How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT...

27
HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing and Analysis Organization (ISAO) Clearinghouse

Transcript of How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT...

Page 1: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS

State Association of Counties Cybersecurity Information Sharing and Analysis Organization (ISAO) Clearinghouse

Page 2: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing
Page 3: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

• Nearly two-thirds of US counties are rural.

• Multi State Information Sharing Analysis Center (MS-ISAC) has approximately 10% of the 3,069 counties as members.

• These smaller counties have no process to get to general user.

Why is it important that we focus on smaller counties?

Page 4: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

In Iowa, the County Auditor is directly or indirectly responsible for IT in least half of our counties.

Page 5: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Duties of an Iowa County Auditor

1. Budget 2. Clerk to the Board of Supervisors3. Commissioner of Elections4. County Financial Officer5. County Registrar of Voters6. County Tax Accountant7. Custodian of the Courthouse8. Custodian of the Election Returns and Records9. Insurance/Bonds10. Licenses/Permits11. Overseer of the County Plats12. Payroll & Human Resources Manager13. Records and Plans

We have to get and keep cybersecurity on these official’s radar!

Page 6: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

We can’t scare ourselves into a better cybersecurity culture

Page 7: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Cybersecurity Culture

Information

By linking education, information and support through secure communications we can change the cybersecurity culture

Page 8: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

�Background and the Discovery Process�Overview and ‘Live’ Demo�Future Phases�Conclusions

Page 9: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Improving   Information   Sharing  Between  State  Associations  

Improve   Action  Ability   of  Cybersecurity  Information   at  the  Local  Level

Project   Scope

Project Background

Page 10: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

State  Associations

NACo  Application   Store

Cyber   Sources

County   Innovation   Network   (COIN)

US  Counties  Cybersecurity  ISAO  Clearinghouse

Organized national inventory of IT assets

Information and People connected and ready to act in groups or collectively on any cyber related issue.

State culture, associations and organization.

Creates a national to state to local government Information Sharing and Analysis organization.

Build partnerships with Sources

Discovery

Page 11: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

SOLUTION OVERVIEW

Page 12: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Using COIN as a hub.

Mini-me, branded version of COIN per state association.

Integrated links e.g, Application Store (GovAppFinder)

COIN becomes a consolidator of alerts, advisories, and vendor information.

Page 13: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

State Associations determine the ‘Mini-me’ structure that is most effective for their association. I.E., affiliates or business topics (HIPAA, Finance, etc.)

Information is delivered in a business context that is actionable by the non-technical manager

Page 14: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Catalog local government’s contacts and technology usage, state by state

Page 15: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

COIN and vendor products 1. COIN will be requesting vendors to

explain their ‘cyber vigilant’ status, to explain why their customers are ‘cyber safe’

2. This audience will be asked to define key questions for a standard template to use with vendors

3. A catalog will evolve in COIN’s Supplier Zone of 3rd party vendor applications available to government, and their ‘cyber vigilant’ status

Page 16: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

LIVE DEMOSTRATION

Page 17: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

FUTURE

Page 18: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Phase 2

• Identify funding sources to accelerate 50 x ‘mini-me• Continue to build

local and national partnerships• Insurance Pools• Cyber Information• Cyber Resources

Page 19: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Phase 3

• ‘Mini-me’ (branded copy of COIN) per State

• Create specific actions from ‘Advisories’ to user segments

Page 20: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Phase 4

• National collaboration • Events

• Round Tables• Best Practices Sharing• Training & Certification

• Shared Services

• Customization of ‘mini-COIN’ at State Association Level

Page 21: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

CONCLUSIONThe US Counties ISAO strategy transforms today’s process

Page 22: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Provides one place to go for Cybersecurity• Organizes information in one place

• Homeland Security Advisories• Organizes them in one place, and in categories • Adds tags, making them searchable

• Enables all other sources • Vendors

• Improving R&D, as vendors educate about new solutions – what's real and what isn’t

• With programs to attract vendors to communicate their ‘Cyber health’

• Government IT ….

Page 23: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Provides a Tiered Process • Federal – COIN• COIN – State Association of Counties • State Association of Counties – Counties

• Affiliates and Business Topic

Feedback Loop

Page 24: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Provides – an Integrated Collaboration Infrastructure per State Association for Cybersecurity

• Helps day-day government collaboration• Embracing non-technical staff• Beyond just Cybersecurity ‘information processing’

• E.g., groups with conversations, information sharing, folders • Connected to a national network

• With support of national association (NACo)• Can extend beyond Cybersecurity

• Across other government collaboration needs

Page 25: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Provides – a mechanism to change our approach to cybersecurity culture

Cybersecurity Culture

Information

Finally…….

Page 26: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

Valerie TaliaOakland County, MI

Lorene SteffesIndependent Business Advisor and Consultant

Jerryl GuyNational Association of Counties

David FreemanLimestone County, AR

Alelie LlapitanSolutionize

Peter WattsSolutionize

Bert JarreauNational Association of Counties

Andrew DolanCenter for Internet Security

Jim TaylorOakland County, MI

Bill Peterson Iowa State Association of Counties

TEAM

Page 27: How to eat the sybersecurity elephant in bite-sized … to...HOW TO EAT THE CYBERSECURITY ELEPHANT IN BITE-SIZED CHUNKS State Association of Counties Cybersecurity Information Sharing

QUESTIONS AND DISCUSSION