Ics Isac Overview V0.1pub

  • View
    387

  • Download
    2

Embed Size (px)

DESCRIPTION

Overview of the Industrial Control System Information Sharing and Analysis Center

Text of Ics Isac Overview V0.1pub

  • 1. ICS-ISAC Private/Public ICS Security Knowledge SharingCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution

2. ICS-ISACPublic/Private information sharing and analysis center to capture andtransport ICS security information across sectors. The ISAC structure ismandated by Homeland Security Presidential Directive 7 (HSPD-7). Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 3. ICS-ISAC Cross-ISAC Integration Vehicle Capture commonalities and sector-specific attributes Vendor-Customer Communications Standardized communication format Global Integration Center Develop global ICS security knowledge Aggregate public & private knowledge centersCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 4. Overview Leadership Chris Blask, Chair Brad Blask, Executive Director Sean Paul McGurk, Senior Policy Advisor Gib Sorebo, Senior Technology Advisor Membership Vendors Services Providers Asset Owners Knowledge Centers Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 5. Public Knowledge ICS-ISAC in the Global Knowledge Network CentersPrivateKnowledgeCenters LegendFiltered or RawData Private/Public KnowledgeFiltered Data CentersKnowledgeAggregationICS-ISAC Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 6. Public/Private Information Sharing Matrix: ISACsICS-ISAC IT-ISACMS-ISAC SC-ISAC NC-ISAC Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 7. Knowledge Flow ISACsNCCICVendors ICS-ISACServicePrivateProvidersKnowledge SharingCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 8. Real Time Knowledge Sharing CapgeminiMaritime YokogawaISAC CPNIUS ICS-ISACLIGHTS Yokogawa Japan JP-CERTCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 9. ICS-ISAC ArchitectureCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 10. Value to Vendors Single Consistent Communications Channel Advisory distribution and experience collection Reduced cost and increased effectiveness Private-Sector Voice in Public-Sector De facto private sector partner to government Negotiating center for private/public knowledge sharing standardsCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 11. Value to Asset Owners Single Consistent Feed Threats, Vulnerabilities and Best Practices Vendor notifications Private/Public, Private & Public Knowledge Centers All-Hazards Visibility Cross-sector for all critical functions i.e. power, water, supply chain, transportation Global knowledge sharing network Access to local, national and International resources Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 12. Value to Knowledge Sharing Centers Single Interface to Global Knowledge Sharing Network Propagate knowledge feed worldwide Real-time access to all ICS security knowledge sources Collaboration Platform Produce joint content with other knowledge centers Interoperability Platform Private sector forum for negotiation of knowledge interchange standards Public Sector Portal Stand-off from public knowledge centers Private sector voice to negotiate knowledge sharing with public sector Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 13. Global Knowledge NetworkICS Cybersecurity focuses on the enablement of critical infrastructureknowledge sharing architectures for Municipal, Regional, National and Globalapplications. Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 14. PublicKnowledgeKnowledge Sharing ModelCenters Private Knowledge CentersLegend Filtered or Raw DataPublic/PrivateKnowledgeKnowledgeCentersAggregationCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 15. InternationalRegional Model Information SharingPublic/Private FederalKnowledgeDistrictRegional Security Operations CentersMunicipal - tightly monitor critical assets- coordinate county and municipal StateProvince TerritoryRegion Copyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 16. State ModelFederalProcessCERT ISACStateOtherSectorSharingISACDistrictMunicipalityMunicipalityCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution 17. Thank You Brad BlaskExecutive Directorbrad@ics-isac.orgCopyright ICS Cybersecurity, Inc. 2012, Confidential, not for distribution