SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Security, Vulnerability &
Redundancy
Summary of 2009 Taskforce findings
Mike O’Connor
mike@haven2.com
Lead
StimulateOversee
Resources:
•Organizational
•Technology
•Human
Vision
Strategy
Progress
Availability
Penetration
Goals
Actions
Technology,
architecture
Funding
Infrastructure
Connectivity
Capacity
Performance
Affordability
Behaviors
Capabilities
Facilities
Impact
Communities
Cost
People Businesses
Demand
Benefits
Content
Information
Goals
Distinguish Minnesota as a secure and
reliable place to work, play and innovate
on the Internet. Positioning Minnesota in this
way will
• Provide a competitive advantage for the state
• Strengthen businesses
• Protect consumers and citizens
• Promote the development and early adoption of
advanced applications
Objectives
• Ensure that the middle-mile broadband infrastructure in the state has no
“single points of failure” in the event of a disaster or
attack.
• Ensure that there are multiple diverse high-capacity routes for
“commodity” Internet traffic entering and leaving the
state.
• Ensure redundancy for public safety. As high speed broadband
becomes the medium for the communication and delivery of vital functions such as
police, dispatch and ambulance services, phone service, telemedicine services etc.
backup systems need to be available in the event of the failure of the primary
broadband link. For example, in rural Minnesota the failure of the only fiber
carrying these vital services to the remote and sparsely populated areas of the
state, without a back-up option, could result in major public safety concerns.
Objectives
• Explore peering strategies and the degree to which they
can contribute to our security, vulnerability and
redundancy goals. All Internet providers should consider exchanging
intra-state Internet traffic within the state. This is an inexpensive, robust way to
increase performance and reduce vulnerability by allowing the state to remain a
fully functioning “island” in the event of attacks and disasters that happen
elsewhere.
• Ensure that there are mechanisms to protect the
confidentiality of sensitive information while still making it
available to practitioners and policy-makers.
• Ensure that there is a robust ongoing multi-
stakeholder collaboration in regard to security,
vulnerability and redundancy activities statewide.
Then...
Now...
www.MICEmn.net
Lead
Resources:
•Organizational
•Technology
•Human
Vision
Strategy
Goals
Actions
Communities
People Businesses
Information
Lead
Lead
 
“We cannot afford to discover successful cyber intrusions after-the-fact, accept
disastrous losses, and then seek merely to contain them. It requires a broad alliance
of departments, agencies, and industry leaders to focus on countering the threat,
mitigating vulnerabilities, and enhancing resiliency in order to preserve our national
security, national economy, and public welfare.”
Dennis Blair, Director of National Intelligence
Hearing on “Annual Threat Assessment of the Intelligence Community” for the Senate Select Committee on
Intelligence, February 12, 2009
Just as with achieving our other broadband goals, “steady leadership wins the race.”
Ensuring that the state has secure reliable redundant broadband infrastructure is not
a one-time project but rather a long-term commitment of leadership talent to an
ongoing program of vigilance and collaborative problem solving.
As with achieving our other goals, the Task Force recommends that this leadership net
be thrown as widely as possible. While the State must continue to play an active
convening and enabling role, there is a need to continuously to draw in leadership 
capability from across all stakeholders. 
Lead
Lead: Mobilize
Mobilizing communities and their human, technology and organizational resources
While ensuring secure redundant broadband is a statewide goal, it's a problem that will
ultimately have to be addressed locally. Thus an important part of success hinges on security-
aware consumers and organizations that understand what resources they have at hand, the 
resources they need, and develop good strategies to make the most of these.
•Recommendation: Collect best-practice methodologies and tools, and make them available to
consumers and organizations that are undertaking security and redundancy efforts.
•Recommendation: Identify current and planned security and redundancy efforts across the
state (such as the Chief Security Officer forum, InfraGuard and the Center for Strategic
Information Systems and Security) and make them aware of each other. Strongly encourage
collaboration.
•Recommendation: Identify and endorse an organization (or collaborative) that can provide an
ongoing focal point and funding for these tools and activities.
•Recommendation: Identify technical and professional experts with expertise in this area and
share that list with people and organizations in need of assistance.
•Recommendation: Develop “what’s in it for me?” materials to assist in recruiting and retaining
public and private-sector participants.
Lead
Lead: Empower
Empowering people and organizations
Much of the work of securing the Internet depends on informed and educated consumers. At
the same time, there is an opportunity to increase the value of Minnesota's workforce by
improving Internet security skills, skills that are becoming ever more important as we defend 
our citizens, businesses and online assets from ever increasing attacks. Indeed a recently
released report from the Partnership for Public Service and Booz, Allen Hamilton says, “our
federal government will be unable to combat these threats without a more coordinated,
sustained effort to increase cybersecurity expertise in the federal workforce.” The same can be
said for private and public-sector organizations here in Minnesota.
•Recommendation: Support efforts to build cybersecurity awareness and skills by coordinating
existing efforts (e.g. library programs) and leveraging existing capabilities (e.g. community
education, community and technical colleges and Minnesota’s university systems).
•Recommendation: Provide tax incentives for individuals and organizations that undertake to
increase their security skills, assist with helping to reduce the vulnerability of our Internet
infrastructure or build out facilities that increase redundancy.
•Recommendation: Coordinate with jobs programs and encourage the addition of cybersecurity
components to each.
Lead
Lead: Manage
Managing vision, goals, strategy and actions 
Bringing secure redundant reliable broadband to everybody in the state is a large
undertaking and it will happen much more quickly if the many efforts are well 
guided and coordinated. In addition, it's very important that all stakeholders have a
clear understanding of who is accountable for making this happen.
•Recommendation: Include cybersecurity, vulnerability and redundancy in the remit
of the proposed permanent multi-stakeholder Minnesota Broadband Advisory Council
(MBAC) housed in the Department of Commerce to guide the leadership, stimulus and
oversight functions outlined in this report.
•Recommendation: The enabling legislation that forms the Council must establish
clear expectations for meeting our security, vulnerability and redundancy goals
•Recommendation: Provide a small ongoing staff to provide continuity the MBAC.
•Recommendation:  Generate an annual report (perhaps building on this report) that
describes the current status ("where we are now"), long and short range goals
("where we are going"), and action-plans ("how we will get there") with regard to
meeting our cybersecurity and redundancy goals.
Lead
Stimulate
Strategy
Actions
Funding
Infrastructure
Capabilities
Facilities
Demand
Content
Stimulate
Stimulate
“It’s now clear that this cyber threat is one of the most serious economic and
national security challenges we face as a nation. It’s also clear that we’re not
as prepared as we should be, as a government or as a country.”
President Barack Obama, May 29, 2009
 
