governmant technology presentation breach powerpoint pdf 4-28-15

33
When Bad Things Happen to Good Governments

Upload: erepublic

Post on 09-Nov-2015

59 views

Category:

Documents


0 download

DESCRIPTION

Government Technology presentation Breach - When Bad Things Happen to Good Governments

TRANSCRIPT

  • When Bad Things Happento Good Governments

  • First Second Third

    Our Panel Members:

  • Cyber Security

    BreachHackDDoS

    MalwarePhishingMalwareSpywareRansom-ware

    VirusesWormsBotnets

    Information Security

  • Source: Center for Digital Government, Digital States, Counties, Cities, 2014.

    Public IT Priorities

    1. Cybersecurity2. Shared Services3. Cloud4. Mobility5. Staffing

    1. Cybersecurity2. Staffing3. Shared Services4. Mobility5. Cost Control

    1. Open Gov/Data2. Mobility3. Cybersecurity4. Staffing/Portal5. DR/ COOP

    STATE CIOs COUNTY CIOs CITY CIOs

  • Elected & Appointed Officials

    What they want in a network:

    0% 20% 40% 60% 80% 100%

    Redundancy

    Ease of Maintenance

    Availability

    Security

    Source: Center for Digital Government, 2015.

  • How Did We Get Here?

  • Sources: ABC | KRON TV | WCPO TV | WWLP TV | WOCH TV |WTNH TV | WH.gov

    Ripped from the Headlines

  • Career-defining Breaches

  • The Rise of Hacking CrewsVikingdom2015: From Russia with Malice

  • Missouri Severely Tested

  • Michael Brown

    August 9, 2014

  • Dateline: Ferguson

    Flickr: Chuck Jines

  • Sources: Operation Ferguson/ Al Jazeera America

    Global-Local Hacktivism

  • Meanwhile in the Capitol

    Google Maps

  • War Room 24/7

    colorofchange.org

  • Launch and Learn

    Flickr: Steve Warren

    The one unfinished part of the states cybersecurity program and plan when crisis hit:

    DDoS

  • Dateline: Jefferson City

    Flickr: Steve Warren

    DAYS AS WORLDWIDE

    Hacktivist Target: 123

  • Target: Governor Nixon

    Flickr: Steve Warren

  • Target: Governor Nixon

    colorofchange.org

  • The Grand Jury Decision

    Scott Olson/ Getty Images

    November 24, 2014

  • What Have We Learned?

    Flickr: Steve Warren

    1 Understand attacker motives and methods.2 Assess your network and infrastructure.3 Integrate ops centers (network & security). 4 Prioritize assets. 5 Develop a plan.6 Establish and exercise a war room.7 Engage partners early (public & private). 8 Monitor social media.9 Remain nimble and adaptable.10 Everyone has a role.

  • Slides available at www.govtech.com/events

    (Past Events tab)

    govtech.com/security

  • From the War Room

    There is Something for Everyone to Do

    To paraphrase a classic film title:

    Dr. Strangelove: How I Learned to Stop Worrying and Love Cybersecurity

  • Cybersecurity = risk management. Incidents are inevitable. Prepare. Fund and support. Plan for PR.

    Elected and Appointed Officials

    What Have We Learned?The Little Red Breach Book

  • What Have We Learned?The Little Red Breach Book

    Chief Information/ Technology Officers

    Own the plan.Keep stakeholders informed. No

    surprises. Champion a strong security

    culture.

  • Identify best practices. Evaluate strategies, programs and

    tools. Monitor critical systems and

    infrastructure.

    Chief Information Security Officers

    What Have We Learned?The Little Red Breach Book

  • Take it seriously! Scrutinize the delivery systems. Rally agency resources.

    Agency or Line of Business Managers

    What Have We Learned?The Little Red Breach Book

  • Understand the importance of their own roles.

    Train. See something, say something.Dont click on it.

    Front Line Employees

    What Have We Learned?The Little Red Breach Book

  • Adopt best practices. Adhere to requirements. Share timely information.

    Service Delivery Partners PrivateNon Profit

    What Have We Learned?The Little Red Breach Book

  • Encouraged through awareness campaigns to:

    Do the basics. Stay alert for common tricks. Be a cybercrime-fighter.

    General Public - Netizens

    What Have We Learned?The Little Red Breach Book