This course will introduce foundational cybersecurity information sharing concepts that can be leveraged to build a community information sharing collaborative. It will establish the purpose and value of community information sharing; and will explore how sharing can assist communities with cyber incident preparedness and response before, during and after a cyber incident occurs.
This course is designed as a tabletop activity simulating a community-wide cybersecurity event. Using a gamification approach, participants will strategize with a diverse group of stakeholders to plan for and respond from a cybersecurity incident that could have cascading effects across a community.
Specifically, this training will encourage participants to discuss budgeting and planning strategies; coordinate with other community stakeholders to respond to a cyber incident; and will inform participants of various recovery aspects that may be included in a cybersecurity program.
The purpose of analysis is to produce intelligence that decreases uncertainty in decision making and therefore reduces risk. This course introduces the information analysis process and how an organization can use it to identify, define and mitigate cybersecurity threats. The intent is to provide participants with a general understanding of the tools and processes needed for an analysis team to create cybersecurity information and intelligence within their organization.
This is an awareness-level, non-technical course that is focused on educational institutions with training to assist them in addressing cybersecurity threats. Educational institutions of all sizes (including universities, colleges and K-12 school districts) are data rich making them targets for cyber-attacks. Cybersecurity readiness is not solely a technology issue; it includes managing student safety, well-being and digital risks. The leadership are responsible for managing the cybersecurity risk for our schools.
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)
The National Response Framework describes how preparedness can be achieved by developing an incident annex for each hazard. Incident annexes describe coordinating structures used to deliver core capabilities and support response missions unique to a specific type of incident.
The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis and the uncertainties of sharing data with a large network of organizations. This course assists communities of interest to establish an Information Sharing and Analysis Organization (ISAO).
This course introduces fundamental cyber information sharing concepts that can be incorporated into a cybersecurity program for both inside and outside an agency or organization. It introduces the purpose and value of information sharing and how sharing can assist with cyber incident preparedness and response before, during and after a cyber incident occurs.
Organizations have increasingly been the target of cyberattacks that are preventable. One of the first steps to preventing cybersecurity incidents is developing and implementing cybersecurity policies in the organization. Developing robust cybersecurity policies is crucial for organizations to safeguard their digital assets and maintain operational resilience. Policies provide clear guidelines, define security standards, and establish procedures to protect against cyber threats such as data breaches, ransomware attacks, and unauthorized access. Organizations can mitigate risks, ensure compliance, and foster a security-conscious culture by implementing effective policies.
Using the Community Cyber Security Maturity Model (CCSMM) to develop a cybersecurity program will enable community leaders, network/security personnel and those individuals involved in developing or maintaining plans used for and throughout the community. This course assists participants to understand what is required to develop a coordinated, sustained and viable community cybersecurity program. The course introduces participants at all levels to the DHS-supported CCSMM and can be used to guide communities and states in developing their own CCSMM-consistent cybersecurity programs. Participants are introduced to different resources that can be used for a community program.
Designed as a collaborative community approach to identifying the gaps in cyber plans and the training needed in cybersecurity for all levels of community personnel and local critical infrastructure partners.
At the end of this course, participants will be able to conduct a community cybersecurity gap analysis resulting in a cybersecurity training plan for all levels of community personnel and local critical infrastructure partners.
Every organization has critical information and technology assets that are essential to their business operations and require enhanced security. Organizational resources that can be dedicated to cybersecurity are finite; therefore, those resources should be applied deliberately and strategically focusing on the most important assets. This course will enable participants to identify their high value assets, prioritize them, assess them and create a remediation action plan.