Achieving secure, reliable broadband will require heavy lifting by many people and
organizations and, as with its other recommendations, the Task Force wants to
recommend ways to stimulate this activity. Security, vulnerability and redundancy 
are, at their core, issues of “readiness.” Like all readiness issues, the focus needs to
be on the things that need to happen in order to get ready. Collectively the state
needs to make sure those ongoing, ever more refined, preparations are happening
quickly and effectively.
As with the other recommendations, this has to be a multi-stakeholder effort in order
to be successful and the Task Force looks to the proposed Minnesota Broadband
Advisory Council to make sure that these collaborations happen, and happen in a
timely manner.
Stimulate: Coordinate
Coordinating public and private activities that move the state toward more secure, redundant 
broadband
Much of the work of achieving the state’s broadband security and redundancy goals will be easier if it
is coordinated. Providers and their large customers need to leverage opportunities created by each
other's projects. Businesses large and small will benefit from knowing where and when secure,
redundant facilities will be added or will become available. Smooth coordination is crucial to 
becoming more nimble in responding to cyber threats and disasters as well as deploying 
preventative capabilities.  
Coordination should not be limited to within the State. Indeed, the Task force wishes to avoid the "not
invented here" trap and coordinate Minnesota's efforts security, vulnerability and redundancy efforts
with those in neighboring states, across the country and worldwide.
•Recommendation: Identify and support new and existing consortia and partnerships needed to
advance these security, vulnerability and redundancy goals (note; the Public Private Partnership sub-
group may have some specific ideas here).
•Recommendation: Plan once; develop coordinated broadband, electric grid, and energy
reliability/redundancy projects
•Recommendation: Dig once; coordinate infrastructure construction projects, such as roads and
electrical grid improvements with broadband projects aimed at increasing redundancy and reducing
vulnerability.
•Recommendation: Include this coordination role in the charter of the proposed Minnesota
Broadband Advisory Council, but set the expectation that the Council aggressively enlist the ongoing
aid of public and private partners (both individuals and organizations) in doing this work.
•Recommendation: Ensure that the MBAC members are aware of and encouraged to attend
conferences with similar statewide broadband security councils.
Stimulate
Stimulate: Build
Building facilities, infrastructure and content
Ultimately achieving secure, less-vulnerable, redundant broadband is about building things -- facilities,
infrastructure, systems, and response-teams to name a few. The days have passed where the Internet was
a discretionary product offered by purely market-driven communications providers. Today the Internet is
an economic and social necessity that is rapidly becoming indispensable to Minnesotas citizens and
organizations. While there are strong market forces driving providers towards some of the goals we
describe, there is a need to stimulate collaboration, shared infrastructure and services that no single 
provider could justify or undertake on their own. Minnesota needs to stimulate actions that will fill those
gaps in a way that also provides for future improvement as security, vulnerability and redundancy needs
inevitably increase while maintaining the state as a welcoming place for innovative providers to do
business.
There is also the need to build education and training capabilities if goals are to be met because, as many
know, awareness drives demand and demand drives deployment. Thus this section of the report also
includes several content-building recommendations.
•Recommendation: Initiate a study to develop a wide-ranging collaborative funding strategy to support
the recommendations of this report
•Recommendation: Support the formation of procurement collaborations by government, educational
institutions and businesses to stimulate deployment of advanced last-mile and middle-mile infrastructure
•Recommendation: Promote service-provider collaboration to deliver on the redundancy and reliability
goals.
•Recommendation: Encourage municipalities and regions interested in building broadband networks to
participate in incentive programs where their projects could reduce vulnerability and increase redundancy.
Stimulate
Stimulate: Incent
Incenting  -- funding, demand and capabilities
Some actions needed to accomplish security, vulnerability and 
redundancy goals will require incentives.  In some cases these
incentives will have to be monetary, but this section also raises the
possibility of non-monetary incentives (e.g. promotion and
recognition) and provides some recommendations to get that started.
•Recommendation: Initiate a study to determine the advisability of
establishing a surcharge-funded Minnesota Broadband Fund
•Recommendation: Work toward expansion of the definition of the
Federal Universal Service Fund to include broadband
•Recommendation: Publicize successful security, vulnerability and
redundancy initiatives in the state
•Recommendation: Identify other non-monetary incentives to
undertake the actions needed to achieve these goals.
Stimulate
StimulatOversee
Progress
Availability
Penetration
Technology,
architecture
Connectivity
Capacity
Performance
Affordability
Behaviors
Impact
Cost
Benefits
Oversee
"The committee is troubled by the lack of situational awareness about the opportunities,
activities and identities of cyber thieves or potential attackers on U.S. information
networks. This is a serious weakness and a source of frustration for those responsible for
oversight and strategic decision-making. Unfortunately, it will not be easy to remedy this,
as incentives to report cyber intrusions and vulnerabilities are generally negative in the
U.S. government and private sector. The committee believes this must change so that
cybersecurity leaders can make well-informed decisions and respond to problems quickly."
US Senate Select Committee on Intelligence, July 24, 2009
The adage "that which gets measured gets done" most certainly applies to meeting
our security, vulnerability and redundancy goals. Thus oversight is required so that 
the state can determine where it stands, determine whether it is on course, 
recognize and reward successes and suggest changes when they are needed. 
The challenge in this area is found in the competing needs for better information and
measurement versus the equally compelling need to protect that information from
people and organizations wishing to do harm. The Task Force hopes that the leaders
of these initiatives can strike a balance between these competing needs, while
recognizing that today the tendency by almost every stakeholder leans too far toward
keeping information closely held.
Oversee
OverseeOversee: Track
Tracking resources (organizational, technology, human) and capability;
It is clear that better information is required in order to guide policy and action if the state is to achieve its broadband
goals. The Task Force was hampered by the lack of reliable information during many of its policy discussions and
wants to ensure that subsequent leaders will not face similar hurdles.
The following recommendations describe the information that is needed in order to understand the current situation
and areas of need with regard to security, vulnerability and redundancy.
•Recommendation: Develop and implement a mechanism to maintain the confidentiality of sensitive or proprietary
information gathered to advance the security, reliability and redundancy of broadband in the state. The Task Force
wants to acknowledge that much of the information described below would be detrimental if it were to find its way
into public view. At the same time, not collecting and sharing this information between responsible stakeholders is
detrimental to achieving our goals.
•Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to track broadband
availability – with an eye toward redundancy.
•Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to maintain an up
to date inventory of those locations that have only one physical or logical path to the Internet.
•Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to maintain an up
to date inventory of those locations that connected to the Internet backbone through a single point of failure.
•Recommendation: Provide methods and templates to allow local communities and regions to track organizational,
technology and individual-expert cybersecurity resources and needs
•Recommendation: Provide as much of the data as possible in a public dataset (in addition to maps) that others can
use in conjunction with their own data -- while at the same time preserving the privacy of the data that must remain
confidential.
•Recommendation: Provide the ability to independently verify the information that is gathered
•Recommendation: Generate a semi-annual status assessment of security, vulnerability and redundancy
•Recommendation: Provide updates to collected data (and maps) every six months.
Oversee: Evaluate
Evaluating progress, performance, benefits, technology and cost
It is not enough to simply measure activity. It is equally important to
evaluate what the measures are saying and make suggestions as to what
changes are required in order to maintain forward momentum.
•Recommendation: The MBAC should identify expert staff resources that
can be relied upon to assist them with their work as needed. These experts
could sometimes be under non-disclosure agreements, when they are
required to maintain confidentiality.
•Recommendation: Establish a "working group" process can allow formation
of multi-stakeholder groups to assist the MBAC as needed. Some of these
working groups could be managed with very stringent information-disclosure
restrictions, which could be helpful given the sensitive nature of some of the
information required to address security and redundancy goals
•Recommendation: Establish a public-facing informational tool whereby
business and residential consumers can interact on an informational basis
with the MBAC
Oversee
Oversee: Reward
Rewarding positive action
The Task Force feels that the most desirable course is to focus on
rewarding success, especially at this early stage in the process of
moving the state towards secure, reliable, redundant broadband.
However, the Task Force recognizes that circumstances may arise in
the future that might best be addressed with rule-making, standards-
setting or regulation.
•Recommendation: Maintain up to date public-facing information
"dashboard" describing progress towards reaching the state's security,
reliability and redundancy goals. Base the dashboard on the final goals
and objectives arrived at by the Task Force.
•Recommendation: Maintain and promote an up to date list of
cybersecurity and broadband-reliability organizations and
conferences.
•Recommendation: Recognize and promote successful efforts
Oversee
Lead
StimulateOversee
Resources:
•Organizational
•Technology
•Human
Vision
Strategy
Progress
Availability
Penetration
Goals
Actions
Technology,
architecture
Funding
Infrastructure
Connectivity
Capacity
Performance
Affordability
Behaviors
Capabilities
Facilities
Impact
Communities
Cost
People Businesses
Demand
Benefits
Content
Information
mike@haven2.com

