SlideShare a Scribd company logo
2014 NACo National Cyber Symposium
April 10, 2014
Chief Information Security and Privacy Officer – King County
Washington
Governance Board President – Holistic Information Security
Practitioner Institute (HISPI)
Member – ITT Technical Institute – Seattle, Program Advisory Council
Member – MS-ISAC Trusted Purchasing Alliance Product Review
Board
Member – MS-ISAC Education and Awareness Committee
Member – National Association of Counties (Naco) Cyber-Security
Task Force
A loss of confidentiality results in the
unauthorized disclosure of information
A loss of availability results in disruption of
access to or use of information or an
information system
A loss of integrity results in the unauthorized
modification or destruction of information
CONFIDENTIALITY,
AVAILABILITY,
INTEGRITY
Confidentiality
IntegrityAvailability
Government
Breaches – 678 (15.9%)
Records – 148,366,723 (17.2%)
All Sectors
Breaches – 4,239
Records – 864,108,052
Officer – Greensfelder, Hemker & Gale P.C.
Examples of Personally Identifiable Information Maintained
by County Governments:
 Tax Records
 Payroll, Benefit and Retirement
information of Public Employees
 Information about public school
students
 Court Records
 Criminal Records
 Information relating to medical
programs
 Information relating to social
services
With the popularity of social media; conducting business on
personal devices; and outsourcing certain business
functions to third parties, data breaches are becoming more
prevalent.
Political Fallout
Damage to reputation
Compliance obligations
Federal investigations
Investigations by State Attorney
General
Possible Civil litigation
Negligence
Malicious or criminal attacks (hacking or theft of electronic
devices)
Employee/Contractor malfeasance
County governments and county officials are not exempted
from compliance with applicable laws aimed at protecting
personally identifiable information and may be subject to
penalties and fines.
Depending upon the laws of the particular State, sovereign
immunity may protect county governments and county
officials from tort liabilities arising out of failing to comply
with applicable laws aimed at protecting personally
identifiable information.
Skagit County, WA
Los Angeles County, CA
Monterey County, CA
Erie County, NY
Harris County, TX
Notify those within the organization of the incident who need to know
Assemble a response team of both internal stakeholders and external
experts
Carefully investigate and keep language of the investigation in
language that is easy to understand
Determine whether the incident constitutes a reportable breach:
Federal laws and 46 different state laws
Contain the breach and mitigate the harm, to the extent possible
Notify persons impacted
Respond to inquiries
Improve processes
Create a Preparedness Plan, now:
Identify persons within your organization who are/will be responsible
for data management.
Identify compliance requirements according to applicable laws.
Identify the types of data your organization collects/ processes/
develops.
Create a risk assessment plan and mitigation plan.
Develop policies and educate all staff.
Have a reporting mechanism that is well publicized and encouraged.
Review vendor contracts.
Contact Information
Lucie F. Huger
314/345-4725
E-mail: lfh@greensfelder.com
Director of Government Affairs – Multi-State Information Sharing and Analysis
Center
Center for Internet Security – CEO: Will Pelgrin
Secure Coding
Patch Management
Phishing
Lack of coordination between operational technology (OT)
and informational technology (IT)
Leadership
Governance
Responsibility (Assign)
Compliance (Measure)
Harden systems
Keep your systems patched
Update cyber security policies
Monitor compliance with the policies
Regularly scan systems
Backup your systems on a regular basis and store off site
Encrypt your mobile devices
Train your users
Resources
Daily tips
Monthly newsletters
Webcasts
Guides
Nationwide Cyber Security Review (NCSR)
24x7 Managed/Monitored Security Services
Vulnerability Assessments
Penetration Testing
www.cisecurity.org
Contact Information
Andrew.Dolan@cisecurity.org
or
info@msisac.org
www.cisecurity.org
518-880-0699
Managing Partner – The Khanna Group, LLC
Transformation by Design®
© Gopal Khanna 2014. All rights reserved.
TRANSFORMATION DESIGN
Action to Direction
Implementation to Execution
Destruction to Construction
© Gopal Khanna 2014. All rights reserved.
PARADIGM SHIFT
Board of Directors vs. Elected Officials
Executive Team vs. Administrators/Managers
Subject Matter Experts vs. Staff/Employees
© Gopal Khanna 2014. All rights reserved.
DEMAND FOR SERVICES AS NEW THREATS
EMERGE
SMEs
Relevance of
Operational Model
Funding
24/7 Services
Demand for Security
Emerging Threats (severity)
Demand(forservices)
© Gopal Khanna 2014. All rights reserved.
Programs
People
Government WORKS
© Gopal Khanna 2014. All rights reserved.
CYBER SECURITY PROTECTING DATA
DATA
Open
Fluid
Informationa
l
Knowledgeab
le
Analysis
Predictiv
e
Facts
BRIDGING ELECTED OFFICIAL CIO DISCONNECT
Elected
Officials
Management
Staff
CIOs/CISOs
Top-down
Bottom-up
© Gopal Khanna 2014. All rights reserved.
TRANSFORMATION DESIGN
Action to Direction
Implementation to Execution
Destruction to Construction
© Gopal Khanna 2014. All rights reserved.
ACTION DIRECTION
Allow fiscal flexibility
Bi-partisan agreement
Clear mission
Devoid of “big P” and “small p”
Long term security
Partner with Unions
Secure public Data and information
Operational re-design
Institutionalize support
Eliminate fear of failure
Staffing flexibility
Security part of job description
© Gopal Khanna 2014. All rights reserved.
IMPLEMENTATION EXECUTION
Empower SMEs by :
•Tolerating risk, allow pivoting
•Encouraging curiosity, providing incentives
•Bottom-up change, let SMEs redesign processes
•Accept recommendation from SMEs
•Avoid “Analysis Paralysis”
•Providing direction, clarity of objective
•80/20 rule
© Gopal Khanna 2014. All rights reserved.
DESTRUCTION CONSTRUCTION
Enterprise view
Horizontal approach
Destroy silos
Start small-build scale
Give up the old, create the new
Leave legacy
Distribute knowledge
Give up control
Collaborate
Reporting
Accept opinion
Re-design vs. incremental
Re-purpose resources
Comprehensive sharing
© Gopal Khanna 2014. All rights reserved.
Contact Information
Gopal Khanna
gopal.khanna@gmail.com
952-484-5123
“Transformation by Design”
Gopal Khanna
Ralph Johnson, CISSP, HISP, CISM, CIPP/US
ralph.Johnson@kingcounty.gov
(206) 263-7891
Lucie F. Huger, Esquire
(314) 345-4725
lfh@greensfelder.com
Andrew Dolan
andrew.dolan@cisecurity.org
(518) 880-0699
Gopal Khanna
gopal.khanna@gmail.com
952-484-5123

