Title: MSISAC
1MS-ISAC
- Theresa Masse, Chief Information Security Officer
- State of Oregon
2ISACs
- Information Sharing and Analysis Centers
- Created in 1998 in response to a Presidential
Decision Directive - Public and private sector partnerships created to
share information about physical and cyber
threats, vulnerabilities, events to protect
critical infrastructure - Represent 14 critical infrastructures
3MS-ISAC
- Multi-State Information Sharing and Analysis
Center formed in 2003 - Funded by the US Department of Homeland Security
- Works collaboratively with a number of
organizations and other ISACs - First government entity to become a member of the
National ISAC Council
4MS-ISAC
- Focused originally on state government
- Current focus includes local government
(counties, cities, municipalities, townships) - Services driven to state needs and have expanded
since inception - Oversight and staff support provided by the State
of New York
5Mission
- The mission of the MS-ISAC is to provide a
common mechanism for raising the level of cyber
security readiness and response in each state and
with local governments. The MS-ISAC provides a
central resource for gathering information on
cyber threats to critical infrastructure from the
states and providing two-way sharing of
information between and among the states and with
local government.
6Major Objectives
- Disseminate early warnings of cyber system
threats - Share security incident information
- Provide trending and other analysis for security
planning - Distribute current proven security practices and
suggestions - Promote awareness of the interdependence between
cyber and physical critical infrastructure, as
well as between and among different sectors
7Early warnings of threats
- www.msisac.org/advisories
- Advisories include
- Overview
- Systems affected
- Risk levels for government, business, home users
- Recommendations
- References
8Early warnings of threats
9Dashboard
- 10 Ten Ports Under Attack
- DHS/ISAC Current Alert Levels
- Top 10 Attacking IPs
- Top Attacking IPs Locations
- Latest Viruses, News and Advisories
- Top 5 Countries -Cyber Attacks in US
- US Time Zone Information
- How To and Help
10Cyber Security Awareness
- Monthly Security Tips Newsletter
11Cyber Security Awareness
- oregon.gov/DAS/EISPD/ESO/pub.shtml
12SANS Training
- SANS training at greatly reduced prices
- Class System Forensics, Investigation and
Response (SEC508) - Training only 995 (list price 3,445)
- Training and 1 GIAC Certification Exam Attempt
1,395 - Training and 1 Proctored GIAC Certification Exam
Attempt 1,445 (Please note proctored exam is
applicable to the SANS Masters degree)
13SANS Training
- New SANS OnDemand 2
Courses Being Offered - Class MGT414 SANS S Training Program for the
CISSP Certification ExamMS-ISAC Price 895 -
- Class SEC504 Hacker Techniques, Exploits and
Incident HandlingMS-ISAC Price 895 - SANS OnDemand MGT 414 and SEC504MS-ISAC
Discount extended from June 30, 2007 to July 13,
2007
14Computer-Based Training
15Sentinel Training
- http//www.sentinelproject.net/about.html
- Coming to Portland Sept. 24-28
- Two courses available
- Cybersecurity Prevention, Deterrence Recovery
- Cybersecurity Incident Handling Response
16Sentinel Training
- Prevention, Deterrence, Recovery
- This class is designed primarily for public
safety employees who assist or maintain computer
and network operations for their organization.
Subjects include detection (e.g., anti-virus
programs), interdiction (e.g., passwords, system
patches, firewalls), critical infrastructure
protection (e.g., e-mail attachments, program
downloads and installation, back-up policies,
file and folder security), and information
sharing (e.g., secure transfer of XML data).
17Sentinel Training
- Incident Handling Response
- This class is designed primarily for technical
investigators and first responders. Students will
be taught techniques to trace intrusions back to
their source, methods for dealing with malicious
computer viruses and Trojans, and what
governmental agencies can provide as assistance
and resources. As part of a class exercise, real
world examples and problems will be stored on
servers for the participants to investigate in
order to acquire real-world, hands-on training.
Some of the subjects for this class will include
log collection and analysis, network forensics,
IP tracing, digital interception, technology
laws, network security, and digital interception.
18National Webcast Initiative
- In partnership with DHS National Cyber Security
Division - Series of national webcasts that examine critical
and timely cyber security issues - Available to a broad audience
- All sessions are recorded and archived for
viewing (www.msisac.org/webcast/)
19National Webcast Initiative
- Upcoming webcasts
- 8/22 Keeping your Broadband Internet Connection
Secure - 10/17 Kids Safe Online
- 12/19 BotNets
20National Webcast Initiative
- Recent webcasts
- 6/20/07 Security Policy Enforcement Secure
Network Access - 4/18/07 Mobile Security and Encryption
- 2/15/07 Digital Forensics for Organizations
- 12/14/06 Cyber Security What Does the Future
Hold?
21Services highlights
- Distribution of cyber security advisories and
bulletins - Public Web site
- Participation in cyber exercises
- Development of common incident response and cyber
alert level protocols - Support National Cyber Security Awareness Month
- Collaboration
22Public Web site
23Alert level protocols
- See example at www.cscic.state.ny.us/alertlevel/
24Cyber Security Awareness
- Support and promotion of National Cyber Security
Awareness Month
Public Service Announcements
25Cyber Security Awareness
- Toolkit of awareness materials sent to members
annually in the fall
26Legislative Resources
27Local Government Resources
28MS-ISAC Workgroups
- Cyber Exercise
- Legislative
- Outreach and Marketing
- Procurement
- Operations
- Education and Awareness
- Metrics and Compliance
29Cyber Exercise
- Objective Focused on facilitating cyber exercise
programs for MS-ISAC and states participation
30Legislative
- Objective Focused on tracking all major
legislation, rules and regulations across the
country relating to cyber security issues, and
recommending relevant cyber security legislation
for the MS-ISAC to support.
31Outreach and Marketing
- Objective Focused on recommending strategies for
distribution of cyber security education,
training and awareness content as well as cyber
alerts and advisories to states and localities.
Also focused on marketing of the MS-ISAC services
and programs.
32Procurement
- Objective Focused on assisting state governments
in identifying strategies or procurement of goods
and services related to cyber security
initiatives facilitating opportunities for state
and local joint procurement as well as
identifying and recommending available grant
opportunities.
33Operations
- Objectives Focused on strategies for operational
cyber security initiatives both within the
MS-ISAC, as well as the state level. This
includes recommendations of standards and
procedures for incident reporting and response.
34Education and Awareness
- Objective Focused on recommending development of
new or identification of existing cyber
security education, awareness and training
content for states and localities. This includes
recommendation of MS-ISAC program for annual
National Cyber Security Awareness Month.
35Metrics and Compliance
- Objective Focused on recommending and
implementing methodologies to help states with
cyber security metrics and compliance inventory,
assessment and audit of their cyber security
assets.
36Summary
- MS-ISAC offers a wealth of professionally
developed materials - Materials are free to the public sector
- To sign up for the MS-ISAC listserve contact
- margaret.morrissey_at_cscic.state.ny.us
- Suggestions? Contact
- theresa.masse_at_state.or.us
- (503) 378-4896