Mais conteúdo relacionado

Mais procurados

CFMC NWLC 20100902
CFMC NWLC 20100902CFMC NWLC 20100902
CFMC NWLC 20100902Janet Shing
 
Community based broadband report by Executive Office of the President
Community based broadband report by Executive Office of the PresidentCommunity based broadband report by Executive Office of the President
Community based broadband report by Executive Office of the PresidentEd Dodds
 
Intro Networks Webinar With Reggie Smith April 2009
Intro Networks Webinar With Reggie Smith   April 2009Intro Networks Webinar With Reggie Smith   April 2009
Intro Networks Webinar With Reggie Smith April 2009introNetworks.com
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009pinardclark
 
Broadband Best Practices In Rural Mn 102009
Broadband Best Practices In Rural Mn 102009Broadband Best Practices In Rural Mn 102009
Broadband Best Practices In Rural Mn 102009Becky LaPlant
 
Communicating to Achieve Your Community Broadband Vision
Communicating to Achieve Your Community Broadband VisionCommunicating to Achieve Your Community Broadband Vision
Communicating to Achieve Your Community Broadband VisionAnn Treacy
 
Tools for Broadband Investment 4.24.14
Tools for Broadband Investment 4.24.14Tools for Broadband Investment 4.24.14
Tools for Broadband Investment 4.24.14Utah Broadband Project
 
