SlideShare a Scribd company logo
1 of 27
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Tabletop exercises ARE more fun
than setting fires
Christopher Walcutt, CISM, CISSP
Director
DirectDefense
11/11/2017
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Why Tabletop?
2
This Photo by Unknown Author is licensed under CC BY-NC-SA
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
How?
3
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Why Now?
4
This Photo by Unknown Author is licensed under CC BY-NC-SA
Information
Sharing
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
What to Expect?
5
Simulated exercise Designed to challenge
Foster interaction and
communication across
organizations
Coordinated physical and
cyber attacks
Practice, Practice, Practice!Check your readiness
KNOW the phases
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Whoโ€™s involved?
6
Planning (Security/Business Continuity)
Business HR Execs
Physical
Security
Corp
Comms
IT
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
How it works?
7
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
You are not alone
8
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Expectations of you
9
Full two day commitment
Need buy-in and support from management to participate
No โ€œday jobโ€ activities during the exercise
Teamwork is key
Be prepared to learn and teach
Most scenarios will require multiple disciplines/skill sets
Scenarios will change during the course of the day
Effective communication is essential
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
What to Expect?
10
โ€ข Post meeting discussions
โ€ข Establish Incident Command Structure positions
โ€ข Determine future meeting schedule
โ€ข Where, when, and how long to meet
โ€ข Determine how communications will be handled
โ€ข SharePoint or other appropriate site
โ€ข Identify other groups needed to participate
โ€ข Continue to mature the exercise
โ€ข Metrics
โ€ข Simulations
โ€ข Advanced Attack Methods
โ€ข Increased Information Protection
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
What to Expect?
11
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Incident Reporting
12
โ€ข Regulators
โ€ข Industry ISACs (REN-ISAC,
FS-ISAC, E-ISAC)
โ€ข Timing Requirements
โ€ข Interface with third parties
โ€ข Contractual Requirements
โ€ข Insurance Requirements
โ€ข Outside Counsel
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
What the MSEL?
13
Injects are scenarios
They appear quickly and overlap
Designed to test and may induce stress
Beware the modifiers
Take notes
Stay engaged
Phone a friend
Use the facilitator
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Resource Planning (Timing)
14
`
Phase 2 5 10 15 20 25 30 35 40 45 50 55 60
Technical
Operations
Physical
Phase 3 5 10 15 20 25 30 35 40 45 50 55 60
Technical
Operations
Physical
Phase 4 5 10 15 20 25 30 35 40 45 50 55 60
Technical
Operations
Physical
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Resource Planning (Effort)
15
Day Move Inject Technical Operations Physical Group Interaction Start Time (minutes)
Day 1
Move 1
NERC 1.3 1 2 2 Technical contacts others T-0 Hold other inject sheets
NERC 1.3.2 3 0 0 None T-5
NERC 1.5 0 0 3 None T-10
NERC 1.8 2 3 3 Coordination required T-20 Ties to NERC 1.5
NERC 1.4 2 0 0 None T-30
NERC 1.11 3 0 0 None T-0 Ties to NERC 1.8
NERC 1.7 2 3 0 Coordination required T-0
SOC Breach 1 0 0 5 None T-0 TBD
NERC 1.5.1
NERC 1.5.2
2 3 4 Coordination required T-30
Move 2
NERC 2.1 1 2 0 Technical contacts Operations T-0 Hold Operations inject sheets
NERC 2.19 0 0 3 None T-0
NERC 2.7 2 2 0 Technical contacts Operations T-15 Hold Operations inject sheets; ties to NERC 1.11
NERC 2.4 2 3 0 Operations contacts Technical T-30 Hold Technical inject sheets
NERC 2.8 2 3 2 Coordination required T-40
SOC Breach 2 0 0 5 None T-0
NERC 2.1.1 4 2 0 Coordination required T-0
NERC 2.4.1 1 2 0 Coordination required T-10
NERC 2.12 3 2 3 Operations contacts others T-30 Hold other inject sheets
NERC 2.17 3 0 0 None T-45
Day 2
Move 3
NERC 3.2.1 2 2 2 None T-0 Remind teams of personnel limitations incurred
NERC 3.11 2 0 0 None T-10 Remind teams of resource limitations incurred
NERC 3.12 2 3 3 Coordination required T-10 Damage ties to NERC 2.7
NERC 3.12.1 3 3 2 Coordination required T-15
NERC 3.5.1 4 4 3 Coordination required T-30
NERC 3.9 3 2 0 Coordination required T-0
NERC 3.14 2 2 3 Coordination required T-10 Dependent on documented processes
