To view/print/download the full agenda, please click here.
Agenda at a glance:
October 7, 2014
8:15am-9:00am Keynote Speaker
9:00am-9:45am Understanding the Evolving Legal and Regulatory Framework
9:45am-10:00am Networking Break
10:00am-11:30am Cyber Workforce Development
11:30am-12:30pm Luncheon Speaker
12:30pm-1:15pm Keynote Speaker
1:15pm-2:00pm Industry Awareness of Cyber Threats
2:00pm-2:15pm Networking Break
2:15pm-3:15pm Practical Application Panel
3:15pm-4:15pm Mobility Panel
October 8, 2014
*Additional fee to attend - please see registration page for details
8:00am-12:00pm NIST Plug and Play Workshop
Framework Core Functions
The Framework formally defines its Core as “a set of cybersecurity activities, desired outcomes, and applicable references across critical infrastructure sectors.” The Core consists of standard cybersecurity controls slotted into a taxonomy of five Functions, 22 Categories or subdivisions of the Functions, and 98 Subcategories – along with applicable Informative References that are familiar to cybersecurity practitioners. Core Functions form the “operational culture” that addresses cybersecurity risks.
The Core Functions are:
Identify-- Identify Functions are foundational; they help an organization understand how to manage cybersecurity risk to systems, assets, data, and capabilities. Relating these to a business context is critical for prioritizing efforts. Categories include Asset Management, Business Environment, Governance, Risk Assessment, and Risk Management Strategy.
Protect-- Protect Functions are the safeguards that ensure delivery of critical infrastructure services. In terms of ensuring resilience, these safeguards help to limit or contain the impact of a cybersecurity event. Categories include Access Control, Awareness and Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology.
Detect-- Detect Functions identify the occurrence of a cybersecurity event. Categories include Anomalies and Events, Security Continuous Monitoring, and Detection Processes. Cyphort’s solution falls under the Detect and Respond Functions.
Respond-- Respond Functions allow an organization to take action on a detected cybersecurity event. The goal of Respond Functions is to contain the impact of a cybersecurity event and remediate vulnerabilities. Categories include Response Planning, Communications, Analysis, Mitigation, and Improvements. Cyphort’s solution falls under the Detect and Respond Functions.
Recover-- Recover Functions are for resilience planning – particularly the restoration of capabilities or services impaired by a cybersecurity