As technology evolves, the majority of our nation’s critical infrastructure will continue to rely heavily on cyber-dependent systems to make operations more efficient and bring essential services to their customers. These systems operate everything from power plants to pipelines and hospitals to highways, which we often take for granted until they stop working.
Today, the Department of Homeland Security announced the creation of the Critical Infrastructure Cyber Community C³ [pronounced C-Cubed] Voluntary Program. This program is an innovative public-private partnership designed to help align critical infrastructure owners and operators with existing resources that will assist their efforts to adopt the Cybersecurity Framework and manage their cyber risks.
The Cybersecurity Framework—developed by the National Institute of Standards and Technology (NIST), in collaboration with industry—consists of standards, guidelines, and best practices to promote the protection of critical infrastructure through cyber risk management. In support of these goals, the program seeks to be flexible, allowing organizations to participate in the C³ Voluntary Program in different ways.
The C³ Voluntary Program emphasizes three C’s:
Converging critical infrastructure community resources to support cybersecurity risk management and resilience through use of the Framework;
Connecting critical infrastructure stakeholders to the national resilience effort through cybersecurity resilience advocacy, engagement and awareness; and
Coordinating critical infrastructure cross sector efforts to maximize national cybersecurity resilience.
The primary goals of the C³ Voluntary Program are to support industry in increasing cyber resilience, to increase awareness and use of the Cybersecurity Framework, and encourage organizations to manage cybersecurity as part of an all hazards approach to enterprise risk management.
Both the private sector and government have a role to play in strengthening our nation’s critical infrastructure security and resilience, including cybersecurity, and it is imperative that we as a country take coordinated actions to achieve this goal. We encourage companies and organizations to join the C³ Voluntary Program and take advantage of technical assistance and tools and resources available to ensure a more resilient critical infrastructure for a more resilient Nation.
The purpose and focus of the C³ Voluntary Program is to encourage organizations to implement a cyber risk management process, primarily by supporting use of the Cybersecurity Framework and conducting outreach and engagement around available resources.
Critical Infrastructure Protection (CIP) consists of actions taken to prevent, remediate, or mitigate the risks resulting from vulnerabilities of critical infrastructure assets.
DHS encourages private sector companies to follow the Federal government's lead and take ambitious measures to augment and align cybersecurity investments with the goal of minimizing future incidents.
What is critical infrastructure cybersecurity? Critical infrastructure cybersecurity refers to the programs, protocols, and technology used to protect the critical infrastructure of nation states.
Command, control, and communications (C3) systems are fundamental to all military operations, delivering the critical information necessary to plan, coordinate, and control forces and operations across the full range of Department of Defense (DoD) missions.
The Cybersecurity and Infrastructure Security Agency (CISA ) is an operational component of the Department of Homeland Security (DHS). Under the leadership of Director Jen Easterly, CISA works to understand, manage, and mitigate risk to the nation's cyber and physical infrastructure in the public and private sector.
Access Control: The prevention of unauthorized users and devices from accessing the network. Application Security: Security measures are placed on hardware and software to lock down potential vulnerabilities. Firewalls: Gatekeeping devices that can allow or prevent specific traffic from entering or leaving the network.
One of the most significant challenges in critical infrastructure cyber security is the prevalence of legacy systems. These outdated systems were often designed without security in mind and can be difficult to patch or update. As a result, they are easy targets for cybercriminals.
The three interwoven elements of critical infrastructure (physical, cyber and human) are explicitly identified and should be integrated throughout the steps of the framework, as appropriate.
Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838
Phone: +128413562823324
Job: IT Strategist
Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing
Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.
We notice you're using an ad blocker
Without advertising income, we can't keep making this site awesome for you.