SlideShare une entreprise Scribd logo
1  sur  39
Building a Modern Security Policy for Social Media Page 1
Who is Michael Smith? ,[object Object]
Graduate of Russian basic course, Defense Language Institute, Monterey, CA
DotCom survivor
Infantryman, deployed to Afghanistan (2004)
CISSP #50247 (2003), ISSEP (2005)
Former CISO, Unisys Federal Service Delivery Center
Currently a Manager in a Big Four Firm,[object Object]
CISSP (2007), CAP (2007)
Federal Information Security Architect for Tantus Technology
Founder of FISMApedia.org and FISMA arts,[object Object]
A Quick Poll Page 5 ,[object Object]
Are you using Government-owned hosting?
Do you don’t know how/where you’re being hosted?
Have you ever ignored the IT Security Staff because they just “get in the way”?,[object Object]
NIST Risk Management Framework Page 7
Defining the Problem Space: SDLC Initiation to O&M is a minimum of 120 days with 6 months being typical.  How does this fit into your plans for social media? Page 8
Understanding Your Objectives Page 9 ,[object Object]
Hosting: CO-CO v/s GO-GO
Security: Enabler v/s Roadblock
Simplicity: Engagement v/s “Shiny Objects”
Be willing to negotiate with the security staff,[object Object]
Threat Landscape Government to Government: Internal social media services within or between agencies Government (internally hosted) to Public: Social media services on government sites Government (externally hosted) to Public: External social media services used by the government Government users in public: Social media services used by government users Page 11
Getting to a Good SocMed Policy Engage early, engage often Policy should focus on risk, not technology Social media technology changes constantly Data protection requirement is constant Consider the business case Consider the risks to organizational operations, organizational assets, individuals, other organizations, and the Nation Make risk-based decisions goals Page 12
Primary Resources CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies, v1.0 http://www.cio.gov/library/library_category2.cfm?structure=Information%20Technology&category=IT%20Security%20/%20Privacy GSA Terms of Service Agreements with New Media Providers http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml NARA Records Management Policy and Guidance http://archives.gov/records-mgmt/policy/ Page 13
Primary Resources - FISMA NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach NIST SP 800-39 DRAFT Managing Risk from Information Systems: An Organizational Perspective SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/PubsSPs.html Page 14
Related Requirements Communications Policy 508 Compliance Policy Federal Records Management Policy Page 15
Risk Management Hierarchy Page 16 ,[object Object],(Oversight and Governance) ,[object Object]
  Risk Mitigation Approaches
  Risk Tolerance
  Risk Monitoring Approaches
  Linkage to ISO/IEC 27001Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System
Risk Management Hierarchy Page 17 Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System ,[object Object]
  Information Flows
  Information Categorization
Information Protection Strategy
  Information Security Requirements
  Linkage to Enterprise Architecture,[object Object]
  Information System Categorization

Contenu connexe

Tendances

Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of GlobalizationAujas Networks Pvt. Ltd.
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019Amy Lauder
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...Black Duck by Synopsys
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 

Tendances (18)

Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019ORX Cyber Risk Presentation March 2019
ORX Cyber Risk Presentation March 2019
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 

En vedette

Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non ProfitsDoug
 
Non Profits and Social Media
Non Profits and Social Media Non Profits and Social Media
Non Profits and Social Media Evelyn McCormack
 
Social media for government
Social media for governmentSocial media for government
Social media for governmentGohar Khan
 
Social Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsSocial Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsEAHarter
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthCraig Thomler
 
Social Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsSocial Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsDayn Wilberding
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social MediaStrategyWorks
 
Social Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopSocial Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopWild Apricot
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentDavid Sweigert
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsMark Schaefer
 
Social Media for Non Profits
Social Media for Non ProfitsSocial Media for Non Profits
Social Media for Non ProfitsPrimal Media
 

En vedette (14)

Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non Profits
 
Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)
 
Social Media For Non Profits
Social Media For Non ProfitsSocial Media For Non Profits
Social Media For Non Profits
 
Non Profits and Social Media
Non Profits and Social Media Non Profits and Social Media
Non Profits and Social Media
 
Social media for government
Social media for governmentSocial media for government
Social media for government
 
Social Media For Non-Profit Administrators
Social Media For Non-Profit AdministratorsSocial Media For Non-Profit Administrators
Social Media For Non-Profit Administrators
 
Social media in government - presentation to NSW Health
Social media in government - presentation to NSW HealthSocial media in government - presentation to NSW Health
Social media in government - presentation to NSW Health
 
Social Media Strategies for Non-Profits
Social Media Strategies for Non-ProfitsSocial Media Strategies for Non-Profits
Social Media Strategies for Non-Profits
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social Media
 
Social Media for Non-Profits Workshop
Social Media for Non-Profits WorkshopSocial Media for Non-Profits Workshop
Social Media for Non-Profits Workshop
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State Government
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-Trends
 
Social Media for Non Profits
Social Media for Non ProfitsSocial Media for Non Profits
Social Media for Non Profits
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 

