SlideShare a Scribd company logo
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information.
A Holistic Approach for Reimagining Cyber Defense
23 February 2016
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Introduction
The Approach
• Know
• Protect
• Respond
• Mature
Sector Study- The Electric Utility Sector
Agenda
2
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Mission
Booz Allen Hamilton partners with clients to solve their most important and complex problems,
making their mission our mission and delivering results that endure
What We Bring
Expertise, objectivity, and the capabilities of exceptional people —combined with the
institutional experience of helping clients succeed for 100 years
What Distinguishes Us
Booz Allen combines a consultant’s unique problem-solving orientation with deep technical
knowledge and strong execution to help clients achieve success in their critical missions
The Firm
 Annual Revenue — $4 billion
 Public corporation
 Founded in 1914
Scale and Scope
 Over 24,000 talented people, serving
clients from more than 80 offices
 Approx. 300 staff in Hawaii
 Office in Honolulu for over 20 years
Booz Allen Hamilton is a leading strategy & technology
consulting firm and solutions provider
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Asset Management- Realizing tailored asset management systems
that enable proper classification, tracking, protection, configuration,
and usage of those assets.
Situational Awareness- Establishing real-time visibility into your
cyber ecosystem, providing insights into activities that impact your
unique environment.
Threat Intelligence- Providing clear insights on current and
emerging threat activity in order to drive more informed and precise
decision making.
Vulnerability Management- Identifying, quantifying, and prioritizing
the vulnerabilities in systems, networks, processes, or applications,
and developing plans for intelligently reducing vulnerability.
Know- Understand your business and the cyber risk within
it
4
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Specific alerts and warnings relevant to the client are more
valuable than generic reports of vulnerabilities
5
Cyber4Sight- Booz Allen developed the line of Cyber4Sight® to provide cyber
threat alerting and warning services, on-call intelligence analysis, and deep web
intelligence that warn our clients of threats in near real-time.
Insider4Sight- Rogue internal employees fly under the radar of organizations that
use network audit tools to prevent outside threats. I4S was created to identify
insider threats using advanced detection and analytical tools.
Global4Sight- Our line of threat and competitive intelligence Global4Sight™
products combine open-source cloud architecture with social media research and
intelligence analysis to give clients key information on global threats and global
market opportunities.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
 Application Security- Developing and deploying software assurance processes,
controls, and countermeasures to secure software applications throughout the product
lifecycle--from design to maintenance.
 Identity & Access Management- Enabling program design support and deployment
of solutions to assure that information is derived from a trusted source and is only
available to authorized entities.
 Information Protection- Cross-disciplinary solutions to protect sensitive information
from unauthorized access, use, disclosure, disruption, modification, recording, and
destruction.
 Infrastructure & Mobile Security- Providing a stable and resilient baseline
infrastructure, along with a flexible and secure mobile platform that meets mission and
business needs.
 Supplier Security Management- Applying industry-leading, vendor-agnostic
solutions to carefully identify, prioritize, and manage risk in your supply chain and
across your supplier community.
Protect- Secure your organization, operations, products,
and services
6
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Continuous Monitoring can help Compliance and Network
Management/Defense needs across the Enterprise.
7
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Incident Response- Support to assess incidents,
mitigate the issue, determine the extent of exposure, and
manage communications.
Postmortem Analysis- Analysis of security incidents to
support investigations, document lessons learned, and
improve the overall incident response process.
Remediation- Development and implementation of
targeted action plans for short-term incident containment
and longer-term ecosystem resilience.
Respond- Triage, respond, and learn from cyber incidents
8
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Automated First Responder (AFR) – arms analysts with a
proven tool to identify and eradicate APTs
APT-specific suite of tools that can rapidly identify
APTs and their malicious code
Software Distribution
Server
Collection
Server
Enterprise
Workstations/Servers
Standalone Analysis
Environment
Processing
Server
Analyst
1
2
3
4 5
9
Analyst
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
 Awareness- Development and deployment of tailored and impactful training content
to ensure organization-wide awareness and adoption of cyber security priorities.
 Governance- Establishment of environment-specific cyber strategy, policies, and
procedures, along with impactful organizational designs and operating models.
 Human Capital Development- Fostering and maintaining a secure cyber
environment via attracting, developing, and retaining a high-performing cyber
workforce.
 Information Risk Management- Design and delivery of processes and tools for
