SlideShare a Scribd company logo
Building a Modern Security Policy for Social Media Page 1
Who is Michael Smith? ,[object Object]
Graduate of Russian basic course, Defense Language Institute, Monterey, CA
DotCom survivor
Infantryman, deployed to Afghanistan (2004)
CISSP #50247 (2003), ISSEP (2005)
Former CISO, Unisys Federal Service Delivery Center
Currently a Manager in a Big Four Firm,[object Object]
CISSP (2007), CAP (2007)
Federal Information Security Architect for Tantus Technology
Founder of FISMApedia.org and FISMA arts,[object Object]
A Quick Poll Page 5 ,[object Object]
Are you using Government-owned hosting?
Do you don’t know how/where you’re being hosted?
Have you ever ignored the IT Security Staff because they just “get in the way”?,[object Object]
NIST Risk Management Framework Page 7
Defining the Problem Space: SDLC Initiation to O&M is a minimum of 120 days with 6 months being typical.  How does this fit into your plans for social media? Page 8
Understanding Your Objectives Page 9 ,[object Object]
Hosting: CO-CO v/s GO-GO
Security: Enabler v/s Roadblock
Simplicity: Engagement v/s “Shiny Objects”
Be willing to negotiate with the security staff,[object Object]
Threat Landscape Government to Government: Internal social media services within or between agencies Government (internally hosted) to Public: Social media services on government sites Government (externally hosted) to Public: External social media services used by the government Government users in public: Social media services used by government users Page 11
Getting to a Good SocMed Policy Engage early, engage often Policy should focus on risk, not technology Social media technology changes constantly Data protection requirement is constant Consider the business case Consider the risks to organizational operations, organizational assets, individuals, other organizations, and the Nation Make risk-based decisions goals Page 12
Primary Resources CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies, v1.0 http://www.cio.gov/library/library_category2.cfm?structure=Information%20Technology&category=IT%20Security%20/%20Privacy GSA Terms of Service Agreements with New Media Providers http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml NARA Records Management Policy and Guidance http://archives.gov/records-mgmt/policy/ Page 13
Primary Resources - FISMA NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach NIST SP 800-39 DRAFT Managing Risk from Information Systems: An Organizational Perspective SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/PubsSPs.html Page 14
Related Requirements Communications Policy 508 Compliance Policy Federal Records Management Policy Page 15
Risk Management Hierarchy Page 16 ,[object Object],(Oversight and Governance) ,[object Object]
  Risk Mitigation Approaches
  Risk Tolerance
  Risk Monitoring Approaches
  Linkage to ISO/IEC 27001Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System
Risk Management Hierarchy Page 17 Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System ,[object Object]
  Information Flows
  Information Categorization
Information Protection Strategy
  Information Security Requirements
  Linkage to Enterprise Architecture,[object Object]
  Information System Categorization

More Related Content

What's hot

Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of GlobalizationAujas Networks Pvt. Ltd.
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019Amy Lauder
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...Black Duck by Synopsys
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 

What's hot (18)

Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 

Viewers also liked

Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non ProfitsDoug
 
Non Profits and Social Media
Non Profits and Social Media Non Profits and Social Media
Non Profits and Social Media Evelyn McCormack
 
Social media for government
Social media for governmentSocial media for government
Social media for governmentGohar Khan
 
Social Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsSocial Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsEAHarter
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthCraig Thomler
 
Social Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsSocial Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsDayn Wilberding
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social MediaStrategyWorks
 
Social Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopSocial Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopWild Apricot
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentDavid Sweigert
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsMark Schaefer
 
Social Media for Non Profits
Social Media for Non ProfitsSocial Media for Non Profits
Social Media for Non ProfitsPrimal Media
 

Viewers also liked (14)

Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non Profits
 
Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)
 
Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non Profits
 
Non Profits and Social Media
Non Profits and Social Media Non Profits and Social Media
Non Profits and Social Media
 
Social media for government
Social media for governmentSocial media for government
Social media for government
 
Social Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsSocial Media For Non-Profit Administrators
Social Media For Non-Profit Administrators
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW Health
 
Social Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsSocial Media Strategies for Non-Profits
Social Media Strategies for Non-Profits
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social Media
 
Social Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopSocial Media for Non-Profits Workshop
Social Media for Non-Profits Workshop
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State Government
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-Trends
 
Social Media for Non Profits
Social Media for Non ProfitsSocial Media for Non Profits
Social Media for Non Profits
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 

Similar to Building A Modern Security Policy For Social Media and Government

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfRobertBrown631492
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookKristine Simpson
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 

Similar to Building A Modern Security Policy For Social Media and Government (20)