Digital equity and democracy the role of internet access and use in building ...
Digital equity and democracy the role of internet access and use in building ...Digital equity and democracy the role of internet access and use in building ...
Digital equity and democracy the role of internet access and use in building ...Ann Treacy
 
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16KC Digital Drive
 
Cool Things Rural Communities are doing with Broadband
Cool Things Rural Communities are doing with BroadbandCool Things Rural Communities are doing with Broadband
Cool Things Rural Communities are doing with BroadbandAnn Treacy
 
Designing innovative X appropriate technologies and methods to foster youth i...
Designing innovative X appropriate technologies and methods to foster youth i...Designing innovative X appropriate technologies and methods to foster youth i...
Designing innovative X appropriate technologies and methods to foster youth i...Leo Burd
 
"Remotely connected, remotely creative" Isea2011 by Tracey Benson
"Remotely connected, remotely creative" Isea2011 by Tracey Benson"Remotely connected, remotely creative" Isea2011 by Tracey Benson
"Remotely connected, remotely creative" Isea2011 by Tracey BensonTracey M Benson
 
Breakout 2 assisted digital services - anne faulkner
Breakout 2   assisted digital services - anne faulknerBreakout 2   assisted digital services - anne faulkner
Breakout 2 assisted digital services - anne faulknerDigital Leaders
 
Parallel session: campus networking
Parallel session: campus networkingParallel session: campus networking
Parallel session: campus networkingJisc
 
Virtual conferences -a Personal History
Virtual conferences  -a Personal HistoryVirtual conferences  -a Personal History
Virtual conferences -a Personal HistoryTerry Anderson
 

Mais procurados (17)

CFMC NWLC 20100902
CFMC NWLC 20100902CFMC NWLC 20100902
CFMC NWLC 20100902
 
Community based broadband report by Executive Office of the President
Community based broadband report by Executive Office of the PresidentCommunity based broadband report by Executive Office of the President
Community based broadband report by Executive Office of the President
 
Intro Networks Webinar With Reggie Smith April 2009
Intro Networks Webinar With Reggie Smith   April 2009Intro Networks Webinar With Reggie Smith   April 2009
Intro Networks Webinar With Reggie Smith April 2009
 
Itu D Presentation Jan2009
Itu D Presentation Jan2009Itu D Presentation Jan2009
Itu D Presentation Jan2009
 
Broadband Best Practices In Rural Mn 102009
Broadband Best Practices In Rural Mn 102009Broadband Best Practices In Rural Mn 102009
Broadband Best Practices In Rural Mn 102009
 
Communicating to Achieve Your Community Broadband Vision
Communicating to Achieve Your Community Broadband VisionCommunicating to Achieve Your Community Broadband Vision
Communicating to Achieve Your Community Broadband Vision
 
Tools for Broadband Investment 4.24.14
Tools for Broadband Investment 4.24.14Tools for Broadband Investment 4.24.14
Tools for Broadband Investment 4.24.14
 
Innovations in Technology-Enabled Pro Bono webinar
Innovations in Technology-Enabled Pro Bono webinarInnovations in Technology-Enabled Pro Bono webinar
Innovations in Technology-Enabled Pro Bono webinar
 
Digital equity and democracy the role of internet access and use in building ...
Digital equity and democracy the role of internet access and use in building ...Digital equity and democracy the role of internet access and use in building ...
Digital equity and democracy the role of internet access and use in building ...
 
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16
Eric Freedman - City Case Study: Digital Media Literacy & Inclusion - GCS16
 
Cool Things Rural Communities are doing with Broadband
Cool Things Rural Communities are doing with BroadbandCool Things Rural Communities are doing with Broadband
Cool Things Rural Communities are doing with Broadband
 
Designing innovative X appropriate technologies and methods to foster youth i...
Designing innovative X appropriate technologies and methods to foster youth i...Designing innovative X appropriate technologies and methods to foster youth i...
Designing innovative X appropriate technologies and methods to foster youth i...
 
"Remotely connected, remotely creative" Isea2011 by Tracey Benson
"Remotely connected, remotely creative" Isea2011 by Tracey Benson"Remotely connected, remotely creative" Isea2011 by Tracey Benson
"Remotely connected, remotely creative" Isea2011 by Tracey Benson
 
Breakout 2 assisted digital services - anne faulkner
Breakout 2   assisted digital services - anne faulknerBreakout 2   assisted digital services - anne faulkner
Breakout 2 assisted digital services - anne faulkner
 
one more tool
one more toolone more tool
one more tool
 
Parallel session: campus networking
Parallel session: campus networkingParallel session: campus networking
Parallel session: campus networking
 
Virtual conferences -a Personal History
Virtual conferences  -a Personal HistoryVirtual conferences  -a Personal History
Virtual conferences -a Personal History
 

Semelhante a Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture

Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryDavid Sweigert
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxchristiandean12115
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISODavid Sweigert
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharingRoy Ramkrishna
 
Ann and Mike Talk Broadband
Ann and Mike Talk BroadbandAnn and Mike Talk Broadband
Ann and Mike Talk BroadbandAnn Treacy
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxmattjtoni51554
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelJulie Evans
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheetbueno buono good
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionGisli Olafsson
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Michigan Cyber TTX response planning ESF 18
Michigan Cyber TTX response planning   ESF 18 Michigan Cyber TTX response planning   ESF 18
Michigan Cyber TTX response planning ESF 18 David Sweigert
 

Semelhante a Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture (20)

Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and Recovery
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
 
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Cybersecurity Risk  -- Redefing real risk measurement for the CISOCybersecurity Risk  -- Redefing real risk measurement for the CISO
Cybersecurity Risk -- Redefing real risk measurement for the CISO
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharing
 