methodically identifying, analyzing, prioritizing, responding to, and monitoring cyber
risks.
 Organizational Change Management- Holistically managing the transition of
business processes, technologies, and cultures from a current state to a desired
target state.
Mature- Build and manage a world-class cyber program and
workforce.
10
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Effective governance requires a comprehensive and
detailed strategy backed by clear and effective policies
11
Functional and
enabling controls
Functional controls are more technical/operational in nature (e.g., application security,
vulnerability assessment), while enabling controls pertain to governance, risk management, and
other organizational functions that support (i.e., enable) the technical operations
Appropriate Level
Views- high and
low
Logically organized objectives and measures that are used to pinpoint and evaluate specific
aspects of your security program
Address all
dimensions
People, process, and technology dimensions – Multifaceted views that let you evaluate each
control area in its key component parts
Maturity Spectrum A maturity spectrum of granular and measureable details – A clear scale of maturity, defined by
characteristics and indicators to accurately assess your level of maturity
Best Practices A foundation grounded in established best practices – Developed from best practices across
industry, government, and academia.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Current state of the industry
Where it is going
Implications
Case Study- The electric utility industry
12
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
All investor and privately held utilities are regulated by state
regulatory commissions and federal agencies
Why Regulated?
 Utilities are “natural monopolies”
• Major scale economies on distribution
• Generation not a “natural monopoly”
• Retail not a “natural monopoly” although significant scale economies apply
 Utilities provide a public “good”
• Integral to function of society and economy
• Safety and reliability issues
State Utility
Commissions
DOE,
NERC, DOT,
et. al.
FERC
Rates and Services
Service Complaints
Reliability
Service Territory
Expansions /
Investments
Ownership
Reporting
Ownership
Reliability
Access
Reporting
Reliability
Safety
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
An electric transaction in a market with a single buyer and
competitive generation
Utility
Transmission
Residential
Customers
Commercial
Customers
Industrial
Customers
Utility Buyer
Utility Generation
Distribution
Independent
Generation
Independent
Generation
Examples: Georgia, Alabama
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
An electric transaction in a market with wholesale /
industrial competition
Utility
Transmission
Distribution
Regulated Utility
Generation
Independent
Generation
Independent
Generation
Wholesale
Marketers
System
Operations
Residential
Customers
Small
Commercial
Customers
Industrial
Customers
Large
Commercial
Customers
Generation
Coordinator
Examples: New York, California
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Due to regulation, utilities have limited options for making
and spending money
Utilities’ profit is almost always best on a regulated rate
of return on capital investment
Operations and Maintenance (including fuel for those
that generate) is usually a pass through, but must be
justified before the regulators (PUS/PSC)
Reliability is their key metric
• Used to justify new capital investments
• Poor reliability gets a lot of negative attention from
customers and politicians
• Regulators respond to this negative attention
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Historically, severe weather accounts for the majority of grid
reliability issues, but physical attacks are a growing concern
Major Grid Disturbances
0
20
40
60
80
100
120
140
160
2003 2004 2005 2006 2007 2008 2014
Weather Equipment Control Systems Human Error Load Shedding Other
Number
Of
Incidents
Source: EIA, BAH Analysis
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Compliance Example- DTE Cyber Program Development
18
Detroit Edison (DTE)
Cyber Security Program Assessment and Gap Analysis, Procedure Development
Client
Challenge
Detroit Edison (DTE) sought an outside perspective on their position relative to key
milestone requirements for implementation of NEI 08-09, and support to create a
compliance roadmap including resource estimates to meet required deadlines.
Booz Allen
Solution
To support DTE, Booz Allen:
 Reviewed existing DTE procedures against the requirements of NEI 08-09
 Formulated recommendations to address compliance gaps
 Helped to quantify the LOE required for CDA Assessments, Critical System and
CDA identification and documentation, and sustaining program support (excluding
remediation required from initial assessments)
 Assessed DTE’s level of compliance with 2012 milestones, and made
recommendations to re-deploy labor to meet this year’s deadlines in the area of
Critical System/CDA identification and documentation
 Initiated effort to support development of the set of additional needed required
procedures
Results DTE implemented recommendations for labor re-direction and is on track to meet all
2012 milestones. Procedures are currently under development to allow full compliance
within the required timeline.
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
Because of these reasons cyber security has been only a
compliance issue, but things are changing
This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .
As the grid transforms it will become more dependent upon
“smart” technology- increasing the need for cyber security
20