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff Braybrook
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Gilbert "NIST Privacy Framework Version 1.0"
Gilbert "NIST Privacy Framework Version 1.0"Gilbert "NIST Privacy Framework Version 1.0"
Gilbert "NIST Privacy Framework Version 1.0"
 

More from Michael Smith

Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Michael Smith
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Michael Smith
 
Security Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecuritySecurity Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecurityMichael Smith
 
The Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionThe Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionMichael Smith
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government SecurityMichael Smith
 

More from Michael Smith (8)

Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
 
Barcodes
BarcodesBarcodes
Barcodes
 
Dojo Con 09
Dojo Con 09Dojo Con 09
Dojo Con 09
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
 
Security Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecuritySecurity Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application Security
 
The Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionThe Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation Decision
 
Backtrack 3 USB
Backtrack 3 USBBacktrack 3 USB
Backtrack 3 USB
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government Security
 

Recently uploaded

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 

Recently uploaded (20)

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

Building A Modern Security Policy For Social Media and Government

  • 1. Building a Modern Security Policy for Social Media Page 1
  • 2.
  • 3. Graduate of Russian basic course, Defense Language Institute, Monterey, CA
  • 5. Infantryman, deployed to Afghanistan (2004)
  • 6. CISSP #50247 (2003), ISSEP (2005)
  • 7. Former CISO, Unisys Federal Service Delivery Center
  • 8.
  • 10. Federal Information Security Architect for Tantus Technology
  • 11.
  • 12.
  • 13. Are you using Government-owned hosting?
  • 14. Do you don’t know how/where you’re being hosted?
  • 15.
  • 16. NIST Risk Management Framework Page 7
  • 17. Defining the Problem Space: SDLC Initiation to O&M is a minimum of 120 days with 6 months being typical. How does this fit into your plans for social media? Page 8
  • 18.
  • 21. Simplicity: Engagement v/s “Shiny Objects”
  • 22.
  • 23. Threat Landscape Government to Government: Internal social media services within or between agencies Government (internally hosted) to Public: Social media services on government sites Government (externally hosted) to Public: External social media services used by the government Government users in public: Social media services used by government users Page 11
  • 24. Getting to a Good SocMed Policy Engage early, engage often Policy should focus on risk, not technology Social media technology changes constantly Data protection requirement is constant Consider the business case Consider the risks to organizational operations, organizational assets, individuals, other organizations, and the Nation Make risk-based decisions goals Page 12
  • 25. Primary Resources CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies, v1.0 http://www.cio.gov/library/library_category2.cfm?structure=Information%20Technology&category=IT%20Security%20/%20Privacy GSA Terms of Service Agreements with New Media Providers http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml NARA Records Management Policy and Guidance http://archives.gov/records-mgmt/policy/ Page 13
  • 26. Primary Resources - FISMA NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach NIST SP 800-39 DRAFT Managing Risk from Information Systems: An Organizational Perspective SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/PubsSPs.html Page 14
  • 27. Related Requirements Communications Policy 508 Compliance Policy Federal Records Management Policy Page 15
  • 28.
  • 29. Risk Mitigation Approaches
  • 30. Risk Tolerance
  • 31. Risk Monitoring Approaches
  • 32. Linkage to ISO/IEC 27001Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System
  • 33.
  • 35. Information Categorization
  • 37. Information Security Requirements
  • 38.
  • 39. Information System Categorization
  • 40. Selection of Security Controls
  • 41.
  • 42. Risk Acceptance
  • 43. Continuous MonitoringTIER 1 Organization NIST SP 800-37 TIER 2 Mission / Business Process Risk Management Framework TIER 3 Information System
  • 44. Policy Controls Social Media Communications Strategy Acceptable Use Policies (AUP) Content Filtering and Monitoring Privacy and Security Support Integration with NIST SP 800-39 and NIST SP 800-37 Risk Management Page 19
  • 45. Policy Controls – NIST Guidance AC-20 Use of External Information Systems AC-22 Publicly Accessible Content IA-2 Identification and Authentication (Organizational Users) IA-5 Authenticator Management IA-7 Cryptographic Module Authentication IA-8 Identification and Authentication (Non-Organizational Users) Page 20
  • 46. Policy Controls – NIST Guidance IR-5 Incident Monitoring IR-6 Incident Reporting IR-7 Incident Response Assistance IR-8 Incident Response Plan PL-4 Rules of Behavior PL-5 Privacy Impact Assessment RA-1 Risk Assessment Policy and Procedures SI-12 Information Output Handling and Retention Page 21