Ann and Mike Talk Broadband
Ann and Mike Talk BroadbandAnn and Mike Talk Broadband
Ann and Mike Talk Broadband
 
Please don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docxPlease don’t give me a two to three sentence replies. It has to lo.docx
Please don’t give me a two to three sentence replies. It has to lo.docx
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
International strategy cyberspace_factsheet
International strategy cyberspace_factsheetInternational strategy cyberspace_factsheet
International strategy cyberspace_factsheet
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk Reduction
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
Michigan Cyber TTX response planning ESF 18
Michigan Cyber TTX response planning   ESF 18 Michigan Cyber TTX response planning   ESF 18
Michigan Cyber TTX response planning ESF 18
 

Mais de Ann Treacy

Adoption challenges in rural minnesota, BBTF March 2022.pptx
Adoption challenges in rural minnesota, BBTF March 2022.pptxAdoption challenges in rural minnesota, BBTF March 2022.pptx
Adoption challenges in rural minnesota, BBTF March 2022.pptxAnn Treacy
 
Office of Broadband Development Overview and Broadband Funding Streams
Office of Broadband Development Overview and Broadband Funding StreamsOffice of Broadband Development Overview and Broadband Funding Streams
Office of Broadband Development Overview and Broadband Funding StreamsAnn Treacy
 
Broadband Presentation for MN PUC
Broadband Presentation for MN PUCBroadband Presentation for MN PUC
Broadband Presentation for MN PUCAnn Treacy
 
Digital Solutions with RW healh
Digital Solutions with RW healhDigital Solutions with RW healh
Digital Solutions with RW healhAnn Treacy
 
Farm Fresh Broadband
Farm Fresh BroadbandFarm Fresh Broadband
Farm Fresh BroadbandAnn Treacy
 
Rural Newcomer Telecommuters
Rural Newcomer TelecommutersRural Newcomer Telecommuters
Rural Newcomer TelecommutersAnn Treacy
 
Connected mn mn blandin broadband conference 10-13-21
Connected mn mn blandin broadband conference   10-13-21Connected mn mn blandin broadband conference   10-13-21
Connected mn mn blandin broadband conference 10-13-21Ann Treacy
 
Surveys, Data and Stories to Inform Policy and Investment
Surveys, Data and Stories to Inform Policy and InvestmentSurveys, Data and Stories to Inform Policy and Investment
Surveys, Data and Stories to Inform Policy and InvestmentAnn Treacy
 
Community approaches to broadband in Minnesota
Community approaches to broadband in MinnesotaCommunity approaches to broadband in Minnesota
Community approaches to broadband in MinnesotaAnn Treacy
 
Obd update on federal broabdand funding
Obd update on federal broabdand fundingObd update on federal broabdand funding
Obd update on federal broabdand fundingAnn Treacy
 
Broadband in se mn 2021 survey
Broadband in se mn 2021 surveyBroadband in se mn 2021 survey
Broadband in se mn 2021 surveyAnn Treacy
 
Broadband 101 mn bb conf 2021
Broadband 101 mn bb conf 2021Broadband 101 mn bb conf 2021
Broadband 101 mn bb conf 2021Ann Treacy
 
Region 5 mn broadband event
Region 5 mn broadband eventRegion 5 mn broadband event
Region 5 mn broadband eventAnn Treacy
 
Regional Broadband meeting in NW MN from Office of Broadband Development
Regional Broadband meeting in NW MN from Office of Broadband DevelopmentRegional Broadband meeting in NW MN from Office of Broadband Development
Regional Broadband meeting in NW MN from Office of Broadband DevelopmentAnn Treacy
 
MN Broadband regional meeting in west central
MN Broadband regional meeting in  west centralMN Broadband regional meeting in  west central
MN Broadband regional meeting in west centralAnn Treacy
 
SMIF Regional Broadband Forum: Le Sueur Count Broadband Initative
SMIF Regional Broadband Forum: Le Sueur Count Broadband InitativeSMIF Regional Broadband Forum: Le Sueur Count Broadband Initative
SMIF Regional Broadband Forum: Le Sueur Count Broadband InitativeAnn Treacy
 
Broadband Stories that Inspire in MN
Broadband Stories that Inspire in MNBroadband Stories that Inspire in MN
Broadband Stories that Inspire in MNAnn Treacy
 
Broadband in Southeast MN 2021 survey
Broadband in Southeast MN 2021 surveyBroadband in Southeast MN 2021 survey
Broadband in Southeast MN 2021 surveyAnn Treacy
 
Regional Broadband MN - presentation from Office of Broadband Development
Regional Broadband MN - presentation from Office of Broadband DevelopmentRegional Broadband MN - presentation from Office of Broadband Development
Regional Broadband MN - presentation from Office of Broadband DevelopmentAnn Treacy
 
Chisago Lakes Community Broadband Survey
Chisago Lakes Community Broadband SurveyChisago Lakes Community Broadband Survey
Chisago Lakes Community Broadband SurveyAnn Treacy
 

Mais de Ann Treacy (20)

Adoption challenges in rural minnesota, BBTF March 2022.pptx
Adoption challenges in rural minnesota, BBTF March 2022.pptxAdoption challenges in rural minnesota, BBTF March 2022.pptx
Adoption challenges in rural minnesota, BBTF March 2022.pptx
 
Office of Broadband Development Overview and Broadband Funding Streams
Office of Broadband Development Overview and Broadband Funding StreamsOffice of Broadband Development Overview and Broadband Funding Streams
Office of Broadband Development Overview and Broadband Funding Streams
 
Broadband Presentation for MN PUC
Broadband Presentation for MN PUCBroadband Presentation for MN PUC
Broadband Presentation for MN PUC
 
