|
Working collaboratively across the agency, CISA developed and announced its Stakeholder Engagement Strategic Plan to coordinate a unified approach to stakeholder engagement and partnerships that will strengthen whole-of-nation operational information sharing. Aligned to and cascading from Goal Three within CISA’s 2023-2025 Strategic Plan, the Stakeholder Engagement Strategic Plan will enable CISA to:
- Foster collaboration on stakeholder engagement and outreach across CISA divisions,
- Gain a better understanding of stakeholders’ security risks and needs, and
- Effectively provide stakeholders access to CISA’s products, services, resources, and information.
We invite you to read the full CISA Stakeholder Engagement Strategic Plan.
Across the nation, federal, state, local, tribal, and territorial (FSLTT) agencies are updating 911 systems to digital or Internet Protocol (IP)-based systems, known as Next Generation 911 (NG911). NG911 enables a dynamic and resilient means of sharing information between citizens and public safety agencies across all disciplines.
To help Emergency Communications Centers (ECCs) and Public Safety Answering Points (PSAPs) in the transition to NG911, the Emergency Communications Preparedness Center (ECPC) collaborated with FSLTT stakeholders to develop the Considerations for Establishing Agreements for NG911 document. This document was developed to help FSLTT agencies establish agreements to interconnect NG911 systems. The document highlights considerations for establishing agreements for NG911, such as defining roles and responsibilities, resources and services, and technical requirements.
Stakeholders are encouraged to share this document with their respective networks. For questions about the document, please contact ecpc@cisa.dhs.gov. For additional NG911 resources, visit cisa.gov/ecpc.
You can also follow CISA on
Twitter, Facebook, Instagram, and LinkedIn.
Public safety communications are at risk from a multitude of cyber threats and vulnerabilities. Due to the urgent nature of the operations, public safety communications are high-value targets for cyber threat actors. To set expectations of cyber incident response and to develop a culture of cyber readiness, SAFECOM published the “First 48”: What to Expect When a Cyber Incident Occurs document.
Based on a series of conversations with public safety officials who have experienced cyber incidents, the document presents common themes, insights, and best practices in chronological order. Expectations, indicators of suspicious activities, and example incident response essential actions are outlined in textboxes to visually aid the understanding and anticipation of cyber incident response.
As responses to specific incidents vary greatly, the “First 48” provides foundational guidance on cyber incident response expectations. The public safety community is encouraged to holistically review their operational posture to ensure that they remain resilient in instances of other human-caused or natural disruptions. Visit CISA’s Communications and Cyber Resiliency Toolkit for additional public safety communications and cybersecurity resources.
Securing 5G Open RAN Architecture from Cybersecurity Risks
The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), through the Enduring Security Framework (ESF), recently published a paper titled, Open Radio Access Network Security Considerations which assesses the benefits and security considerations with implementing Open RAN architecture.
The ESF’s Open RAN Working Panel focused on security considerations for several key technical aspects of Open RAN: multi-vendor management, the Open Fronthaul connecting radios to base station equipment, a new RAN application framework comprising rApps and xApps, the use of Artificial Intelligence/Machine Learning (AI/ML) for RAN optimization, and other general network considerations including open-source software, virtualization, and a cloud-based 5G core network.
The guidance in this paper is provided “as is” based on knowledge and recommended practices in existence at the time of publication document and was written for general informational purposes only. Some of the security considerations identified in this assessment are not unique to Open RAN and exist in current closed RAN deployments, while others are exclusive to Open RAN architecture.
Critical infrastructure stakeholders benefit from working together to address these security considerations, ensuring a secure and resilient Open RAN ecosystem.
Region 6
Region 6 has scheduled its next Critical Manufacturing Sector Roundtable for Wednesday, April 12 at the National Security Collaboration Center in San Antonio, Texas. All Critical Manufacturing Sector partners in Region 6 -- Arkansas, Louisiana, New Mexico, Oklahoma, and Texas -- are welcome to attend.
The Annual Critical Manufacturing Spring Security Conference dates are being finalized. The Conference will be held at the headquarters of NCR, Inc., in Atlanta, Ga, in April 2023. We will send out communications including the agenda, logistics, dates and times as soon as they are finalized. We look forward to seeing you in Georgia!
Quarterly Chemlock Trainings
CISA’s ChemLock program provides the ChemLock: Introduction to Chemical Security training course quarterly on a first-come, first-serve basis. This course provides an introduction to identifying, assessing, evaluating, and mitigating chemical security risks. This easy-to-understand overview identifies key components and best practices of chemical security awareness and planning to help kick start chemical security discussions at your facility.
