CISA hopes 2023 is proving to be a great year! Things have been busy at CISA with Director Easterly and Executive Assistant Director Eric Goldstein’s recent article in Foreign Affairs calling on technology providers to create products that are both “secure by design and secure by default.” This approach would mean products are developed with strong security with flaws being worked out before they get to consumers. There will be more on this in the coming weeks and months. We look forward to the year ahead. If there are topics you’d like to hear more about, please let us know by emailing awarenesscampaigns@cisa.dhs.gov
Cybersecurity Communications Initiatives
The President’s National Security Telecommunications Advisory Committee (NSTAC) held a conference call on Tuesday, February 21, 2023, from 3 pm to 4 pm EST to discuss current NSTAC activities and the government’s ongoing cybersecurity and NS/EP communications initiatives. This meeting was open to the public and included: (1) remarks from the administration and CISA leadership on salient NS/EP and cybersecurity efforts; (2) a status update on the NSTAC Addressing the Misuse of Domestic Infrastructure by Foreign Malicious Actors Subcommittee; and (3) a deliberation and vote on the NSTAC Report to the President on a Strategy for Increasing Trust in the Information and Communications Technology and Services Ecosystem. Meeting materials are posted at https://www.cisa.gov/nstac.
CISA Releases New Handbook to Address Technology Risks
On January 10, CISA released the Securing Small and Medium-Sized Business (SMB) Supply Chains: A Resource Handbook to Reduce Information and Communication Technology Risks. Developed by the Information and Communications Technology (ICT) Supply Chain Risk Management Task Force, the handbook provides an overview of the highest supply chain risk categories commonly faced by ICT SMBs, including cyber risks, and contains several use cases that can assist ICT SMBs in identifying the necessary resources to implement ICT supply chain security practices.
SAFECOM Develops Cyber Risk Assessment Guide for Public Safety
As public safety communications continue to integrate new technologies, the cyberattack surface becomes broader and more complex. To help public safety strengthen overall operational and cyber resiliency, SAFECOM has developed the Guide to Getting Started with a Cyber Risk Assessment. The document highlights six recommended assessment steps, which include:
- Identify and document network asset vulnerabilities;
- Identify and use sources of cyber threat intelligence;
- Identify and document internal and external threats;
- Identify potential mission impacts;
- Use threats, vulnerabilities, likelihoods, and impacts to determine risk;
- Identify and prioritize risk responses.
In addition, the document provides tables accompanying the relevant assessment steps which users can customize with contact information. Links to resources that are categorized by each assessment step are also included to further help organizations prepare and conduct a cyber risk assessment. While this guide provides an example of a cyber risk assessment structure, it is not a comprehensive list of all available resources and methods.
For questions about the Guide to Getting Started with a Cyber Risk Assessment, please contact SAFECOMGovernance@cisa.dhs.gov or visit cisa.gov/communications-resiliency for additional public safety communications and cybersecurity resiliency resources.
Successful Sector Partnership Meeting
On January 18, 2023, the IT and Communications Sector Management teams held a joint meeting with each sector’s respective SCCs and GCCs (referred to as “the Quad”). CISA Leadership presenting included Director Jen Easterly, Executive Assistant Director Eric Goldstein, and Assistant Director Mona Harrington. Principal Deputy National Cyber Director Kemba Walden also addressed the SCC and GCC partners. This is an annual meeting to spotlight information sharing, provide industry and government partners an opportunity to discuss sector priorities, and steer the trajectory of the IT and communications sector community.
On January 19, 2023, the Enduring Security Framework, co-chaired by Director Easterly and General Nakasone (NSA), will host their quarterly Operations Group Meeting to discuss challenges impacting national security and jointly address any related risks. The status and progress of the current working panels and target topics to consider for further discovery will also be discussed.
15th Anniversary for Chemical Facility Anti-Terrorism Standards (CFATS) Programs
Threat Hunting
Threat Hunting’s Control Environment Laboratory Resource (CELR) is a collection of representative operational technology (OT) environments comprised of actual control system hardware and software used for research, training, capability testing, and supporting operational elements of the Cybersecurity Division (CSD). These environments, known as skids, include purpose-built processes, kinetic effects, and specific technologies found in US Critical Infrastructure (CI). CELR aims to represent all 16 critical infrastructure sectors providing opportunities for enhancing the way public and private partners defend ICS networks. Some of CELR’s service offerings include cyber-attack demonstrations, simulated engagements (Red vs Blue), OT Solutions Assessment and OT test range to support research and product development. CELR’s partners include Idaho National Laboratory (INL), Pacific Northwest National Laboratory (PNNL), MITRE Homeland Security Systems Engineering and Development Institute (HSSEDI), Johns Hopkins Applied Physics Laboratory, and DHS’s Science and Technology Directorate.