NERC 3.10 1 0 0 None T-20
NERC 3.13 3 3 2 Coordination required T-30
Move 4
NERC 4.2.1 3 2 2 Coordination required T-0
NERC 4.3 2 4 0 Coordination required T-10
SOC Breach 3 0 0 5 None T-10 TBD
NERC 4.5 2 2 0 Coordination required T-20
NERC 4.7 1 0 2 Coordination required T-30
NERC 4.6 2 2 0 Coordination required T-30
NERC 4.8 2 4 0 Coordination required T-40
Estimated Effort Level Phase 2
0 Inject does not apply to group Phase 3
1 Minimal effort; 5 minutes Phase 4
2 10 minutes Phase 5
3 Moderate effort; 15 minutes Phase 6
4 20 minutes Phase 7
5 Extreme effort; 30+ minutes Borders indicate breaks
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Resource Planning (Count)
16
Move 1 P2 Move 1 P3 Move 2 P4 Move 2 P5 Move 3 Move 4
Technical 4 3.5 4 4 9 6
Operations 2 2.5 4 3 7 5
Physical 3 2.5 2 2 6 3
0 1 2 3 4 5 6 7 8 9 10
Move 1 P2
Move 1 P3
Move 2 P4
Move 2 P5
Move 3
Move 4
Physical
Operations
Technical
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
Roles
โ€ขInterfaces directly with the AC
โ€ขCoordinates incident response activities
โ€ขEmpowered to make departmental decisions
Deputy Incident
Commander (D-IC)
โ€ขFills the same role as the D-IC
Backup Deputy
Incident Commander
โ€ขCollects, evaluates, and disseminates information
โ€ขMaintains intelligence on the situation
โ€ขMaintains and monitors status of resources assigned to the incident
โ€ขCoordinates department on-call and schedule rotations, vendor services
Planning Section
Chief (P-SC)
โ€ขManages on-scene tactical operations goals
โ€ขGoals relate to mitigation/remediation, protection and control
โ€ขCollect and preserve data
โ€ขLiaison between incident personnel and D-IC
Operations Section
Chief (O-SC)
17
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
ACTIVATING THE SIRT
18
SIRT must be contacted when the incident classification table is utilized!
State Public Commission Committee must be notified if incidents meet CIP parameters!
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
DOCUMENT STRUCTURE
19
โ€ข UIRP:
โ€ข This document addresses cyber and physical security events affecting corporate assets which may
negatively impact the risk posture of the corporation
โ€ข This document covers a corporate-level framework; individual departments are responsible for
creating detailed procedures
โ€ข Personnel involved in this framework are part of the IUSAN Incident Command System (ICS)
โ€ข ICS:
โ€ข A two-tiered command structure coordinated at a company level by the Area Command layer and
specific division level activities carried out by the Incident Command layer
โ€ข Enacted for physical and cyber incidents that are not related to storms
โ€ข The UIRP document and ICS structure must meet requirements laid out by:
โ€ข National Institute of Standards and Technology (SP 800-61 Rev 2, SP 800-122)
โ€ข International Organization for Standardization ISO/IEC 27035:2011
โ€ข North American Electric Reliability Corporation CIP-008-5
โ€ข Sarbanes-Oxley Act of 2002
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
ICS
20
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
REPORTING WORKFLOW
21
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
BOOM
22
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
LESSONS LEARNED
23
Normal Operations
& Contingency
Planning
Incident
Response
Training
Information
Sharing
Security Clearances
Off-hours Support from Spain
Event Notification, Discussions, and Training
OT Backbone Network Monitoring
Electric Operations Resource Prioritization
SDLC with Security Focus
Resourcing During Events
Corporate Mechanism for Lessons Learned
Paper Copies of Procedures (Go Bags)
Hot Line Phones
Criteria for IT / OT Network Disconnect
Reviewing Recent Alerts / Past Events
Talking Points for PLO / PIO Execs
Data Owner / Data Custodian
First Responder Training / Forensics
Notification Sharing & Repository
Notification Triggers
Central Inventory Repository
Estimated Time to Recovery
Asset Classification
Data Retention
Baseline Configuration
People
Process
Technology
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
LESSONS LEARNED PLANNING
24
Post Exercise โ€“ 5-Year Development Plan
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
PRIORITIZATION
25
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
TRACKING
26
NTXISSA Cyber Security Conference โ€“ November 10-11, 2017
@NTXISSA #NTXISSACSC5
27
Thank you
cwalcutt@directdefense.com
410-207-9117