Digital Solutions with RW healh
Digital Solutions with RW healhDigital Solutions with RW healh
Digital Solutions with RW healh
 
Farm Fresh Broadband
Farm Fresh BroadbandFarm Fresh Broadband
Farm Fresh Broadband
 
Rural Newcomer Telecommuters
Rural Newcomer TelecommutersRural Newcomer Telecommuters
Rural Newcomer Telecommuters
 
Connected mn mn blandin broadband conference 10-13-21
Connected mn mn blandin broadband conference   10-13-21Connected mn mn blandin broadband conference   10-13-21
Connected mn mn blandin broadband conference 10-13-21
 
Surveys, Data and Stories to Inform Policy and Investment
Surveys, Data and Stories to Inform Policy and InvestmentSurveys, Data and Stories to Inform Policy and Investment
Surveys, Data and Stories to Inform Policy and Investment
 
Community approaches to broadband in Minnesota
Community approaches to broadband in MinnesotaCommunity approaches to broadband in Minnesota
Community approaches to broadband in Minnesota
 
Obd update on federal broabdand funding
Obd update on federal broabdand fundingObd update on federal broabdand funding
Obd update on federal broabdand funding
 
Broadband in se mn 2021 survey
Broadband in se mn 2021 surveyBroadband in se mn 2021 survey
Broadband in se mn 2021 survey
 
Broadband 101 mn bb conf 2021
Broadband 101 mn bb conf 2021Broadband 101 mn bb conf 2021
Broadband 101 mn bb conf 2021
 
Region 5 mn broadband event
Region 5 mn broadband eventRegion 5 mn broadband event
Region 5 mn broadband event
 
Regional Broadband meeting in NW MN from Office of Broadband Development
Regional Broadband meeting in NW MN from Office of Broadband DevelopmentRegional Broadband meeting in NW MN from Office of Broadband Development
Regional Broadband meeting in NW MN from Office of Broadband Development
 
MN Broadband regional meeting in west central
MN Broadband regional meeting in  west centralMN Broadband regional meeting in  west central
MN Broadband regional meeting in west central
 
SMIF Regional Broadband Forum: Le Sueur Count Broadband Initative
SMIF Regional Broadband Forum: Le Sueur Count Broadband InitativeSMIF Regional Broadband Forum: Le Sueur Count Broadband Initative
SMIF Regional Broadband Forum: Le Sueur Count Broadband Initative
 
Broadband Stories that Inspire in MN
Broadband Stories that Inspire in MNBroadband Stories that Inspire in MN
Broadband Stories that Inspire in MN
 
Broadband in Southeast MN 2021 survey
Broadband in Southeast MN 2021 surveyBroadband in Southeast MN 2021 survey
Broadband in Southeast MN 2021 survey
 
Regional Broadband MN - presentation from Office of Broadband Development
Regional Broadband MN - presentation from Office of Broadband DevelopmentRegional Broadband MN - presentation from Office of Broadband Development
Regional Broadband MN - presentation from Office of Broadband Development
 
Chisago Lakes Community Broadband Survey
Chisago Lakes Community Broadband SurveyChisago Lakes Community Broadband Survey
Chisago Lakes Community Broadband Survey
 

Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture

  • 1. Security, Vulnerability & Redundancy Summary of 2009 Taskforce findings Mike O’Connor mike@haven2.com
  • 3. Goals Distinguish Minnesota as a secure and reliable place to work, play and innovate on the Internet. Positioning Minnesota in this way will • Provide a competitive advantage for the state • Strengthen businesses • Protect consumers and citizens • Promote the development and early adoption of advanced applications
  • 4. Objectives • Ensure that the middle-mile broadband infrastructure in the state has no “single points of failure” in the event of a disaster or attack. • Ensure that there are multiple diverse high-capacity routes for “commodity” Internet traffic entering and leaving the state. • Ensure redundancy for public safety. As high speed broadband becomes the medium for the communication and delivery of vital functions such as police, dispatch and ambulance services, phone service, telemedicine services etc. backup systems need to be available in the event of the failure of the primary broadband link. For example, in rural Minnesota the failure of the only fiber carrying these vital services to the remote and sparsely populated areas of the state, without a back-up option, could result in major public safety concerns.
  • 5. Objectives • Explore peering strategies and the degree to which they can contribute to our security, vulnerability and redundancy goals. All Internet providers should consider exchanging intra-state Internet traffic within the state. This is an inexpensive, robust way to increase performance and reduce vulnerability by allowing the state to remain a fully functioning “island” in the event of attacks and disasters that happen elsewhere. • Ensure that there are mechanisms to protect the confidentiality of sensitive information while still making it available to practitioners and policy-makers. • Ensure that there is a robust ongoing multi- stakeholder collaboration in regard to security, vulnerability and redundancy activities statewide.
  • 8. Lead Lead   “We cannot afford to discover successful cyber intrusions after-the-fact, accept disastrous losses, and then seek merely to contain them. It requires a broad alliance of departments, agencies, and industry leaders to focus on countering the threat, mitigating vulnerabilities, and enhancing resiliency in order to preserve our national security, national economy, and public welfare.” Dennis Blair, Director of National Intelligence Hearing on “Annual Threat Assessment of the Intelligence Community” for the Senate Select Committee on Intelligence, February 12, 2009 Just as with achieving our other broadband goals, “steady leadership wins the race.” Ensuring that the state has secure reliable redundant broadband infrastructure is not a one-time project but rather a long-term commitment of leadership talent to an ongoing program of vigilance and collaborative problem solving. As with achieving our other goals, the Task Force recommends that this leadership net be thrown as widely as possible. While the State must continue to play an active convening and enabling role, there is a need to continuously to draw in leadership  capability from across all stakeholders.  Lead
  • 9. Lead: Mobilize Mobilizing communities and their human, technology and organizational resources While ensuring secure redundant broadband is a statewide goal, it's a problem that will ultimately have to be addressed locally. Thus an important part of success hinges on security- aware consumers and organizations that understand what resources they have at hand, the  resources they need, and develop good strategies to make the most of these. •Recommendation: Collect best-practice methodologies and tools, and make them available to consumers and organizations that are undertaking security and redundancy efforts. •Recommendation: Identify current and planned security and redundancy efforts across the state (such as the Chief Security Officer forum, InfraGuard and the Center for Strategic Information Systems and Security) and make them aware of each other. Strongly encourage collaboration. •Recommendation: Identify and endorse an organization (or collaborative) that can provide an ongoing focal point and funding for these tools and activities. •Recommendation: Identify technical and professional experts with expertise in this area and share that list with people and organizations in need of assistance. •Recommendation: Develop “what’s in it for me?” materials to assist in recruiting and retaining public and private-sector participants. Lead
  • 10. Lead: Empower Empowering people and organizations Much of the work of securing the Internet depends on informed and educated consumers. At the same time, there is an opportunity to increase the value of Minnesota's workforce by improving Internet security skills, skills that are becoming ever more important as we defend  our citizens, businesses and online assets from ever increasing attacks. Indeed a recently released report from the Partnership for Public Service and Booz, Allen Hamilton says, “our federal government will be unable to combat these threats without a more coordinated, sustained effort to increase cybersecurity expertise in the federal workforce.” The same can be said for private and public-sector organizations here in Minnesota. •Recommendation: Support efforts to build cybersecurity awareness and skills by coordinating existing efforts (e.g. library programs) and leveraging existing capabilities (e.g. community education, community and technical colleges and Minnesota’s university systems). •Recommendation: Provide tax incentives for individuals and organizations that undertake to increase their security skills, assist with helping to reduce the vulnerability of our Internet infrastructure or build out facilities that increase redundancy. •Recommendation: Coordinate with jobs programs and encourage the addition of cybersecurity components to each. Lead
  • 11. Lead: Manage Managing vision, goals, strategy and actions  Bringing secure redundant reliable broadband to everybody in the state is a large undertaking and it will happen much more quickly if the many efforts are well  guided and coordinated. In addition, it's very important that all stakeholders have a clear understanding of who is accountable for making this happen. •Recommendation: Include cybersecurity, vulnerability and redundancy in the remit of the proposed permanent multi-stakeholder Minnesota Broadband Advisory Council (MBAC) housed in the Department of Commerce to guide the leadership, stimulus and oversight functions outlined in this report. •Recommendation: The enabling legislation that forms the Council must establish clear expectations for meeting our security, vulnerability and redundancy goals •Recommendation: Provide a small ongoing staff to provide continuity the MBAC. •Recommendation:  Generate an annual report (perhaps building on this report) that describes the current status ("where we are now"), long and short range goals ("where we are going"), and action-plans ("how we will get there") with regard to meeting our cybersecurity and redundancy goals. Lead
  • 13. Stimulate Stimulate “It’s now clear that this cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country.” President Barack Obama, May 29, 2009   Achieving secure, reliable broadband will require heavy lifting by many people and organizations and, as with its other recommendations, the Task Force wants to recommend ways to stimulate this activity. Security, vulnerability and redundancy  are, at their core, issues of “readiness.” Like all readiness issues, the focus needs to be on the things that need to happen in order to get ready. Collectively the state needs to make sure those ongoing, ever more refined, preparations are happening quickly and effectively. As with the other recommendations, this has to be a multi-stakeholder effort in order to be successful and the Task Force looks to the proposed Minnesota Broadband Advisory Council to make sure that these collaborations happen, and happen in a timely manner.
  • 14. Stimulate: Coordinate Coordinating public and private activities that move the state toward more secure, redundant  broadband Much of the work of achieving the state’s broadband security and redundancy goals will be easier if it is coordinated. Providers and their large customers need to leverage opportunities created by each other's projects. Businesses large and small will benefit from knowing where and when secure, redundant facilities will be added or will become available. Smooth coordination is crucial to  becoming more nimble in responding to cyber threats and disasters as well as deploying  preventative capabilities.   Coordination should not be limited to within the State. Indeed, the Task force wishes to avoid the "not invented here" trap and coordinate Minnesota's efforts security, vulnerability and redundancy efforts with those in neighboring states, across the country and worldwide. •Recommendation: Identify and support new and existing consortia and partnerships needed to advance these security, vulnerability and redundancy goals (note; the Public Private Partnership sub- group may have some specific ideas here). •Recommendation: Plan once; develop coordinated broadband, electric grid, and energy reliability/redundancy projects •Recommendation: Dig once; coordinate infrastructure construction projects, such as roads and electrical grid improvements with broadband projects aimed at increasing redundancy and reducing vulnerability. •Recommendation: Include this coordination role in the charter of the proposed Minnesota Broadband Advisory Council, but set the expectation that the Council aggressively enlist the ongoing aid of public and private partners (both individuals and organizations) in doing this work. •Recommendation: Ensure that the MBAC members are aware of and encouraged to attend conferences with similar statewide broadband security councils. Stimulate