Similaire à Building A Modern Security Policy For Social Media and Government

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfRobertBrown631492
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookKristine Simpson
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 

Similaire à Building A Modern Security Policy For Social Media and Government (20)

2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
IABC social media for government by Jeff Braybrook
IABC social media for government by Jeff BraybrookIABC social media for government by Jeff Braybrook
IABC social media for government by Jeff Braybrook
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Gilbert "NIST Privacy Framework Version 1.0"
Gilbert "NIST Privacy Framework Version 1.0"Gilbert "NIST Privacy Framework Version 1.0"
Gilbert "NIST Privacy Framework Version 1.0"
 

Plus de Michael Smith

Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Michael Smith
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Michael Smith
 
Security Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecuritySecurity Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecurityMichael Smith
 
The Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionThe Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionMichael Smith
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government SecurityMichael Smith
 

Plus de Michael Smith (8)

Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
Meta-Metrics: Building a Scorecard for the Evaluation of Security Management ...
 
Barcodes
BarcodesBarcodes
Barcodes
 
Dojo Con 09
Dojo Con 09Dojo Con 09
Dojo Con 09
 
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
 
Security Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application SecuritySecurity Content Automation Protocol and Web Application Security
Security Content Automation Protocol and Web Application Security
 
The Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation DecisionThe Authorizing Official And The Accreditation Decision
The Authorizing Official And The Accreditation Decision
 
Backtrack 3 USB
Backtrack 3 USBBacktrack 3 USB
Backtrack 3 USB
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government Security
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Building A Modern Security Policy For Social Media and Government