More Related Content

What's hot

The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
Kaspersky
ย 
Ransomware in targeted attacks
Ransomware in targeted attacksRansomware in targeted attacks
Ransomware in targeted attacks
Kaspersky
ย 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
North Texas Chapter of the ISSA
ย 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
North Texas Chapter of the ISSA
ย 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
North Texas Chapter of the ISSA
ย 

What's hot (20)

NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
ย 
Prรฉsentation kaspersky threat intelligence services
Prรฉsentation kaspersky threat intelligence servicesPrรฉsentation kaspersky threat intelligence services
Prรฉsentation kaspersky threat intelligence services
ย 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
ย 
How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI) How to Increase ICS Cybersecurity Return on Investment (ROI)
How to Increase ICS Cybersecurity Return on Investment (ROI)
ย 
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
ย 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
ย 
Ransomware in targeted attacks
Ransomware in targeted attacksRansomware in targeted attacks
Ransomware in targeted attacks
ย 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions
ย 
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
ย 
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
ย 
JS Fest 2019. ะะฝะฐัั‚ะฐัะธั ะ’ะพะนั‚ะพะฒะฐ. "Defense in depth": trench warfare principle...
JS Fest 2019. ะะฝะฐัั‚ะฐัะธั ะ’ะพะนั‚ะพะฒะฐ. "Defense in depth": trench warfare principle...JS Fest 2019. ะะฝะฐัั‚ะฐัะธั ะ’ะพะนั‚ะพะฒะฐ. "Defense in depth": trench warfare principle...
JS Fest 2019. ะะฝะฐัั‚ะฐัะธั ะ’ะพะนั‚ะพะฒะฐ. "Defense in depth": trench warfare principle...
ย 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
ย 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloud
ย 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
ย 
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
ย 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
ย 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
ย 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
ย 
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
ย 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
ย 

Similar to Purple seven-ntxissacsc5 walcutt

Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
North Texas Chapter of the ISSA
ย 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
ย 

Similar to Purple seven-ntxissacsc5 walcutt (20)

Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
ย 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
ย 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
ย 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
ย 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
ย 
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
ย 
SplunkLive! Warsaw 2016 - Cisco
SplunkLive! Warsaw 2016 - Cisco SplunkLive! Warsaw 2016 - Cisco
SplunkLive! Warsaw 2016 - Cisco
ย 
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
ย 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
ย 
Cisco Connect Toronto - Digital Conference Guide
Cisco Connect Toronto - Digital Conference GuideCisco Connect Toronto - Digital Conference Guide
Cisco Connect Toronto - Digital Conference Guide
ย 
SplunkLive! Utrecht 2017 - ASML Customer Presentation
SplunkLive! Utrecht 2017 - ASML Customer PresentationSplunkLive! Utrecht 2017 - ASML Customer Presentation
SplunkLive! Utrecht 2017 - ASML Customer Presentation
ย 
Accenture & NextNine โ€“ Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine โ€“ Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine โ€“ Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine โ€“ Medium Size Oil & Gas Company Cyber Security Case Study
ย 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
ย 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
ย 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
ย 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
ย 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
ย 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
ย 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
ย 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
ย 

More from North Texas Chapter of the ISSA

Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
ย 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
North Texas Chapter of the ISSA
ย 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
North Texas Chapter of the ISSA
ย 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
ย 
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
North Texas Chapter of the ISSA
ย 

More from North Texas Chapter of the ISSA (17)

Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
ย 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
ย 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
ย 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
ย 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
ย 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
ย 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
ย 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
ย 
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finneyNtxissacsc5 blue 1-nine cybersecurity habits-george_finney
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney
ย 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
ย 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
ย 
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protectionโ€• Cross Roads between Ethics, I...
ย 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
ย 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
ย 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
ย 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
ย 
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
ย 

Recently uploaded

๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
nirzagarg
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
SUHANI PANDEY
ย 
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
nirzagarg
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 

Recently uploaded (20)

๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
ย 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
ย 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
ย 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Salem Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
ย 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
ย 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 

