SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
1
Waiting for the cyber-hurricane safe harbor:
incident management standards adrift ?
Part five of a series
July 2013
Author: Dave Sweigert, M.Sci., CISSP, CISA, PMP
(non-attorney who is not providing legal advice)
ABSTRACT
Use of best practices for incident management may help in litigation mitigation.
Background
In March 2002 two Fayetteville, NY
firefighters, died when a floor collapsed
at a house fire. A widow filed suit
against the property owner, Onondaga
County, and the fire departments
involved for mismanaging the incident,
and allowing unsafe operations that
caused the death.
Pursuant to NY General Municipal Law
§ 205-a a court deemed there was a
failure to properly implement the tenants
of the National Incident Management
System (NIMS) and the Incident
Command System (ICS) resulting in a
costly settlement for the widow.
The case has reminded fire departments
across the nation that best practices,
and failure to follow them, can result in
painful outcomes.
***
The cybersecurity national floor
A Cybersecurity Framework (CSF) has
been proposed by the White House via
Executive Order 13636; which, amongst
other things, tasks the U.S. National
Institute on Standards and Technology
(NIST) to develop a consensus-driven
policy framework designed for voluntary
compliance by industry. The focus is to
help secure the Critical Infrastructure
and Key Resources (CI/KR) maintained
by private owner-operators and define
risk management metrics (an estimated
80% of CI/KR is operated by private
entities)1
.
Simultaneously with CSF development,
CI/KR industry thought leaders are
promoting a Cyber Safety Act;
legislation that would provide safe
harbors or other limitations on cyber-
security liability, contingent on
reasonable efforts to conform to best
practices.
1 National Infrastructure Protection Plan, Energy Sector,
U.S. Department of Homeland Security (2005)
2
CSF may ultimately become the
baseline to provide for these “best
practices”, or the “national floor" for
CI/KR cybersecurity2
incident immunity.
As the Integrated Task Force (ITF) for
Presidential Policy Directive 21 (PPD-
21) has opined regarding the proposed
Cyber Safety Act:
“..Liability would be capped at the
amount of cyber insurance acquired.
Additionally, this incentive would provide
marketing and insurance benefits to
corporations, improving the business
case for making cybersecurity
investments…3
”
These initiatives have been proposed to
create an incentive environment in the
hopes that CI/KR private operators can
be incentivized to implement voluntary
frameworks; like the EO 13636 CSF.
How much cybersecurity is enough?
For nearly fifty years the landmark legal
precedent in establishing technology
disaster liability has been United States
vs. Carroll Towing Company4
.
In the Carroll Towing incident a tug boat
towed a barge into a nasty storm at sea.
When the barge was lost at sea the
2
“,,,HIPAA's privacy and security rules establish a national
floor for confidentiality, covered entities have been left to
develop their own internal enforcement..”. AHIMA.
"Sanction Guidelines for Privacy and Security Violations."
Journal of AHIMA 82, no.10 (October 2011): 66-71
3
Integrated Task Force, Critical Infrastructure Security and
Resilience, U.S. Department of Homeland Security.
4
United States v Carroll Towing Co., 159 E2d 169, 173-74
(2d Cir. 1947).
private tug boat operator was sued.
Inquiries were made as to why the tug
boat was not equipped with new
weather radios (this was 1947). The
operator claimed that this new
technology was costly.
However, the presiding judge created an
algebraic equation to determine the
amount of money that should be
expended on technology safeguards to
mitigate loss and injury (known as the
Hand Rule). Restated:
“…if the probability be called P; the
injury, L; and the burden, B; liability
depends upon whether B is less than L
multiplied by P: i.e., whether B < PL…”
Meaning if estimated business injury is
$12 million, and there is a 10 percent
chance of such disaster, it may be
prudent to invest $1.2 million to mitigate
such an outcome.
During any post-incident legal analysis
and litigation the Hand Rule will most
certainly be applied by litigators to
measure the adequacy of an
organization’s pre-incident planning and
management of the incident.
Establish a national floor for incident
management
Meanwhile, private CI/KR operators
complain that cyber threats are over-
hyped in a threat-driven environment
and that millions have already been
invested in “check the box” mandatory
3
compliance standards (that usually
address static infrastructure). In
contrast, investing in dynamic incident
management capabilities may provide a
flexible tool to mitigate evolving disaster.
For instance, in July 2004, the 9/11
Commission formally endorsed National
Fire Protection Association (NFPA)
Standard 16005
for use in emergency
incident management and urged that
compliance with NFPA 1600 be taken
into account by the insurance and credit
rating industries in assessing a
company’s insurance rating and
creditworthiness. The 9/11 Commission
also suggested:
“..compliance with the standard should
define the standard of care owed by a
company to its employees and the
public for legal purposes….”6
Thus, there is a need for CI/KR private
operators to examine NFPA 1600
incident management principles in the
context of a Carroll Towing type of
investment (as opposed to static cyber
security appliances). Restated,
purchasing weather radios without the
necessary radio operator training to tune
the radio and locate the necessary
weather report.
Incident management (unlike static
controls) is a dynamic and evolving
response to the consequences of a
5
NFPA 1600®: Standard on Disaster-Emergency
Management and Business Continuity Programs, 2013
Edition
6
The 9/11 Commission Report 398 (2004).
severe incident. This includes man
made cyber incidents that have
downstream and cascading effects on
CI/KR. NFPA 1600 recognizes this and
incorporates the principles of the
National Incident Management System
(NIMS).
“The NIMS approach fosters
coordination and cooperation
(interoperability) between public and
private entities in a variety of domestic
incident management activities
regardless of cause, size, or
complexity…7
”
In sum, serious consideration should be
given by CSF planners to incorporate a
NFPA 1600 and/or NIMS response
capability in the EO 13636 CSF. This
would promote the holistic integration of
incident response and management with
the cyber security community.
***
About the author: Dave Sweigert is a
Certified Information Systems Security
Professional, Certified Information
Systems Auditor, Project Management
Professional and holds Master’s
degrees in Information Security and
Project Management. A graduate of the
National Fire Academy (NFA) Incident
Management Team (IMT) course, he is
a practitioner of NFPA1600/NIMS in his
role of assisting private organizations in
institutionalizing NFPA1600/NIMS into
their organizational severe incident
response plans and training.
7
NIMS, Dec. 2008, U..S. Department of Homeland
Security