  • 15. Stimulate: Build Building facilities, infrastructure and content Ultimately achieving secure, less-vulnerable, redundant broadband is about building things -- facilities, infrastructure, systems, and response-teams to name a few. The days have passed where the Internet was a discretionary product offered by purely market-driven communications providers. Today the Internet is an economic and social necessity that is rapidly becoming indispensable to Minnesotas citizens and organizations. While there are strong market forces driving providers towards some of the goals we describe, there is a need to stimulate collaboration, shared infrastructure and services that no single  provider could justify or undertake on their own. Minnesota needs to stimulate actions that will fill those gaps in a way that also provides for future improvement as security, vulnerability and redundancy needs inevitably increase while maintaining the state as a welcoming place for innovative providers to do business. There is also the need to build education and training capabilities if goals are to be met because, as many know, awareness drives demand and demand drives deployment. Thus this section of the report also includes several content-building recommendations. •Recommendation: Initiate a study to develop a wide-ranging collaborative funding strategy to support the recommendations of this report •Recommendation: Support the formation of procurement collaborations by government, educational institutions and businesses to stimulate deployment of advanced last-mile and middle-mile infrastructure •Recommendation: Promote service-provider collaboration to deliver on the redundancy and reliability goals. •Recommendation: Encourage municipalities and regions interested in building broadband networks to participate in incentive programs where their projects could reduce vulnerability and increase redundancy. Stimulate
  • 16. Stimulate: Incent Incenting  -- funding, demand and capabilities Some actions needed to accomplish security, vulnerability and  redundancy goals will require incentives.  In some cases these incentives will have to be monetary, but this section also raises the possibility of non-monetary incentives (e.g. promotion and recognition) and provides some recommendations to get that started. •Recommendation: Initiate a study to determine the advisability of establishing a surcharge-funded Minnesota Broadband Fund •Recommendation: Work toward expansion of the definition of the Federal Universal Service Fund to include broadband •Recommendation: Publicize successful security, vulnerability and redundancy initiatives in the state •Recommendation: Identify other non-monetary incentives to undertake the actions needed to achieve these goals. Stimulate
  • 18. Oversee "The committee is troubled by the lack of situational awareness about the opportunities, activities and identities of cyber thieves or potential attackers on U.S. information networks. This is a serious weakness and a source of frustration for those responsible for oversight and strategic decision-making. Unfortunately, it will not be easy to remedy this, as incentives to report cyber intrusions and vulnerabilities are generally negative in the U.S. government and private sector. The committee believes this must change so that cybersecurity leaders can make well-informed decisions and respond to problems quickly." US Senate Select Committee on Intelligence, July 24, 2009 The adage "that which gets measured gets done" most certainly applies to meeting our security, vulnerability and redundancy goals. Thus oversight is required so that  the state can determine where it stands, determine whether it is on course,  recognize and reward successes and suggest changes when they are needed.  The challenge in this area is found in the competing needs for better information and measurement versus the equally compelling need to protect that information from people and organizations wishing to do harm. The Task Force hopes that the leaders of these initiatives can strike a balance between these competing needs, while recognizing that today the tendency by almost every stakeholder leans too far toward keeping information closely held. Oversee
  • 19. OverseeOversee: Track Tracking resources (organizational, technology, human) and capability; It is clear that better information is required in order to guide policy and action if the state is to achieve its broadband goals. The Task Force was hampered by the lack of reliable information during many of its policy discussions and wants to ensure that subsequent leaders will not face similar hurdles. The following recommendations describe the information that is needed in order to understand the current situation and areas of need with regard to security, vulnerability and redundancy. •Recommendation: Develop and implement a mechanism to maintain the confidentiality of sensitive or proprietary information gathered to advance the security, reliability and redundancy of broadband in the state. The Task Force wants to acknowledge that much of the information described below would be detrimental if it were to find its way into public view. At the same time, not collecting and sharing this information between responsible stakeholders is detrimental to achieving our goals. •Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to track broadband availability – with an eye toward redundancy. •Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to maintain an up to date inventory of those locations that have only one physical or logical path to the Internet. •Recommendation: Working through the NTIA mapping project Steering Committee, identify ways to maintain an up to date inventory of those locations that connected to the Internet backbone through a single point of failure. •Recommendation: Provide methods and templates to allow local communities and regions to track organizational, technology and individual-expert cybersecurity resources and needs •Recommendation: Provide as much of the data as possible in a public dataset (in addition to maps) that others can use in conjunction with their own data -- while at the same time preserving the privacy of the data that must remain confidential. •Recommendation: Provide the ability to independently verify the information that is gathered •Recommendation: Generate a semi-annual status assessment of security, vulnerability and redundancy •Recommendation: Provide updates to collected data (and maps) every six months.
  • 20. Oversee: Evaluate Evaluating progress, performance, benefits, technology and cost It is not enough to simply measure activity. It is equally important to evaluate what the measures are saying and make suggestions as to what changes are required in order to maintain forward momentum. •Recommendation: The MBAC should identify expert staff resources that can be relied upon to assist them with their work as needed. These experts could sometimes be under non-disclosure agreements, when they are required to maintain confidentiality. •Recommendation: Establish a "working group" process can allow formation of multi-stakeholder groups to assist the MBAC as needed. Some of these working groups could be managed with very stringent information-disclosure restrictions, which could be helpful given the sensitive nature of some of the information required to address security and redundancy goals •Recommendation: Establish a public-facing informational tool whereby business and residential consumers can interact on an informational basis with the MBAC Oversee
  • 21. Oversee: Reward Rewarding positive action The Task Force feels that the most desirable course is to focus on rewarding success, especially at this early stage in the process of moving the state towards secure, reliable, redundant broadband. However, the Task Force recognizes that circumstances may arise in the future that might best be addressed with rule-making, standards- setting or regulation. •Recommendation: Maintain up to date public-facing information "dashboard" describing progress towards reaching the state's security, reliability and redundancy goals. Base the dashboard on the final goals and objectives arrived at by the Task Force. •Recommendation: Maintain and promote an up to date list of cybersecurity and broadband-reliability organizations and conferences. •Recommendation: Recognize and promote successful efforts Oversee