When Bad Things Happen to Good Governments
ü The Year of the Breach ü Real-‐Time Response I (Panel) ü The Cases: 2 You Know, 2 You Don’t ü Real-‐Time Response II (Panel) ü What Have We Learned? ü The 1 Thing (Panel)
Our Time Together
Cyber Security
Breach Hack DDoS
Malware Phishing Malware Spyware Ransom-‐ware
Viruses Worms Botnets
InformaDon Security
Source: Center for Digital Government, Digital States, Coun0es, Ci0es, 2014.
Public IT PrioriDes
1. Cybersecurity 2. Shared Services 3. Cloud 4. Mobility 5. Staffing
1. Cybersecurity 2. Staffing 3. Shared Services 4. Mobility 5. Cost Control
1. Open Gov/Data 2. Mobility 3. Cybersecurity 4. Staffing/Portal 5. DR/ COOP
STATE CIOs COUNTY CIOs CITY CIOs
Elected + Appointed Officials
What Respondents want in a Network
0% 20% 40% 60% 80% 100%
Redundancy
Ease of Maintenance
Availability
Security
Network
Source: Center for Digital Government, 2015.
How Did We Get Here?
Sources: ABC | KRON TV | WCPO TV | WWLP TV | WOCH TV |WTNH TV | KOIN TV | WSJ | AP | Sony | WH.gov
Ripped from the Headlines
The Rise of Hacking Crews Vikingdom2015: From Russia with Malice
Dr. Strangelove or: How I Learned to Stop Worrying and Love the Bomb Source: Universal Studios (1964)
Déjà vu All Over Again Here we are again, 50 years later
How I Learned to Stop Worrying and Love Cybersecurity
Our Panel
Career Defining Breaches
Managing the News Cycle
Managing the News Cycle
Michael Brown
August 9, 2014
Dateline: Ferguson
Flickr: Chuck Jines
August 9, 2014 – January 7, 2015 Sources: Operafon Ferguson/ Al Jazeera America
Global-‐Local HackDvism
Meanwhile in the Capitol…
Google Maps
Dateline: Jefferson City
Flickr: Steve Warren
DAYS THAT MISSOURI WAS A WORLDWIDE
Hackfvist Target: 123
Target: Governor Nixon
Flickr: Steve Warren
Target: Governor Nixon
colorofchange.org
The Grand Jury Decision
Scoh Olson/ Gehy Images
November 24, 2014
Launch and Learn
Flickr: Steve Warren
The one unfinished part of the state’s cybersecurity program and plan when crisis hit: DDoS
Key Learnings: Jefferson City
Flickr: Steve Warren
1 Understand HackDvism MoDves and Methods 2 Understand DDoS Aaacks 3 Assess Your Network and Infrastructure 4 PrioriDze Assets 5 Establish and Exercise a War Room 6 Integrate Network OperaDons Center (NOC) 7 Integrate Security OperaDons Center (SOC) 8 Develop a Plan 9 Monitor Social Media 10 Remain Nimble and Adaptable
From the War Room
There is Something for Everyone to Do
ü Cybersecurity = risk management. ü Security incidents are inevitable. ü Prepare. ü Fund and support. ü Plan PR mifgafon.
Elected and Appointed Officials
What Have We Learned? The LiAle Red Breach Book
What Have We Learned? The LiAle Red Breach Book
Chief InformaDon/ Technology Officers ü Own the plan. ü No surprises. ü Champion a strong cybersecurity culture.
ü Idenffy and apply best pracfces. ü Evaluate and recommend strategies, programs and tools.
ü Monitor and manage crifcal systems and infrastructure.
Chief InformaDon Security Officers
What Have We Learned? The LiAle Red Breach Book
ü Know security implicafons of delivery systems.
ü Encourage employees to take security seriously.
ü Apply agency resources to support cyber security as appropriate.
Agency or Line of Business Managers
What Have We Learned? The LiAle Red Breach Book
ü Understand good cyber security is good for everybody.
ü Train. ü See something, say something. ü If you don’t know what it is, don’t click on it.
Front Line Employees
What Have We Learned? The LiAle Red Breach Book
ü Adopt security best pracfces. ü Adhere to government security requirements.
ü Share informafon regarding suspicious acfvity, incidents or potenfal breaches.
Service Delivery Partners Private Non Profit
What Have We Learned? The LiAle Red Breach Book
Encouraged through awareness campaigns to:
ü Do the basics well. ü Stay alert for common tricks. ü Help authorifes fight cybercrime.
General Public -‐ NeDzens
What Have We Learned? The LiAle Red Breach Book
Thing 1
The Exit QuesDon
govtech.com/security