Government Agencies

 

 

https://sm.asisonline.org/Pages/Cybersecurity-and-Infrastructure.aspxQ&A: Cybersecurity and InfrastructureGP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-10-01T04:00:00Z<p>​Jeanette Manfra serves as the U.S. Department of Homeland Security’s National Protection and Programs Directorate (NPPD) Assistant Secretary for the Office of Cybersecurity and Communications.</p><p><em>Q. What is NPPD's role in protecting the nation's cybersecurity infrastructure?</em></p><p><strong>A. </strong>We see ourselves as the national risk manager. It's not that we own all the risk or have the ability to unilaterally take actions to reduce that risk, but we are the organization that sits in the center between the intelligence community, U.S. Department of Defense, and law enforcement, and the threat side—federal networks, critical infrastructure, and all of our partners in the private sector—to understand what risk looks like for them and for the nation. We identify what risk looks like in coordination with our partners and what actions we can take, whether that's government actions or industry actions or collective actions to reduce that risk. Though NPPD's role won't change, legislation has been introduced to change our name from NPPD to the Cybersecurity Infrastructure Security Agency. This change is designed to help people understand what we do.</p><p><em>Q. How does cybersecurty affect the physical infrastructure of the country?</em></p><p><strong>A.</strong> The more dependent the delivery of those critical services becomes on technology and connectivity of networks, the more the attack surface increases. Risk can no longer be thought of as belonging to an individual organization. Previously, an organization could have a pretty full understanding of what its individual risk was and take steps to manage that risk. Now you're in a position where there's shared risk across the country. It's a different way we have to think about risk.</p><p><em><strong>Q. </strong>What are some examples of cybersecurity threats you're seeing? </em></p><p><strong>A. </strong>The things I am most concerned about revolve around critical services and functions. An adversary can disrupt those, whether by creating a situation where we're not able to trust the data, or by remotely manipulating something physical. Those are not theoretical threats. The department has spent the last several months raising awareness on what nation-states are attempting to do, but the good news is that the electric sector has a lot of resilience built into the industry to recover power quickly during an outage, and that can be applicable for a cyber situation—you don't always need a cyber solution for a cyber problem. </p><p><em><strong>Q. </strong>What's in store for NPPD in the coming months?</em></p><p><strong>A. </strong>We just announced the national risk management center, which will address all types of national risk and how we manage that risk collectively. Cybersecurity will be a big part of that. We're also very focused on workforce. By incorporating cybersecurity in curriculums and truly investing in teaching people about the security side of these technologies, we're not only raising a generation of individuals who understand how to be safer digital citizens, but we can recruit some of them to be professionals.   </p>

Government Agencies

 

 

https://sm.asisonline.org/Pages/Cybersecurity-and-Infrastructure.aspx2018-10-01T04:00:00ZQ&A: Cybersecurity and Infrastructure
https://sm.asisonline.org/Pages/Portrait-of-a-Shooter.aspx2018-10-01T04:00:00ZPortrait of a Shooter
https://sm.asisonline.org/Pages/Zakaria-Touches-on-Turmoil.aspx2018-09-25T04:00:00ZZakaria Touches on Turmoil
https://sm.asisonline.org/Pages/Election-Hardening.aspx2018-09-01T04:00:00ZElection Hardening
https://sm.asisonline.org/Pages/Soft-Targets,-Hard-Challenges.aspx2018-09-01T04:00:00ZSoft Targets, Hard Challenges
https://sm.asisonline.org/Pages/Cyber-Goals-Past-Due.aspx2018-08-01T04:00:00ZCyber Goals: Past Due
https://sm.asisonline.org/Pages/Brac-to-the-Future.aspx2018-07-01T04:00:00ZBrac to the Future
https://sm.asisonline.org/Pages/Far-Distant-Clearings.aspx2018-06-01T04:00:00ZFar Distant Clearings
https://sm.asisonline.org/Pages/Space-Jam.aspx2018-05-01T04:00:00ZSpace Jam
https://sm.asisonline.org/Pages/The-Land-of-Plunder.aspx2018-04-01T04:00:00ZThe Land of Plunder?
https://sm.asisonline.org/Pages/The-Price-of-Destruction.aspx2018-04-01T04:00:00ZThe Price of Destruction
https://sm.asisonline.org/Pages/Paving-the-Way.aspx2018-03-01T05:00:00ZPaving the Way
https://sm.asisonline.org/Pages/Containment-Strategies.aspx2018-02-01T05:00:00ZContainment Strategies
https://sm.asisonline.org/Pages/Opening-Up.aspx2018-02-01T05:00:00ZOpening Up
https://sm.asisonline.org/Pages/Vote-Integrity.aspx2018-02-01T05:00:00ZVote Integrity
https://sm.asisonline.org/Pages/Disaster-Dominoes.aspx2018-01-01T05:00:00ZDisaster Dominoes
https://sm.asisonline.org/Pages/Whistleblowing---Money-v-Motivation.aspx2018-01-01T05:00:00ZWhistleblowing: Money v. Motivation.
https://sm.asisonline.org/Pages/Evolving-Biothreats.aspx2018-01-01T05:00:00ZEvolving Biothreats
https://sm.asisonline.org/Pages/Blurred-Lines.aspx2017-12-01T05:00:00ZBlurred Lines
https://sm.asisonline.org/Pages/Postal-Peculiarities.aspx2017-12-01T05:00:00ZPostal Peculiarities

 You May Also Like...

 

 

Physical Securityhttps://sm.asisonline.org/physical-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
National Securityhttps://sm.asisonline.org/national-security{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.
Employee Managementhttps://sm.asisonline.org/physical-security/employee-management{198ff2c5-db82-48f1-a9b9-8e8950e165de}Your source for the latest security news.