10 research outputs found

    Public health preparedness and response national snapshot 2017

    Get PDF
    An emergency can happen at any moment, and the U.S. must be ready to respond to pandemics, natural disasters, and other public health threats. Our action \ue2\u20ac\u201c or inaction\ue2\u20ac\u201c in this area directly affects the health of the American people and is a matter of national security.CS272950B2017_PublicHealthPreparednessSnapshot_508.pdfWelcome -- Background -- PREPARE: Every Response is Local: Connecting with States; Health Security: How is the U.S. Doing?; Right Resources, Right Place, Right Time; Keeping Lifesaving Research Safe and Secure -- RESPOND: Four Responses at Once: An Unprecedented Challenge; Special Section: 2016 Zika Response ; Laboratories: On the Front Lines of America\ue2\u20ac\u2122s Health; Emergency Leaders: The Future of Incident Response -- CONNECT: Global Training to Protect Us All; Protecting Our Most Vulnerable; The Power of Preparedness: National Preparedness Month; Communicating in Emergencies -- LOOKING FORWARD: Readiness to Respond; Delivering Results through Partnership; A World of Protection

    Preparing for GDPR:helping EU SMEs to manage data breaches

    Get PDF
    Over the last decade, the number of small and medium (SME) businesses suffering data breaches has risen at an alarming rate. Knowing how to respond to inevitable data breaches is critically important. A number of guidelines exist to advise organisations on the steps necessary to ensure an effective incident response. These guidelines tend to be unsuitable for SMEs, who generally have limited resources to expend on security and incident responses. Qualitative interviews were conducted with SMEs to probe current data breach response practice and to gather best-practice advice from SMEs themselves. The interviews revealed no widespread de facto approach, with a variety of practices being reported. A number of prevalent unhelpful-practice themes emerged from the responses, which we propose specific mitigation techniques to address. We therefore propose a SME-specific incident response framework that is simple yet powerful enough to inform and guide SME responses to data breach incidents

    Incident Response as a Lawyers' Service

    Get PDF
    D. Woods and R. Bohme, "Incident Response as a Lawyers’ Service" in IEEE Security & Privacy, vol. 20, no. 02, pp. 68-74, 2022. doi: 10.1109/MSEC.2021.3096742 keywords: {law;forensics;security;nist;monitoring;insurance;information integrity} url: https://doi.ieeecomputersociety.org/10.1109/MSEC.2021.309674

    A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework

    Get PDF
    As ICT and cyberspace become sources of impressive innovation, the reliance of organizations, governments, and people on them will increase. However, with this vast reliance, hazardous vulnerabilities have emerged. These vulnerabilities may be exploited, resulting in information and cybersecurity issues at the national as well as the international levels. Cybersecurity is critical for sustaining resilience in critical infrastructures (CI) as well as information infrastructures (CII). Accordingly, cybersecurity should be incorporated into the economic and national security model of a nation. With this in mind, a cybersecurity index is a necessary tool to compare the performance of nations in terms of cybersecurity initiatives, and in articulating effective cybersecurity policies and strategies. This paper proposes a holistic framework for building a cybersecurity index taking into consideration the technological, legal, economic, cultural, and international relations factors pertinent to countries and paves the way for cybersecurity measures and metrics to be established and tested

    Systematic approach to cyber resilience operationalization in SMEs

    Get PDF
    The constantly evolving cyber threat landscape is a latent problem for today’s companies. This is especially true for the Small and Medium-sized Enterprises (SMEs) because they have limited resources to face the threats but, as a group, represent an extensive payload for cybercriminals to exploit. Moreover, the traditional cybersecurity approach of protecting against known threats cannot withstand the rapidly evolving technologies and threats used by cybercriminals. This study claims that cyber resilience, a more holistic approach to cybersecurity, could help SMEs anticipate, detect, withstand, recover from and evolve after cyber incidents. However, to operationalize cyber resilience is not an easy task, and thus, the study presents a framework with a corresponding implementation order for SMEs that could help them implement cyber resilience practices. The framework is the result of using a variation of Design Science Research in which Grounded Theory was used to induce the most important actions required to implement cyber resilience and an iterative evaluation from experts to validate the actions and put them in a logical order. Therefore, this study proposes that the framework could benefit SME managers to understand cyber resilience, as well as help them start implementing it with concrete actions and an order dictated by the experience of experts. This could potentially ease cyber resilience implementation for SMEs by making them aware of what cyber resilience implies, which dimensions it includes and what actions can be implemented to increase their cyber resilience

    Incident Response Practices Across National CSIRTs: Results from an Online Survey

    Get PDF
    The aim of this study is to obtain operational insights of real-world practices across national CSIRTs, concerning cyber incident reporting channels, ticketing tools, incident classification schemes, and ways to identify appropriate responses. An online survey involving 19 staff members of 17 national CSIRTs was conducted, leading to four major findings. First, multiple reporting channels are provided by national CSIRTs for prompt incident reporting. Second, free and open-source ticketing tools are popular among national CSIRTs for tracking reported incidents. Third, different incident classification schemes are used across national CSIRTs, indicating a lack of standardised approaches that can have important implications (for example, difficulties in cross-CSIRT information sharing). Fourth, for classifying incidents and identifying appropriate responses, manual approaches are used more than automated ones. We conclude that more cross-CSIRT efforts are needed to define a more standardised cyber incident classification scheme, and to develop more automated tools to support national CSIRTs' operations

    From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis

    Get PDF
    Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion

    Outsourced incident management services

    Get PDF
    With increasing use of information and communication technologies (ICT), many organizations are outsourcing information security services to managed security service providers (MSSP). This project reports results on current practice and experiences with outsourced incident management services. The research was conducted as a case study performing a qualitative study of six large MSSPs, one emerging MSSP and an independent expert. The findings reveal multiple challenges that both customers and providers are currently facing, including suggestions for addressing them. This information will be useful for organizations looking to improve their practices. This research seeks to build awareness of the challenges posed by relying on outsourced services for incident management. It describes how these services are benefiting or affecting current incident management teams and some of the future needs of this field. Furthermore, it contributes with a categorization of the services offered by some of the most significant MSSPs in the market

    Public health preparedness and response 2018 national snapshot

    Get PDF
    CS287315A2018_Preparedness_Report.pdfWelcome -- Background -- PREPARE: Every Response is Local; Right Resources, Right Place, Right Time; Keeping Lifesaving Research Safe and Secure; Health Security: Improving Response Capacity of Global Partners -- RESPOND: Strengthening Public Health Emergency Response Operations; Laboratories: On the Front lines of America\u2019s Health; Emergency Leaders: The Future of Incident Response -- CONNECT: Global Training to Protect Us All; Protecting Our Most Vulnerable; The Power of Preparedness: National Preparedness Month; The Opioid Epidemic: An Unprecedented Public Health Emergency -- RESPONSE IN ACTION: Three Major Hurricanes Make Landfall in the United States; A Complex Threat: The Spread of Zika; Reaching the Finish Line: Global Polio Eradication -- LOOKING FORWARD: Medical Countermeasure Distribution and Dispensing; Preparing for the Most Likely Scenarios; Increasing Efficiency of Information Sharing; Transferring the Strategic National Stockpile.201
    corecore