Purple seven-ntxissacsc5 walcutt

  • 1. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Tabletop exercises ARE more fun than setting fires Christopher Walcutt, CISM, CISSP Director DirectDefense 11/11/2017
  • 2. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Why Tabletop? 2 This Photo by Unknown Author is licensed under CC BY-NC-SA
  • 3. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 How? 3
  • 4. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Why Now? 4 This Photo by Unknown Author is licensed under CC BY-NC-SA Information Sharing
  • 5. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 What to Expect? 5 Simulated exercise Designed to challenge Foster interaction and communication across organizations Coordinated physical and cyber attacks Practice, Practice, Practice!Check your readiness KNOW the phases
  • 6. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Whoโ€™s involved? 6 Planning (Security/Business Continuity) Business HR Execs Physical Security Corp Comms IT
  • 7. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 How it works? 7
  • 8. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 You are not alone 8
  • 9. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Expectations of you 9 Full two day commitment Need buy-in and support from management to participate No โ€œday jobโ€ activities during the exercise Teamwork is key Be prepared to learn and teach Most scenarios will require multiple disciplines/skill sets Scenarios will change during the course of the day Effective communication is essential
  • 10. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 What to Expect? 10 โ€ข Post meeting discussions โ€ข Establish Incident Command Structure positions โ€ข Determine future meeting schedule โ€ข Where, when, and how long to meet โ€ข Determine how communications will be handled โ€ข SharePoint or other appropriate site โ€ข Identify other groups needed to participate โ€ข Continue to mature the exercise โ€ข Metrics โ€ข Simulations โ€ข Advanced Attack Methods โ€ข Increased Information Protection
  • 11. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 What to Expect? 11
  • 12. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Incident Reporting 12 โ€ข Regulators โ€ข Industry ISACs (REN-ISAC, FS-ISAC, E-ISAC) โ€ข Timing Requirements โ€ข Interface with third parties โ€ข Contractual Requirements โ€ข Insurance Requirements โ€ข Outside Counsel
  • 13. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 What the MSEL? 13 Injects are scenarios They appear quickly and overlap Designed to test and may induce stress Beware the modifiers Take notes Stay engaged Phone a friend Use the facilitator
  • 14. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Resource Planning (Timing) 14 ` Phase 2 5 10 15 20 25 30 35 40 45 50 55 60 Technical Operations Physical Phase 3 5 10 15 20 25 30 35 40 45 50 55 60 Technical Operations Physical Phase 4 5 10 15 20 25 30 35 40 45 50 55 60 Technical Operations Physical
  • 15. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Resource Planning (Effort) 15 Day Move Inject Technical Operations Physical Group Interaction Start Time (minutes) Day 1 Move 1 NERC 1.3 1 2 2 Technical contacts others T-0 Hold other inject sheets NERC 1.3.2 3 0 0 None T-5 NERC 1.5 0 0 3 None T-10 NERC 1.8 2 3 3 Coordination required T-20 Ties to NERC 1.5 NERC 1.4 2 0 0 None T-30 NERC 1.11 3 0 0 None T-0 Ties to NERC 1.8 NERC 1.7 2 3 0 Coordination required T-0 SOC Breach 1 0 0 5 None T-0 TBD NERC 1.5.1 NERC 1.5.2 2 3 4 Coordination required T-30 Move 2 NERC 2.1 1 2 0 Technical contacts Operations T-0 Hold Operations inject sheets NERC 2.19 0 0 3 None T-0 NERC 2.7 2 2 0 Technical contacts Operations T-15 Hold Operations inject sheets; ties to NERC 1.11 NERC 2.4 2 3 0 Operations contacts Technical T-30 Hold Technical inject sheets NERC 2.8 2 3 2 Coordination required T-40 SOC Breach 2 0 0 5 None T-0 NERC 2.1.1 4 2 0 Coordination required T-0 NERC 2.4.1 1 2 0 Coordination required T-10 NERC 2.12 3 2 3 Operations contacts others T-30 Hold other inject sheets NERC 2.17 3 0 0 None T-45 Day 2 Move 3 NERC 3.2.1 2 2 2 None T-0 Remind teams of personnel limitations incurred NERC 3.11 2 0 0 None T-10 Remind teams of resource limitations incurred NERC 3.12 2 3 3 Coordination required T-10 Damage ties to NERC 2.7 NERC 3.12.1 3 3 2 Coordination required T-15 NERC 3.5.1 4 4 3 Coordination required T-30 NERC 3.9 3 2 0 Coordination required T-0 NERC 3.14 2 2 3 Coordination required T-10 Dependent on documented processes NERC 3.10 1 0 0 None T-20 NERC 3.13 3 3 2 Coordination required T-30 Move 4 NERC 4.2.1 3 2 2 Coordination required T-0 NERC 4.3 2 4 0 Coordination required T-10 SOC Breach 3 0 0 5 None T-10 TBD NERC 4.5 2 2 0 Coordination required T-20 NERC 4.7 1 0 2 Coordination required T-30 NERC 4.6 2 2 0 Coordination required T-30 NERC 4.8 2 4 0 Coordination required T-40 Estimated Effort Level Phase 2 0 Inject does not apply to group Phase 3 1 Minimal effort; 5 minutes Phase 4 2 10 minutes Phase 5 3 Moderate effort; 15 minutes Phase 6 4 20 minutes Phase 7 5 Extreme effort; 30+ minutes Borders indicate breaks