More Related Content

What's hot

NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
EnergySec
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
Peter Wood
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
EnergySec
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
North Texas Chapter of the ISSA
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
North Texas Chapter of the ISSA
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
EnergySec
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
EnergySec
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
EnergySec
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
Matthew Rosenquist
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
Christian Have
 

What's hot (20)

NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 

Viewers also liked

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
EnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
EnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
EnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
EnergySec
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
EnergySec
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopEnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
EnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
EnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
EnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
EnergySec
 
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & ElasticsearchFrom Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
Sematext Group, Inc.
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
Jeronimo Zucco
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
EnergySec
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014
Cloudflare
 

Viewers also liked (16)

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion Workshop
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & ElasticsearchFrom Zero to Hero - Centralized Logging with Logstash & Elasticsearch
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014
 

Similar to Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityPrithvi Ghag
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
Hewlett Packard Enterprise Business Value Exchange
 
Hicx briefing (nov16)
Hicx briefing (nov16)Hicx briefing (nov16)
Hicx briefing (nov16)
Grant Watling
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
eeaches
 
Superdistribution by David Worlock
Superdistribution by David WorlockSuperdistribution by David Worlock
Superdistribution by David Worlock
Dave Kellogg
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
Booz Allen Hamilton
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
mccormicknadine86
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
tiffanyd4
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
IJNSA Journal
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Analytics for Water utilities
Analytics for Water utilitiesAnalytics for Water utilities
Analytics for Water utilities
Aaum Research and Analytics Private Limited
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Conference – iHT2
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
Hiten Sethi
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBooz Allen Hamilton
 
Utility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance CapabilitiesUtility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance Capabilities
Booz Allen Hamilton
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
IBM Security
 

Similar to Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense (20)

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Cost benefit analysis vs confidentiality
Cost benefit analysis vs confidentialityCost benefit analysis vs confidentiality
Cost benefit analysis vs confidentiality
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Hicx briefing (nov16)
Hicx briefing (nov16)Hicx briefing (nov16)
Hicx briefing (nov16)
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Superdistribution by David Worlock
Superdistribution by David WorlockSuperdistribution by David Worlock
Superdistribution by David Worlock
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
 
Chapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docxChapter 9 Health Economics in a Health Policy Context.docx
Chapter 9 Health Economics in a Health Policy Context.docx
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
 
Case Study
Case StudyCase Study
Case Study
 
Analytics for Water utilities
Analytics for Water utilitiesAnalytics for Water utilities
Analytics for Water utilities
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
 
Utility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance CapabilitiesUtility Cybersecurity Compliance Capabilities
Utility Cybersecurity Compliance Capabilities
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 

More from EnergySec

Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
EnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
EnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
EnergySec
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
EnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
EnergySec
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
EnergySec
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s Perspective
EnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
EnergySec
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
EnergySec
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for Utilities
EnergySec
 

More from EnergySec (14)

Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s Perspective
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for Utilities
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense

  • 1. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. A Holistic Approach for Reimagining Cyber Defense 23 February 2016
  • 2. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Introduction The Approach • Know • Protect • Respond • Mature Sector Study- The Electric Utility Sector Agenda 2
  • 3. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Mission Booz Allen Hamilton partners with clients to solve their most important and complex problems, making their mission our mission and delivering results that endure What We Bring Expertise, objectivity, and the capabilities of exceptional people —combined with the institutional experience of helping clients succeed for 100 years What Distinguishes Us Booz Allen combines a consultant’s unique problem-solving orientation with deep technical knowledge and strong execution to help clients achieve success in their critical missions The Firm  Annual Revenue — $4 billion  Public corporation  Founded in 1914 Scale and Scope  Over 24,000 talented people, serving clients from more than 80 offices  Approx. 300 staff in Hawaii  Office in Honolulu for over 20 years Booz Allen Hamilton is a leading strategy & technology consulting firm and solutions provider
  • 4. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Asset Management- Realizing tailored asset management systems that enable proper classification, tracking, protection, configuration, and usage of those assets. Situational Awareness- Establishing real-time visibility into your cyber ecosystem, providing insights into activities that impact your unique environment. Threat Intelligence- Providing clear insights on current and emerging threat activity in order to drive more informed and precise decision making. Vulnerability Management- Identifying, quantifying, and prioritizing the vulnerabilities in systems, networks, processes, or applications, and developing plans for intelligently reducing vulnerability. Know- Understand your business and the cyber risk within it 4
  • 5. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Specific alerts and warnings relevant to the client are more valuable than generic reports of vulnerabilities 5 Cyber4Sight- Booz Allen developed the line of Cyber4Sight® to provide cyber threat alerting and warning services, on-call intelligence analysis, and deep web intelligence that warn our clients of threats in near real-time. Insider4Sight- Rogue internal employees fly under the radar of organizations that use network audit tools to prevent outside threats. I4S was created to identify insider threats using advanced detection and analytical tools. Global4Sight- Our line of threat and competitive intelligence Global4Sight™ products combine open-source cloud architecture with social media research and intelligence analysis to give clients key information on global threats and global market opportunities.
  • 6. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .  Application Security- Developing and deploying software assurance processes, controls, and countermeasures to secure software applications throughout the product lifecycle--from design to maintenance.  Identity & Access Management- Enabling program design support and deployment of solutions to assure that information is derived from a trusted source and is only available to authorized entities.  Information Protection- Cross-disciplinary solutions to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, recording, and destruction.  Infrastructure & Mobile Security- Providing a stable and resilient baseline infrastructure, along with a flexible and secure mobile platform that meets mission and business needs.  Supplier Security Management- Applying industry-leading, vendor-agnostic solutions to carefully identify, prioritize, and manage risk in your supply chain and across your supplier community. Protect- Secure your organization, operations, products, and services 6
  • 7. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Continuous Monitoring can help Compliance and Network Management/Defense needs across the Enterprise. 7
  • 8. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Incident Response- Support to assess incidents, mitigate the issue, determine the extent of exposure, and manage communications. Postmortem Analysis- Analysis of security incidents to support investigations, document lessons learned, and improve the overall incident response process. Remediation- Development and implementation of targeted action plans for short-term incident containment and longer-term ecosystem resilience. Respond- Triage, respond, and learn from cyber incidents 8
  • 9. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Automated First Responder (AFR) – arms analysts with a proven tool to identify and eradicate APTs APT-specific suite of tools that can rapidly identify APTs and their malicious code Software Distribution Server Collection Server Enterprise Workstations/Servers Standalone Analysis Environment Processing Server Analyst 1 2 3 4 5 9 Analyst
  • 10. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. .  Awareness- Development and deployment of tailored and impactful training content to ensure organization-wide awareness and adoption of cyber security priorities.  Governance- Establishment of environment-specific cyber strategy, policies, and procedures, along with impactful organizational designs and operating models.  Human Capital Development- Fostering and maintaining a secure cyber environment via attracting, developing, and retaining a high-performing cyber workforce.  Information Risk Management- Design and delivery of processes and tools for methodically identifying, analyzing, prioritizing, responding to, and monitoring cyber risks.  Organizational Change Management- Holistically managing the transition of business processes, technologies, and cultures from a current state to a desired target state. Mature- Build and manage a world-class cyber program and workforce. 10