Mais conteúdo relacionado

Mais de David Sweigert

Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184David Sweigert
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDavid Sweigert
 
Immunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationImmunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationDavid Sweigert
 
Protection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActProtection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActDavid Sweigert
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNIDavid Sweigert
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 

Mais de David Sweigert (20)

Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information Resources
 
Immunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationImmunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat Information
 
Protection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActProtection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing Act
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNI
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Incident managment use of disaster mitigation in the critical infrastructure domain

  • 1. 1 Waiting for the cyber-hurricane safe harbor: incident management standards adrift ? Part five of a series July 2013 Author: Dave Sweigert, M.Sci., CISSP, CISA, PMP (non-attorney who is not providing legal advice) ABSTRACT Use of best practices for incident management may help in litigation mitigation. Background In March 2002 two Fayetteville, NY firefighters, died when a floor collapsed at a house fire. A widow filed suit against the property owner, Onondaga County, and the fire departments involved for mismanaging the incident, and allowing unsafe operations that caused the death. Pursuant to NY General Municipal Law § 205-a a court deemed there was a failure to properly implement the tenants of the National Incident Management System (NIMS) and the Incident Command System (ICS) resulting in a costly settlement for the widow. The case has reminded fire departments across the nation that best practices, and failure to follow them, can result in painful outcomes. *** The cybersecurity national floor A Cybersecurity Framework (CSF) has been proposed by the White House via Executive Order 13636; which, amongst other things, tasks the U.S. National Institute on Standards and Technology (NIST) to develop a consensus-driven policy framework designed for voluntary compliance by industry. The focus is to help secure the Critical Infrastructure and Key Resources (CI/KR) maintained by private owner-operators and define risk management metrics (an estimated 80% of CI/KR is operated by private entities)1 . Simultaneously with CSF development, CI/KR industry thought leaders are promoting a Cyber Safety Act; legislation that would provide safe harbors or other limitations on cyber- security liability, contingent on reasonable efforts to conform to best practices. 1 National Infrastructure Protection Plan, Energy Sector, U.S. Department of Homeland Security (2005)
  • 2. 2 CSF may ultimately become the baseline to provide for these “best practices”, or the “national floor" for CI/KR cybersecurity2 incident immunity. As the Integrated Task Force (ITF) for Presidential Policy Directive 21 (PPD- 21) has opined regarding the proposed Cyber Safety Act: “..Liability would be capped at the amount of cyber insurance acquired. Additionally, this incentive would provide marketing and insurance benefits to corporations, improving the business case for making cybersecurity investments…3 ” These initiatives have been proposed to create an incentive environment in the hopes that CI/KR private operators can be incentivized to implement voluntary frameworks; like the EO 13636 CSF. How much cybersecurity is enough? For nearly fifty years the landmark legal precedent in establishing technology disaster liability has been United States vs. Carroll Towing Company4 . In the Carroll Towing incident a tug boat towed a barge into a nasty storm at sea. When the barge was lost at sea the 2 “,,,HIPAA's privacy and security rules establish a national floor for confidentiality, covered entities have been left to develop their own internal enforcement..”