  • 16. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Resource Planning (Count) 16 Move 1 P2 Move 1 P3 Move 2 P4 Move 2 P5 Move 3 Move 4 Technical 4 3.5 4 4 9 6 Operations 2 2.5 4 3 7 5 Physical 3 2.5 2 2 6 3 0 1 2 3 4 5 6 7 8 9 10 Move 1 P2 Move 1 P3 Move 2 P4 Move 2 P5 Move 3 Move 4 Physical Operations Technical
  • 17. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 Roles โ€ขInterfaces directly with the AC โ€ขCoordinates incident response activities โ€ขEmpowered to make departmental decisions Deputy Incident Commander (D-IC) โ€ขFills the same role as the D-IC Backup Deputy Incident Commander โ€ขCollects, evaluates, and disseminates information โ€ขMaintains intelligence on the situation โ€ขMaintains and monitors status of resources assigned to the incident โ€ขCoordinates department on-call and schedule rotations, vendor services Planning Section Chief (P-SC) โ€ขManages on-scene tactical operations goals โ€ขGoals relate to mitigation/remediation, protection and control โ€ขCollect and preserve data โ€ขLiaison between incident personnel and D-IC Operations Section Chief (O-SC) 17
  • 18. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 ACTIVATING THE SIRT 18 SIRT must be contacted when the incident classification table is utilized! State Public Commission Committee must be notified if incidents meet CIP parameters!
  • 19. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 DOCUMENT STRUCTURE 19 โ€ข UIRP: โ€ข This document addresses cyber and physical security events affecting corporate assets which may negatively impact the risk posture of the corporation โ€ข This document covers a corporate-level framework; individual departments are responsible for creating detailed procedures โ€ข Personnel involved in this framework are part of the IUSAN Incident Command System (ICS) โ€ข ICS: โ€ข A two-tiered command structure coordinated at a company level by the Area Command layer and specific division level activities carried out by the Incident Command layer โ€ข Enacted for physical and cyber incidents that are not related to storms โ€ข The UIRP document and ICS structure must meet requirements laid out by: โ€ข National Institute of Standards and Technology (SP 800-61 Rev 2, SP 800-122) โ€ข International Organization for Standardization ISO/IEC 27035:2011 โ€ข North American Electric Reliability Corporation CIP-008-5 โ€ข Sarbanes-Oxley Act of 2002
  • 20. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 ICS 20
  • 21. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 REPORTING WORKFLOW 21
  • 22. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 BOOM 22
  • 23. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 LESSONS LEARNED 23 Normal Operations & Contingency Planning Incident Response Training Information Sharing Security Clearances Off-hours Support from Spain Event Notification, Discussions, and Training OT Backbone Network Monitoring Electric Operations Resource Prioritization SDLC with Security Focus Resourcing During Events Corporate Mechanism for Lessons Learned Paper Copies of Procedures (Go Bags) Hot Line Phones Criteria for IT / OT Network Disconnect Reviewing Recent Alerts / Past Events Talking Points for PLO / PIO Execs Data Owner / Data Custodian First Responder Training / Forensics Notification Sharing & Repository Notification Triggers Central Inventory Repository Estimated Time to Recovery Asset Classification Data Retention Baseline Configuration People Process Technology
  • 24. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 LESSONS LEARNED PLANNING 24 Post Exercise โ€“ 5-Year Development Plan
  • 25. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 PRIORITIZATION 25
  • 26. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 TRACKING 26
  • 27. NTXISSA Cyber Security Conference โ€“ November 10-11, 2017 @NTXISSA #NTXISSACSC5 27 Thank you cwalcutt@directdefense.com 410-207-9117