More Related Content

What's hot

HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
Redspin, Inc.
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in Healthcare
CompTIA
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
Compliancy Group
 
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
Lauren Williams
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
Brian Matteson, CISSP CISA
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3hRaj Goel
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
Compliancy Group
 
HIPAA Update 2019 Ohio Public Health Nursing
HIPAA Update 2019 Ohio Public Health NursingHIPAA Update 2019 Ohio Public Health Nursing
HIPAA Update 2019 Ohio Public Health Nursing
Gary Pritts
 
HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
Compliancy Group
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
jhietala
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
Polsinelli PC
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
Redspin, Inc.
 
Iadmdhipmkt1.0
Iadmdhipmkt1.0Iadmdhipmkt1.0
Iadmdhipmkt1.0profit10
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax Technology
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1Bryan Cline, Ph.D.
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
Omar Toor
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
resourceone
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
SHIVA101531
 

What's hot (20)

HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in Healthcare
 
HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016HIPAA compliance tuneup 2016
HIPAA compliance tuneup 2016
 
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
OCR Enforcement Update: Under 500 Breach Investigations and Inner Workings of...
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
2013-09-13-DATTO_What_Should_MSPs_Know_About_Compliance_v3h
 
How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud How to safeguard ePHIi in the cloud
How to safeguard ePHIi in the cloud
 
HIPAA Update 2019 Ohio Public Health Nursing
HIPAA Update 2019 Ohio Public Health NursingHIPAA Update 2019 Ohio Public Health Nursing
HIPAA Update 2019 Ohio Public Health Nursing
 
HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...HIPAA compliance for Business Associates- The value of compliance, how to acq...
HIPAA compliance for Business Associates- The value of compliance, how to acq...
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & SecurityThe Intersection of OCR Enforcement and Health Care Data Privacy & Security
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
 
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?HIPAA Security Audits in 2012-What to Expect. Are You Ready?
HIPAA Security Audits in 2012-What to Expect. Are You Ready?
 
