applications of gis to cybersecurity - esri · •how do you provide shared situational awareness...

18
Application of GIS to Cybersecurity Brian Biesecker Ken Mitchell

Upload: others

Post on 02-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Application of GIS to CybersecurityBrian Biesecker

Ken Mitchell

Page 2: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Fundamental Problems that GIS can help you solve

• What are the impacts to your mission, operations, business activities, critical systems, or

critical infrastructure from a Cyber Attack, IT outage or impairment?

• How do you prioritize the work of your IT Team or Cyber Security Team in the context of

your most important missions, operations, business activities, critical systems, or critical

infrastructure?

• How do you provide shared situational awareness across your organization?

• How can you refine your Cyber Forensics Analysis efforts?

Page 3: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

It’s mappable

Cyberspace Re-Considered

Social / Persona Layer

Device Layer

Logical Network Layer

Physical Network Layer

Geographic Layer

• Each device in cyberspace is owned by someone (no ‘global commons’)

• Electro-mechanical devices exist in space-time and interact with physical events

• Geography is required to integrate and align cyberspace with other data

Page 4: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

It’s mappable

Cyberspace Re-Considered

Social / Persona Layer

Device Layer

Logical Network Layer

Physical Network Layer

Geographic Layer

• Each device in cyberspace is owned by someone (no ‘global commons’)

• Electro-mechanical devices exist in space-time and interact with physical events

• Geography is required to integrate and align cyberspace with other data

ArcSchematic

Page 5: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

It’s mappable

Cyberspace Re-Considered

Social / Persona Layer

Device Layer

Logical Network Layer

Physical Network Layer

Geographic Layer

• Each device in cyberspace is owned by someone (no ‘global commons’)

• Electro-mechanical devices exist in space-time and interact with physical events

• Geography is required to integrate and align cyberspace with other data

Utility Network

Page 6: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Applies to many domains

Missions / Operations

Information Technology

Critical Systems

Critical Infrastructure

Page 7: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

The Cyber Supply LineA vector of devices and network paths

• Cyber Supply Line (CSL) is a consistent path through the infrastructure

• CSL focuses resources on only the devices that are critical

• Managing data flows is similar to traffic routing; an Esri core competency

Mission Data Flow

LAN

Bldg Net Bldg Net

LAN

Campus #1 Campus #2

WAN

Page 8: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

The Cyber Supply LineA vector of devices and network paths

• Cyber Supply Line (CSL) is a consistent path through the infrastructure

• CSL focuses resources on only the devices that are critical

• Managing data flows is similar to traffic routing; an Esri core competency

Mission Data Flow

LAN

Bldg Net Bldg Net

LAN

Campus #1 Campus #2

WAN

Cyber Supply Line

Page 9: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Share Situational AwarenessIntegrating to improve information sharing

Protection

Recovery Prevention

Awareness

Response

Executives / CommandersEnterprise - focused

IT InfrastructureDevice-Focused

Cyber SecurityEvent-focused

Operations Process-focused

Page 10: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Rio Olympics

DemoKen Mitchell

Page 11: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Cyber Comms COP

Server Intrusion Data

Server w/GeoEvent

Extension

Enhancing Cyber Common Operating PicturesGeography provides deeper understanding

Intrusion

Detection

System

IP-Geo

Lookup

Page 12: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

ArcGIS Integration with Cyber Security Tools

Desktop Web Device

Server Online Content

and Services

Portal

Ops

Dashboard

HR Database -Personnel, Orgs,

Locations, Travel

Cyber Tools & Data-IDS/IPS, HBSS, Virus Scanning,

Patch Monitoring

IT Tools & Databases -IT Inventory, Device Locations,

Health and Status Monitoring

Facilities Data -CAD & GIS of

Buildings and Campuses,

Electric, Water, HVAC, Facilities

Monitoring, Physical Security

Ops Data -Mission Activity, Status Reports,

Real-time monitoring

Executive Dashboards -Status Reports, Trends,

Brand Sentiment, Financials

Page 13: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Linking your data to create the necessary relationships

Person Org Location

Bill Team 1 2Q001

John Team 1 2Q002

Sue Team 1 2Q003

Rick Team 2 1W003

June Team 2 1W004

Eva Team 2 1W005

Dan Team 2 1W006

Person Device Identifier

Bill PC1 00:0a:95:9d:68:16

John PC2 00:4d:36:8c:54:08

Sue PC3

Rick PC5

June PC6

Eva PC7

Dan PC8

Building Room Network Drop (IP)

Q 2Q001 xxx.xxx.32.250

Q 2Q002 xxx.xxx.32.251

Q 2Q003 xxx.xxx.32.252

W 1W003 xxx.xxx.32.240

W 1W004 xxx.xxx.32.241

W 1W005 xxx.xxx.32.242

W 1W006 xxx.xxx.32.243

Human Resources Database

IT Inventory Database

IT Network Drop Database

Mission Orgs Personnel

Rapid Response Team Team 1 Bill

Team 1 John

Team 1 Sue

Page 14: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Data Linkages

• Mission / Operational activities to Organizations / People

• Organizations to People

• People to Their location

• People to Devices they use

• Devices to Their location

• Devices to Their logical network connection

• Logical Network to Physical Network

• Logical / Physical Network to Network Devices

• Cyber Threats to Devices

• IT Health and Status to Devices

• Impacted Devices to Impacted Mission

Page 15: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Cyber Summary

Page 16: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Print Your Certificate of AttendancePrint stations located in the 140 Concourse

Tuesday Wednesday12:30 pm – 6:30 pm GIS Solutions Expo Hall B

5:00 pm – 6:30 pm GIS Solutions Expo SocialHall B

10:30 am – 5:15 pm GIS Solutions Expo Hall B

6:30 pm – 9:00 pm Networking ReceptionSmithsonian National Portrait Gallery

Page 17: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand

Download the Esri Events

app and find your eventSelect the session

you attended

Scroll down to find the

feedback section

Complete answers

and select “Submit”

Please Take Our Survey in the Esri Events App

Page 18: Applications of GIS to Cybersecurity - Esri · •How do you provide shared situational awareness across your organization? ... Executive Dashboards - Status Reports, Trends, Brand