  • 1. Building a Modern Security Policy for Social Media Page 1
  • 2.
  • 3. Graduate of Russian basic course, Defense Language Institute, Monterey, CA
  • 5. Infantryman, deployed to Afghanistan (2004)
  • 6. CISSP #50247 (2003), ISSEP (2005)
  • 7. Former CISO, Unisys Federal Service Delivery Center
  • 8.
  • 10. Federal Information Security Architect for Tantus Technology
  • 11.
  • 12.
  • 13. Are you using Government-owned hosting?
  • 14. Do you don’t know how/where you’re being hosted?
  • 15.
  • 16. NIST Risk Management Framework Page 7
  • 17. Defining the Problem Space: SDLC Initiation to O&M is a minimum of 120 days with 6 months being typical. How does this fit into your plans for social media? Page 8
  • 18.
  • 21. Simplicity: Engagement v/s “Shiny Objects”
  • 22.
  • 23. Threat Landscape Government to Government: Internal social media services within or between agencies Government (internally hosted) to Public: Social media services on government sites Government (externally hosted) to Public: External social media services used by the government Government users in public: Social media services used by government users Page 11
  • 24. Getting to a Good SocMed Policy Engage early, engage often Policy should focus on risk, not technology Social media technology changes constantly Data protection requirement is constant Consider the business case Consider the risks to organizational operations, organizational assets, individuals, other organizations, and the Nation Make risk-based decisions goals Page 12
  • 25. Primary Resources CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies, v1.0 http://www.cio.gov/library/library_category2.cfm?structure=Information%20Technology&category=IT%20Security%20/%20Privacy GSA Terms of Service Agreements with New Media Providers http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml NARA Records Management Policy and Guidance http://archives.gov/records-mgmt/policy/ Page 13
  • 26. Primary Resources - FISMA NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach NIST SP 800-39 DRAFT Managing Risk from Information Systems: An Organizational Perspective SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/PubsSPs.html Page 14
  • 27. Related Requirements Communications Policy 508 Compliance Policy Federal Records Management Policy Page 15
  • 28.
  • 29. Risk Mitigation Approaches
  • 30. Risk Tolerance
  • 31. Risk Monitoring Approaches
  • 32. Linkage to ISO/IEC 27001Risk Management Strategy TIER 1 Organization NIST SP 800-39 TIER 2 Mission / Business Process TIER 3 Information System
  • 33.
  • 35. Information Categorization
  • 37. Information Security Requirements
  • 38.
  • 39. Information System Categorization
  • 40. Selection of Security Controls
  • 41.
  • 42. Risk Acceptance
  • 43. Continuous MonitoringTIER 1 Organization NIST SP 800-37 TIER 2 Mission / Business Process Risk Management Framework TIER 3 Information System
  • 44. Policy Controls Social Media Communications Strategy Acceptable Use Policies (AUP) Content Filtering and Monitoring Privacy and Security Support Integration with NIST SP 800-39 and NIST SP 800-37 Risk Management Page 19
  • 45. Policy Controls – NIST Guidance AC-20 Use of External Information Systems AC-22 Publicly Accessible Content IA-2 Identification and Authentication (Organizational Users) IA-5 Authenticator Management IA-7 Cryptographic Module Authentication IA-8 Identification and Authentication (Non-Organizational Users) Page 20
  • 46. Policy Controls – NIST Guidance IR-5 Incident Monitoring IR-6 Incident Reporting IR-7 Incident Response Assistance IR-8 Incident Response Plan PL-4 Rules of Behavior PL-5 Privacy Impact Assessment RA-1 Risk Assessment Policy and Procedures SI-12 Information Output Handling and Retention Page 21
  • 47. Acquisition Controls Strong Authentication Social Media services security practice Comment moderation and monitoring social media Ensure federal security requirements are met by using dedicated resources from vendors Modify user’s public profiles from .gov or .mil email addresses to provide stronger security Page 22
  • 48. Acquisition Controls Partner with social media services to: Provide traceability to federal employee accounts Improve communications between providers and Security Operations Centers (SOC) Allow independent monitoring of social media service providers Encourage use of validated and signed code Ensure social media provider maintains appropriate configuration, patch and technology refresh levels Page 23
  • 49. Acquisition Controls Ensure an independent risk assessment Records management in accordance with NARA record schedules, FOIA requests and e-discovery litigation holds Ensure hosted federal content is accessible at any time and stored in editable and non-proprietary formats Page 24
  • 50. Acquisition Controls – NIST Guidance SA-1 System and Services Acquisition Policy and Procedures SA-2 Allocation of Resources SA-3 Life Cycle Support SA-4 Acquisitions SA-5 Information System Documentation SA-9 External Information System Services Page 25
  • 51. Acquisition Controls – GSA Guidance Terms of Service Agreements Social media services standard Terms of Service (TOS) Agreements present legal problems Many services are free, making it hard to encourage services to negotiate new TOS On behalf of the government, GSA has negotiated new TOS for many social media services http://www.usa.gov/webcontent/resources/tools/TOSagreements.shtml Page 26
  • 52. Training Controls Provide awareness, guidance and training on: Information to that can be shared, can not be shared and with whom it can be shared Social media policies and guidelines including AUP Blurring of personal and professional life as appropriate For Operations Security (OPSEC) on risks of social media Federal employees self-identification on social media sites, depending on roles Page 27
  • 53. Training Controls Provide awareness, guidance and training on: Privacy Act requirements and restrictions Specific social media threats before granting access to social media sites Possible negative outcomes of information leakage, social media misuse and password reuse Possible impact on security clearance Page 28
  • 54. Training Controls – NIST Guidance AT-2 Security Awareness: Add social media usage related awareness training AT-3 Security Training: Create specific role-based training for those with social media responsibility AT-5 Contacts with Security Groups and Associations: Establish contacts with security groups addressing web application and social media security Page 29
  • 55. Host Controls Require use of a hardened Common Operating Environment (COE): Federal Desktop Core Configuration (FDCC) Security Content Automation Protocol (SCAP) Encourage use of strong authentication for greater assurance of a user’s identity: Two-factor authentication (e.g., HSPD-12 & PIN) Page 30
  • 56. Host Controls Ensure strong change management, patch management, configuration management: Includes applications and Operating Systems Enforces strong logging Reports to SOC Desktop virtualization technologies: Allows safer viewing of potentially malicious websites Virtual sandbox protects base operating system Page 31
  • 57. Host Controls Browser versioning: Ensure use latest browsers which include additional security measures Encourage use of signed code or white listing: Provides higher level of assurance software comes from approved vendor or is approved software Page 32
  • 58. Host Controls – NIST Guidance Audit and Accountability (AU) Family of controls, as applicable AC-1 Access Control Policy and Procedures AC-7 System Use Notification CM-1 Configuration Management Policy and Procedures CM-2 Baseline Configuration CM-6 Configuration Settings CM-7 Least Functionality Page 33
  • 59.
  • 60. Network Controls Federal Trusted Internet Connection (TIC) program protections: Reduced number of internet connections Einstein traffic inspection Security Operations Center (SOC) and Network Operations Center (NOC): Visibility and centralized control for incident response and risk reduction These should all be provided to you as “infrastructure” Page 35
  • 61. Network Controls Web content filtering: Beyond Einstein protections Granular control of web applications, data and protocols Trust Zones dependent on security assurance requirements DNSSEC to better ensure website name resolution integrity Page 36
  • 62. Network Controls Focus on data-centric protection URL Shortening: http://go.usa.gov/ Page 37
  • 63. Network Controls – NIST Guidance SC-1 System and Communications Protection Policy and Procedures SC-7 Boundary Protection SC-13 Use of Cryptography SC-14 Public Access Protections SC-15 Collaborative Computing Devices SC-20 Secure Name /Address Resolution Service (Authoritative Source) Page 38
  • 64. Questions, Comments, or War Stories? http://www.potomacforum.org/ Michael Smith: rybolov(a)ryzhe.ath.cx http://www.guerilla-ciso.com/ Dan Philpott: danphilpott(a)gmail.com http://www.fismapedia.org/ 39

Notes de l'éditeur

  1. Mike’s blog is at http://www.guerilla-ciso.com/Mike teaches for Potomac Forum http://www.potomacforum.org/Contact information for Mike is at the end of this presentation.
  2. Dan is the founder of http://www.FISMApedia.org/Dan blogs at http://www.guerilla-ciso.com/ and http://ArielSilverstone.comDan teaches for Potomac Forum http://www.potomacforum.org/