Iadmdhipmkt1.0
Iadmdhipmkt1.0Iadmdhipmkt1.0
Iadmdhipmkt1.0
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
 

Viewers also liked

Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
Csaba Krasznay
 
Hacking the government and other stories
Hacking the government and other storiesHacking the government and other stories
Hacking the government and other stories
Tiffany St James
 
Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012
Patricia Makaveli
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (11)

Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
 
Hacking the government and other stories
Hacking the government and other storiesHacking the government and other stories
Hacking the government and other stories
 
Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cybersecurity and the Accountability of Elected Officials

Ark presentation
Ark presentationArk presentation
Ark presentationbrentcarey
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
Tarun Gupta,CRISC CISSP CISM CISA BCCE
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy Dunham
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
Haystax Technology
 
Jeff Daily - Professional Security Resume 2015
Jeff Daily - Professional Security Resume 2015Jeff Daily - Professional Security Resume 2015
Jeff Daily - Professional Security Resume 2015Jeff Daily
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
cschumley
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
susanschei
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity Clients
ID Experts
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
dawnrk
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
dawnrk
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
BARBARA HART NEW NEW RESUME 3-21-2016
BARBARA HART NEW NEW RESUME 3-21-2016BARBARA HART NEW NEW RESUME 3-21-2016
BARBARA HART NEW NEW RESUME 3-21-2016Barbara Hart
 

Similar to Cybersecurity and the Accountability of Elected Officials (20)

Ark presentation
Ark presentationArk presentation
Ark presentation
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
Jeff Daily - Professional Security Resume 2015
Jeff Daily - Professional Security Resume 2015Jeff Daily - Professional Security Resume 2015
Jeff Daily - Professional Security Resume 2015
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
How to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity ClientsHow to Manage a Data Breach Involving Multiple Covered Entity Clients
How to Manage a Data Breach Involving Multiple Covered Entity Clients
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdfIbm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
Ibm ofa ottawa_.gov_agencies_and_next_generation_analytics_tim_paydospdf
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
BARBARA HART NEW NEW RESUME 3-21-2016
BARBARA HART NEW NEW RESUME 3-21-2016BARBARA HART NEW NEW RESUME 3-21-2016
BARBARA HART NEW NEW RESUME 3-21-2016
 