  • 11. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Effective governance requires a comprehensive and detailed strategy backed by clear and effective policies 11 Functional and enabling controls Functional controls are more technical/operational in nature (e.g., application security, vulnerability assessment), while enabling controls pertain to governance, risk management, and other organizational functions that support (i.e., enable) the technical operations Appropriate Level Views- high and low Logically organized objectives and measures that are used to pinpoint and evaluate specific aspects of your security program Address all dimensions People, process, and technology dimensions – Multifaceted views that let you evaluate each control area in its key component parts Maturity Spectrum A maturity spectrum of granular and measureable details – A clear scale of maturity, defined by characteristics and indicators to accurately assess your level of maturity Best Practices A foundation grounded in established best practices – Developed from best practices across industry, government, and academia.
  • 12. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Current state of the industry Where it is going Implications Case Study- The electric utility industry 12
  • 13. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . All investor and privately held utilities are regulated by state regulatory commissions and federal agencies Why Regulated?  Utilities are “natural monopolies” • Major scale economies on distribution • Generation not a “natural monopoly” • Retail not a “natural monopoly” although significant scale economies apply  Utilities provide a public “good” • Integral to function of society and economy • Safety and reliability issues State Utility Commissions DOE, NERC, DOT, et. al. FERC Rates and Services Service Complaints Reliability Service Territory Expansions / Investments Ownership Reporting Ownership Reliability Access Reporting Reliability Safety
  • 14. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . An electric transaction in a market with a single buyer and competitive generation Utility Transmission Residential Customers Commercial Customers Industrial Customers Utility Buyer Utility Generation Distribution Independent Generation Independent Generation Examples: Georgia, Alabama
  • 15. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . An electric transaction in a market with wholesale / industrial competition Utility Transmission Distribution Regulated Utility Generation Independent Generation Independent Generation Wholesale Marketers System Operations Residential Customers Small Commercial Customers Industrial Customers Large Commercial Customers Generation Coordinator Examples: New York, California
  • 16. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Due to regulation, utilities have limited options for making and spending money Utilities’ profit is almost always best on a regulated rate of return on capital investment Operations and Maintenance (including fuel for those that generate) is usually a pass through, but must be justified before the regulators (PUS/PSC) Reliability is their key metric • Used to justify new capital investments • Poor reliability gets a lot of negative attention from customers and politicians • Regulators respond to this negative attention
  • 17. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Historically, severe weather accounts for the majority of grid reliability issues, but physical attacks are a growing concern Major Grid Disturbances 0 20 40 60 80 100 120 140 160 2003 2004 2005 2006 2007 2008 2014 Weather Equipment Control Systems Human Error Load Shedding Other Number Of Incidents Source: EIA, BAH Analysis
  • 18. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Compliance Example- DTE Cyber Program Development 18 Detroit Edison (DTE) Cyber Security Program Assessment and Gap Analysis, Procedure Development Client Challenge Detroit Edison (DTE) sought an outside perspective on their position relative to key milestone requirements for implementation of NEI 08-09, and support to create a compliance roadmap including resource estimates to meet required deadlines. Booz Allen Solution To support DTE, Booz Allen:  Reviewed existing DTE procedures against the requirements of NEI 08-09  Formulated recommendations to address compliance gaps  Helped to quantify the LOE required for CDA Assessments, Critical System and CDA identification and documentation, and sustaining program support (excluding remediation required from initial assessments)  Assessed DTE’s level of compliance with 2012 milestones, and made recommendations to re-deploy labor to meet this year’s deadlines in the area of Critical System/CDA identification and documentation  Initiated effort to support development of the set of additional needed required procedures Results DTE implemented recommendations for labor re-direction and is on track to meet all 2012 milestones. Procedures are currently under development to allow full compliance within the required timeline.
  • 19. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . Because of these reasons cyber security has been only a compliance issue, but things are changing
  • 20. This document contains Booz Allen Hamilton, Inc. Proprietary and Confidential Business Information. . As the grid transforms it will become more dependent upon “smart” technology- increasing the need for cyber security 20