  • 47. Acquisition Controls Strong Authentication Social Media services security practice Comment moderation and monitoring social media Ensure federal security requirements are met by using dedicated resources from vendors Modify user’s public profiles from .gov or .mil email addresses to provide stronger security Page 22
  • 48. Acquisition Controls Partner with social media services to: Provide traceability to federal employee accounts Improve communications between providers and Security Operations Centers (SOC) Allow independent monitoring of social media service providers Encourage use of validated and signed code Ensure social media provider maintains appropriate configuration, patch and technology refresh levels Page 23
  • 49. Acquisition Controls Ensure an independent risk assessment Records management in accordance with NARA record schedules, FOIA requests and e-discovery litigation holds Ensure hosted federal content is accessible at any time and stored in editable and non-proprietary formats Page 24
  • 50. Acquisition Controls – NIST Guidance SA-1 System and Services Acquisition Policy and Procedures SA-2 Allocation of Resources SA-3 Life Cycle Support SA-4 Acquisitions SA-5 Information System Documentation SA-9 External Information System Services Page 25
  • 51. Acquisition Controls – GSA Guidance Terms of Service Agreements Social media services standard Terms of Service (TOS) Agreements present legal problems Many services are free, making it hard to encourage services to negotiate new TOS On behalf of the government, GSA has negotiated new TOS for many social media services http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml Page 26
  • 52. Training Controls Provide awareness, guidance and training on: Information to that can be shared, can not be shared and with whom it can be shared Social media policies and guidelines including AUP Blurring of personal and professional life as appropriate For Operations Security (OPSEC) on risks of social media Federal employees self-identification on social media sites, depending on roles Page 27
  • 53. Training Controls Provide awareness, guidance and training on: Privacy Act requirements and restrictions Specific social media threats before granting access to social media sites Possible negative outcomes of information leakage, social media misuse and password reuse Possible impact on security clearance Page 28
  • 54. Training Controls – NIST Guidance AT-2 Security Awareness: Add social media usage related awareness training AT-3 Security Training: Create specific role-based training for those with social media responsibility AT-5 Contacts with Security Groups and Associations: Establish contacts with security groups addressing web application and social media security Page 29
  • 55. Host Controls Require use of a hardened Common Operating Environment (COE): Federal Desktop Core Configuration (FDCC) Security Content Automation Protocol (SCAP) Encourage use of strong authentication for greater assurance of a user’s identity: Two-factor authentication (e.g., HSPD-12 & PIN) Page 30
  • 56. Host Controls Ensure strong change management, patch management, configuration management: Includes applications and Operating Systems Enforces strong logging Reports to SOC Desktop virtualization technologies: Allows safer viewing of potentially malicious websites Virtual sandbox protects base operating system Page 31
  • 57. Host Controls Browser versioning: Ensure use latest browsers which include additional security measures Encourage use of signed code or white listing: Provides higher level of assurance software comes from approved vendor or is approved software Page 32
  • 58. Host Controls – NIST Guidance Audit and Accountability (AU) Family of controls, as applicable AC-1 Access Control Policy and Procedures AC-7 System Use Notification CM-1 Configuration Management Policy and Procedures CM-2 Baseline Configuration CM-6 Configuration Settings CM-7 Least Functionality Page 33
  • 59.
  • 60. Network Controls Federal Trusted Internet Connection (TIC) program protections: Reduced number of internet connections Einstein traffic inspection Security Operations Center (SOC) and Network Operations Center (NOC): Visibility and centralized control for incident response and risk reduction These should all be provided to you as “infrastructure” Page 35
  • 61. Network Controls Web content filtering: Beyond Einstein protections Granular control of web applications, data and protocols Trust Zones dependent on security assurance requirements DNSSEC to better ensure website name resolution integrity Page 36
  • 62. Network Controls Focus on data-centric protection URL Shortening: http://go.usa.gov/ Page 37
  • 63. Network Controls – NIST Guidance SC-1 System and Communications Protection Policy and Procedures SC-7 Boundary Protection SC-13 Use of Cryptography SC-14 Public Access Protections SC-15 Collaborative Computing Devices SC-20 Secure Name /Address Resolution Service (Authoritative Source) Page 38
  • 64. Questions, Comments, or War Stories? http://www.potomacforum.org/ Michael Smith: rybolov(a)ryzhe.ath.cx http://www.guerilla-ciso.com/ Dan Philpott: danphilpott(a)gmail.com http://www.fismapedia.org/ 39

Editor's Notes

  1. Mike’s blog is at http://www.guerilla-ciso.com/Mike teaches for Potomac Forum http://www.potomacforum.org/Contact information for Mike is at the end of this presentation.
  2. Dan is the founder of http://www.FISMApedia.org/Dan blogs at http://www.guerilla-ciso.com/ and http://ArielSilverstone.comDan teaches for Potomac Forum http://www.potomacforum.org/