CISA Releases Report with Resources for K-12 Schools to Address Cybersecurity Risk
On January 24, CISA shared a new report with our education partners and state, local and tribal officials, Protecting Our Future: Partnering to Safeguard K-12 Organizations from Cybersecurity Threats.
The report provides recommendations and resources to help K-12 schools and school districts address systemic cybersecurity risk. It also provides insight into the current threat landscape specific to the K-12 community and offers simple steps school leaders can take to strengthen their cybersecurity efforts.
The report’s findings state that K-12 organizations need resources, simplicity, and prioritization to effectively reduce their cybersecurity risk. To address these issues, CISA provides three recommendations in the report to help K-12 leaders build, operate, and maintain resilient cybersecurity programs:
- Invest in the most impactful security measures and build toward a mature cybersecurity plan.
- Recognize and actively address resource constraints.
- Focus on collaboration and information-sharing.
Along with the report, we are providing an online toolkit which aligns resources and materials to each of CISA’s three recommendations along with guidance on how stakeholders can implement each recommendation based on their current needs.
We encourage you to read the full report along with the supporting toolkit, and we look forward to our continuing collaboration in the year ahead!
CISA’s K – 12 Cybersecurity Education Training Assistance Program (CETAP) and CYBER.ORG: Through CISA’s CETAP grantee, CYBER.ORG, CISA offers K-12 teachers with cybersecurity curricula and education tools. CYBER.ORG develops and distributes free cybersecurity, STEM, and computer science curricula to K-12 educators across the country. Below are upcoming training events through CYBER.ORG.
October 27- Elementary and Middle Schoolers
Cybersecurity Awareness for Elementary and Middle School (Virtual Event): In this 60-minute workshop, dive into age-appropriate cybersecurity activities that can be integrated into any classroom. These simple lessons help students understand basic cybersecurity concepts such as privacy policies, digital footprints, website credibility, encryption, and more. Learn how to facilitate conversations that will empower students to navigate in the digital age. No prior experience or knowledge is necessary! To learn more or sign up, visit https://cyber.org/events or contact us at education.cisa.dhs.gov.
|
|
ICS Training Events through 2022
|
|
Date
|
Course Code
|
Course
|
Location
|
|
|
|
|
|
|
On Demand
|
100W
|
Operational Security (OPSEC) for Control Systems
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-1
|
Differences in Deployments of ICS
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-2
|
Influence of Common IT Components on ICS
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-3
|
Common ICS Components
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-4
|
Cybersecurity within IT & ICS Domains
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-5
|
Cybersecurity Risk
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-6
|
Current Trends (Threat)
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-7
|
Current Trends (Vulnerabilities)
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-8
|
Determining the Impacts of a Cybersecurity Incident
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-9
|
Attack Methodologies in IT & ICS
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-10
|
Mapping IT Defense-in-Depth Security Solutions to ICS - Part 1
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
210W-11
|
Mapping IT Defense-in-Depth Security Solutions to ICS - Part 2
|
CISA Training Virtual Learning Portal (VLP)
|
|
On Demand
|
FRE2115
|
Industrial Control Systems Cybersecurity Landscape for Managers
|
CISA Training Virtual Learning Portal (VLP)
|
|
|
CISA’s K – 12 Cybersecurity Education Training Assistance Program (CETAP) and CYBER.ORG: Through CISA’s CETAP grantee, CYBER.ORG, CISA offers K-12 teachers with cybersecurity curricula and education tools. CYBER.ORG develops and distributes free cybersecurity, STEM, and computer science curricula to K-12 educators across the country. Below are upcoming training events through CYBER.ORG.
October 27- Elementary and Middle Schoolers
Cybersecurity Awareness for Elementary and Middle School (Virtual Event): In this 60-minute workshop, dive into age-appropriate cybersecurity activities that can be integrated into any classroom. These simple lessons help students understand basic cybersecurity concepts such as privacy policies, digital footprints, website credibility, encryption, and more. Learn how to facilitate conversations that will empower students to navigate in the digital age. No prior experience or knowledge is necessary! To learn more or sign up, visit https://cyber.org/events or contact us at education.cisa.dhs.gov.
|
|