evidence on first aid Promoting the use of evidence on first aid

Basic first aid . for X. Basic first aid for Africa 'Basic first aid' seeks to equip the lay person with . the basic skills needed to effectively provide first aid, both in cases of minor injuries or illnesses or in the case of emergency situations, until professional medical assistance can be provided. How to treat a burn, or a sprained ankle.