Public Safety Cyber Guidelines

OEC - Cyber Risks to NG9-1-1 Image

Office of Emergency Communications: Cyber Risks to Next Generation 9-1-1

ABSTRACT: “This document provides introduction to: Next Generation 9-1-1 (NG9-1-1) systems, The NG9-1-1 cybersecurity risk landscape, and Resources to improve cybersecurity posture. Public safety managers and officials can use this document to familiarize themselves with NG9-1-1 systems and best practices to maintain and improve cybersecurity posture. This document provides sample risk reduction strategies, actions, and resources. It does not contain specific, system-unique instructions or a ddress governance considerations.”

Read More
 
APCO: An Introduction to Cybersecurity

An Introduction to Cybersecurity: A Guide for PSAPs by APCO International

ABSTRACT: “The primary goal of this document is inform PSAP supervisors (and above) how to identify, prevent and minimize exposure to cybersecurity risks and vulnerabilities. It can be used to help PSAPs develop policies and procedures and raise awareness of areas that require further consideration. Case studies have also been provided in order to demonstrate how theoretical vulnerabilities have manifested into operationally impactful events.”

Read More
 
DHS: Implementation Guidance

Emergency Services Sector Cybersecurity Framework Implementation Guidance by the Department of Homeland Security (DHS)

ABSTRACT: “This Implementation Guidance aims to simplify the process for all organizations in the Emergency Services Sector— regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and best practices of risk management. Ultimately, the Framework and this Implementation Guidance are focused on helping individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient sector overall.”

Read More
 
FCC: Optimal PSAP Architecture

Task Force on Optimal PSAP Architecture (TFOPA): An FCC Federal Advisory Committee Adopted Final Report by Federal Communications Commission (FCC)

ABSTRACT: “This final report is organized around the three major PSAP focused work efforts of the Task Force, including Cybersecurity, the Optimal Approach to NG9-1-1 Architecture Implementation, Optimal and NG9-1-1 Resource Allocation.  It essentially consolidates the results of those work efforts into one document, with a common executive summary, and summarized set of findings and recommendations.”

Read More
 
NIST: Improving Critical Infrastructure

Framework for Improving Critical Infrastructure Cybersecurity by National Institute of Standards and Technology (NIST)

ABSTRACT: “The national and economic security of the United States depends on the reliable functioning of critical infrastructure. To strengthen the resilience of this infrastructure, President Obama issued Executive Order 13636 (EO), “Improving Critical Infrastructure Cybersecurity,” on February 12, 2013.1 This Executive Order calls for the development of a voluntary Cybersecurity Framework (“Framework”) that provides a “prioritized, flexible, repeatable, performance-based, and cost effective approach” to manage cybersecurity risk for those processes, information, and systems directly involved in the delivery of critical infrastructure services. The Framework, developed in collaboration with industry, provides guidance to an organization on managing cybersecurity risk.”

Read More
 
NCCIC: Joint Analysis Report

Joint Analysis Report (JAR-16-20296A) by Department of Homeland Security (DHS) and Federal Bureau of Investigations (FBI)

ABSTRACT: “The information contained on this page is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). The joint DHS and FBI products provide technical details on the tactics, techniques, and procedures used by Russian government cyber actors. The intent of sharing this information is to enable network defenders to identify and reduce exposure to Russian malicious cyber activity, which the U.S. Government refers to as GRIZZLY STEPPE

Read More
 
North Korea.png

North Korean (HIDDEN COBRA) Reports by Department of Homeland Security (DHS) and Federal Bureau of Investigations (FBI)

ABSTRACT: “The information contained on this page is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) to provide technical details on the tools and infrastructure used by cyber actors of the North Korean government. The intent of sharing this information is to enable network defenders to identify and reduce exposure to North Korean government cyber activity. The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA.

Read More