Cybersecurity and the Accountability of Elected Officials

  • 1. 2014 NACo National Cyber Symposium April 10, 2014
  • 2. Chief Information Security and Privacy Officer – King County Washington Governance Board President – Holistic Information Security Practitioner Institute (HISPI) Member – ITT Technical Institute – Seattle, Program Advisory Council Member – MS-ISAC Trusted Purchasing Alliance Product Review Board Member – MS-ISAC Education and Awareness Committee Member – National Association of Counties (Naco) Cyber-Security Task Force
  • 3. A loss of confidentiality results in the unauthorized disclosure of information A loss of availability results in disruption of access to or use of information or an information system A loss of integrity results in the unauthorized modification or destruction of information CONFIDENTIALITY, AVAILABILITY, INTEGRITY Confidentiality IntegrityAvailability
  • 4.
  • 5.
  • 6. Government Breaches – 678 (15.9%) Records – 148,366,723 (17.2%) All Sectors Breaches – 4,239 Records – 864,108,052
  • 7. Officer – Greensfelder, Hemker & Gale P.C.
  • 8. Examples of Personally Identifiable Information Maintained by County Governments:  Tax Records  Payroll, Benefit and Retirement information of Public Employees  Information about public school students  Court Records  Criminal Records  Information relating to medical programs  Information relating to social services
  • 9. With the popularity of social media; conducting business on personal devices; and outsourcing certain business functions to third parties, data breaches are becoming more prevalent.
  • 10. Political Fallout Damage to reputation Compliance obligations Federal investigations Investigations by State Attorney General Possible Civil litigation
  • 11. Negligence Malicious or criminal attacks (hacking or theft of electronic devices) Employee/Contractor malfeasance
  • 12. County governments and county officials are not exempted from compliance with applicable laws aimed at protecting personally identifiable information and may be subject to penalties and fines. Depending upon the laws of the particular State, sovereign immunity may protect county governments and county officials from tort liabilities arising out of failing to comply with applicable laws aimed at protecting personally identifiable information.
  • 13. Skagit County, WA Los Angeles County, CA Monterey County, CA Erie County, NY Harris County, TX
  • 14. Notify those within the organization of the incident who need to know Assemble a response team of both internal stakeholders and external experts Carefully investigate and keep language of the investigation in language that is easy to understand Determine whether the incident constitutes a reportable breach: Federal laws and 46 different state laws Contain the breach and mitigate the harm, to the extent possible Notify persons impacted Respond to inquiries Improve processes
  • 15. Create a Preparedness Plan, now: Identify persons within your organization who are/will be responsible for data management. Identify compliance requirements according to applicable laws. Identify the types of data your organization collects/ processes/ develops. Create a risk assessment plan and mitigation plan. Develop policies and educate all staff. Have a reporting mechanism that is well publicized and encouraged. Review vendor contracts.
  • 16. Contact Information Lucie F. Huger 314/345-4725 E-mail: lfh@greensfelder.com
  • 17. Director of Government Affairs – Multi-State Information Sharing and Analysis Center Center for Internet Security – CEO: Will Pelgrin
  • 18.
  • 19.
  • 20. Secure Coding Patch Management Phishing Lack of coordination between operational technology (OT) and informational technology (IT)
  • 21.
  • 22.
  • 23.
  • 25. Harden systems Keep your systems patched Update cyber security policies Monitor compliance with the policies Regularly scan systems Backup your systems on a regular basis and store off site Encrypt your mobile devices Train your users
  • 26. Resources Daily tips Monthly newsletters Webcasts Guides Nationwide Cyber Security Review (NCSR) 24x7 Managed/Monitored Security Services Vulnerability Assessments Penetration Testing www.cisecurity.org
  • 28. Managing Partner – The Khanna Group, LLC Transformation by Design® © Gopal Khanna 2014. All rights reserved.
  • 29. TRANSFORMATION DESIGN Action to Direction Implementation to Execution Destruction to Construction © Gopal Khanna 2014. All rights reserved.
  • 30. PARADIGM SHIFT Board of Directors vs. Elected Officials Executive Team vs. Administrators/Managers Subject Matter Experts vs. Staff/Employees © Gopal Khanna 2014. All rights reserved.
  • 31. DEMAND FOR SERVICES AS NEW THREATS EMERGE SMEs Relevance of Operational Model Funding 24/7 Services Demand for Security Emerging Threats (severity) Demand(forservices) © Gopal Khanna 2014. All rights reserved.
  • 32. Programs People Government WORKS © Gopal Khanna 2014. All rights reserved.
  • 33. CYBER SECURITY PROTECTING DATA DATA Open Fluid Informationa l Knowledgeab le Analysis Predictiv e Facts
  • 34. BRIDGING ELECTED OFFICIAL CIO DISCONNECT Elected Officials Management Staff CIOs/CISOs Top-down Bottom-up © Gopal Khanna 2014. All rights reserved.
  • 35.
  • 36.
  • 37. TRANSFORMATION DESIGN Action to Direction Implementation to Execution Destruction to Construction © Gopal Khanna 2014. All rights reserved.
  • 38. ACTION DIRECTION Allow fiscal flexibility Bi-partisan agreement Clear mission Devoid of “big P” and “small p” Long term security Partner with Unions Secure public Data and information Operational re-design Institutionalize support Eliminate fear of failure Staffing flexibility Security part of job description © Gopal Khanna 2014. All rights reserved.
  • 39. IMPLEMENTATION EXECUTION Empower SMEs by : •Tolerating risk, allow pivoting •Encouraging curiosity, providing incentives •Bottom-up change, let SMEs redesign processes •Accept recommendation from SMEs •Avoid “Analysis Paralysis” •Providing direction, clarity of objective •80/20 rule © Gopal Khanna 2014. All rights reserved.
  • 40. DESTRUCTION CONSTRUCTION Enterprise view Horizontal approach Destroy silos Start small-build scale Give up the old, create the new Leave legacy Distribute knowledge Give up control Collaborate Reporting Accept opinion Re-design vs. incremental Re-purpose resources Comprehensive sharing © Gopal Khanna 2014. All rights reserved.
  • 42. Ralph Johnson, CISSP, HISP, CISM, CIPP/US ralph.Johnson@kingcounty.gov (206) 263-7891 Lucie F. Huger, Esquire (314) 345-4725 lfh@greensfelder.com Andrew Dolan andrew.dolan@cisecurity.org (518) 880-0699 Gopal Khanna gopal.khanna@gmail.com 952-484-5123