This course runs one to two hours and is appropriate for all personnel regardless of their level of involvement with dangerous chemicals.
|
This course walks through how to create a tailored, scalable security plan that meets the business model and unique circumstances of a facility. Participants will learn the key elements of a chemical security plan and benefit from examples, lessons learned, and best practices.
This course runs two to three hours in length and is designed to help leadership, facility security personnel, and other applicable personnel understand, develop, and implement a facility security plan.
For more information or to request a specific training for your facility, please visit the ChemLock Training webpage.
Cyber Defense Education and Training (CDET) Offerings Now Available On Demand
CISA is now offering the new Analysis of a Cyber Incident course on FedVTE (Federal Virtual Training Environment). This three-module course is available to federal employees and teaches the beginner analyst how to develop the analytical skills and capabilities needed to handle a potential cyber incident— from analysis to reporting findings. For a full list of available courses on FedVTE for federal employees, please see the course catalog. For courses available to the public, please visit https://fedvte.usalearning.gov/public_fedvte.php
Instructor-Led Cyber Training for Stakeholders:
Incident Response (IR): CISA offers no-cost cybersecurity incident response training for government employees and contractors across federal, state, local, tribal, and territorial government, as well as educational and critical infrastructure partners. Course types include Awareness Webinars and Cyber Range Training. These courses provide valuable learning opportunities for everyone from cyber newbies to veteran cybersecurity engineers.
IR Training Events Through Year End 2022
Industrial Control Systems (ICS): CISA offers free, virtual ICS trainings geared toward Critical Infrastructure owners and operators. The trainings are designed to reduce cybersecurity risks to critical infrastructure and encourage cooperation between CISA and the private sector. Trainings vary in length and run from 8:00 a.m. – 5:00 p.m. MST (10:00 a.m. – 7:00 p.m. EST). All trainings are conducted through Online Training or CISA Virtual Learning Portal (VLP), with the exception of the three-day, in-person pilot course at Idaho National Labs (INL) in Idaho Falls, Idaho.
| |
ICS Training Events through 2022
|
| |
Date
|
Course Code
|
Course
|
Location
|
| |
|
|
|
|
| |
On Demand
|
100W
|
Operational Security (OPSEC) for Control Systems
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-1
|
Differences in Deployments of ICS
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-2
|
Influence of Common IT Components on ICS
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-3
|
Common ICS Components
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-4
|
Cybersecurity within IT & ICS Domains
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-5
|
Cybersecurity Risk
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-6
|
Current Trends (Threat)
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-7
|
Current Trends (Vulnerabilities)
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-8
|
Determining the Impacts of a Cybersecurity Incident
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-9
|
Attack Methodologies in IT & ICS
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-10
|
Mapping IT Defense-in-Depth Security Solutions to ICS - Part 1
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
210W-11
|
Mapping IT Defense-in-Depth Security Solutions to ICS - Part 2
|
CISA Training Virtual Learning Portal (VLP)
|
| |
On Demand
|
FRE2115
|
Industrial Control Systems Cybersecurity Landscape for Managers
|
CISA Training Virtual Learning Portal (VLP)
|
| |
|
CISA’s K – 12 Cybersecurity Education Training Assistance Program (CETAP) and CYBER.ORG: Through CISA’s CETAP grantee, CYBER.ORG, CISA offers K-12 teachers with cybersecurity curricula and education tools. CYBER.ORG develops and distributes free cybersecurity, STEM, and computer science curricula to K-12 educators across the country. Below are upcoming training events through CYBER.ORG.
October 27- Elementary and Middle Schoolers
Cybersecurity Awareness for Elementary and Middle School (Virtual Event): In this 60-minute workshop, dive into age-appropriate cybersecurity activities that can be integrated into any classroom. These simple lessons help students understand basic cybersecurity concepts such as privacy policies, digital footprints, website credibility, encryption, and more. Learn how to facilitate conversations that will empower students to navigate in the digital age. No prior experience or knowledge is necessary! To learn more or sign up, visit https://cyber.org/events or contact us at education.cisa.dhs.gov.
|
Stay up-to-date and share the latest news, multimedia, and other important communications from CISA under the CISA News and Media page on the CISA.gov site. Spread the word, tell colleagues and friends to find and share content addressing the most pressing cybersecurity topics. CISA’s blog provides an inside-out view of what we do every day at CISA.
|