. AHIMA. "Sanction Guidelines for Privacy and Security Violations." Journal of AHIMA 82, no.10 (October 2011): 66-71 3 Integrated Task Force, Critical Infrastructure Security and Resilience, U.S. Department of Homeland Security. 4 United States v Carroll Towing Co., 159 E2d 169, 173-74 (2d Cir. 1947). private tug boat operator was sued. Inquiries were made as to why the tug boat was not equipped with new weather radios (this was 1947). The operator claimed that this new technology was costly. However, the presiding judge created an algebraic equation to determine the amount of money that should be expended on technology safeguards to mitigate loss and injury (known as the Hand Rule). Restated: “…if the probability be called P; the injury, L; and the burden, B; liability depends upon whether B is less than L multiplied by P: i.e., whether B < PL…” Meaning if estimated business injury is $12 million, and there is a 10 percent chance of such disaster, it may be prudent to invest $1.2 million to mitigate such an outcome. During any post-incident legal analysis and litigation the Hand Rule will most certainly be applied by litigators to measure the adequacy of an organization’s pre-incident planning and management of the incident. Establish a national floor for incident management Meanwhile, private CI/KR operators complain that cyber threats are over- hyped in a threat-driven environment and that millions have already been invested in “check the box” mandatory
  • 3. 3 compliance standards (that usually address static infrastructure). In contrast, investing in dynamic incident management capabilities may provide a flexible tool to mitigate evolving disaster. For instance, in July 2004, the 9/11 Commission formally endorsed National Fire Protection Association (NFPA) Standard 16005 for use in emergency incident management and urged that compliance with NFPA 1600 be taken into account by the insurance and credit rating industries in assessing a company’s insurance rating and creditworthiness. The 9/11 Commission also suggested: “..compliance with the standard should define the standard of care owed by a company to its employees and the public for legal purposes….”6 Thus, there is a need for CI/KR private operators to examine NFPA 1600 incident management principles in the context of a Carroll Towing type of investment (as opposed to static cyber security appliances). Restated, purchasing weather radios without the necessary radio operator training to tune the radio and locate the necessary weather report. Incident management (unlike static controls) is a dynamic and evolving response to the consequences of a 5 NFPA 1600®: Standard on Disaster-Emergency Management and Business Continuity Programs, 2013 Edition 6 The 9/11 Commission Report 398 (2004). severe incident. This includes man made cyber incidents that have downstream and cascading effects on CI/KR. NFPA 1600 recognizes this and incorporates the principles of the National Incident Management System (NIMS). “The NIMS approach fosters coordination and cooperation (interoperability) between public and private entities in a variety of domestic incident management activities regardless of cause, size, or complexity…7 ” In sum, serious consideration should be given by CSF planners to incorporate a NFPA 1600 and/or NIMS response capability in the EO 13636 CSF. This would promote the holistic integration of incident response and management with the cyber security community. *** About the author: Dave Sweigert is a Certified Information Systems Security Professional, Certified Information Systems Auditor, Project Management Professional and holds Master’s degrees in Information Security and Project Management. A graduate of the National Fire Academy (NFA) Incident Management Team (IMT) course, he is a practitioner of NFPA1600/NIMS in his role of assisting private organizations in institutionalizing NFPA1600/NIMS into their organizational severe incident response plans and training. 7 NIMS, Dec. 2008, U..S. Department of Homeland Security