May 13, 2025
May 13, 2025
May 13, 2025
May 13, 2025
Threats to Critical Infrastructure
5
May 13, 2025
Critical Infrastructure
6
May 13, 2025
Security Advisors
Security Advisors are personnel who serve as critical infrastructure specialists with areas of expertise in physical security and cybersecurity.
7
May 13, 2025
Protected Critical Infrastructure Information (PCII)
The Protected Critical Infrastructure Information (PCII) Program protects critical infrastructure information voluntarily shared with the federal government for homeland security purposes.
8
May 13, 2025
Use of PCII
9
May 13, 2025
PCII Protections
10
May 13, 2025
Physical Security
11
May 13, 2025
Protective Security Advisors
�
12
May 13, 2025
Infrastructure Survey Tool
The Infrastructure Survey Tool (IST) is a web-based vulnerability survey tool that applies weighted scores to identify infrastructure vulnerabilities and trends across sectors.
13
May 13, 2025
Infrastructure Survey Tool Data Categories
14
* Comparative analysis provided
May 13, 2025
Infrastructure Survey Tool Deliverables
15
May 13, 2025
Infrastructure Survey Tool Dashboards
16
May 13, 2025
Security Assessment at First Entry (SAFE) Tool
17
May 13, 2025
Snapshot of Common Physical Security Vulnerabilities
18
May 13, 2025
Services Snapshot
19
May 13, 2025
Information Sharing Example- Physical Security Considerations for Temporary Facilities
20
Temporary facilities are those established for set timeframes for hosting a venue/event.
May 13, 2025
Information Sharing Example- Protecting Infrastructure During Public Demonstrations
21
The right to assemble is recognized as a key American value and is protected in the First Amendment of the U.S. Constitution.
Risk Mitigations:
May 13, 2025
Suspicious Activity Reporting
22
May 13, 2025
Recognize the Signs - Indicators
23
May 13, 2025
“If You See Something, Say Something”
To become a partner, send an email to:
seesay@hq.dhs.gov
For more information visit:
www.dhs.gov/see-something-say-something
24
“If You See Something, Say Something®” is a national anti-terrorism campaign that raises public awareness of the indicators of terrorism and terrorism-related crime, as well the importance of reporting suspicious activity to state and local law enforcement.
May 13, 2025
Cybersecurity
25
Cybersecurity Advisors
26
Threat Actor Tactics, Techniques and Procedures
27
UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE
Initial Access Tactics, Techniques and Procedures
Common Threat Vectors
28
Common Threat Vectors (cont.)
29
Common Indicators of Compromise
30
Common Indicators of Compromise
31
Criticality of Periodic Assessments
TLP:WHITE
32
Cybersecurity Services (Voluntary & No Cost)
33
Tactical
Strategic
STRATEGIC
(C-Suite Level)
TECHNICAL
(Network Admin Level)
May 13, 2025
Vulnerability Scanning / Hygiene
34
Purpose: Assess Internet-accessible systems for known vulnerabilities and configuration errors.
Delivery: Identify public-facing Internet security risks, through service enumeration and vulnerability scanning online by CISA.
Benefits:
Network Vulnerability & Configuration Scanning:
May 13, 2025
Vulnerability Scanning Report Card
35
High Level Findings
Latest Scans
Addresses Owned
Addresses Scanned
Hosts
Services
Vulnerable Hosts
Vulnerabilities
Vulnerabilities
Severity by Prominence
Vulnerability Response Time
Potentially Risky Open Services
May 13, 2025
Cybersecurity Performance Goals
36
EXAMPLE
May 13, 2025
Ransomware Readiness Assessment
37
EXAMPLE
May 13, 2025
The Cyber Security Evaluation Tool (CSET)
38
May 13, 2025
Ransomware Vulnerability Warning Pilot (RVWP)
A new effort to warn critical infrastructure entities that their systems have exposed vulnerabilities that may be exploited by ransomware threat actors.
39
May 13, 2025
Pre-Ransomware Notification Program
May 13, 2025
Known Exploited Vulnerabilities Catalog (KEV)
May 13, 2025
Cybersecurity Training Resources
42
CISA is committed to providing the nation with access to cybersecurity training and workforce development efforts to develop a more resilient and capable cyber nation.
May 13, 2025
Our Nation’s Cyber Workforce Foundation
The National Cybersecurity Workforce Framework is a collection of definitions that describe types of cybersecurity work and skills requires to perform it. �
Operate & Maintain
Securely Provision
Analyze
Collect & Operate
Oversight &
Development
Protect &
Defend
Investigate
May 13, 2025
Key Takeaways
23
May 13, 2025
Sign up for CISA Communications
Includes information about upcoming trainings, events, and notifications about CISA publications.
Subscribe Here (public.govdelivery.com/accounts/USDHSCISA/subscriber/new)
45
May 13, 2025
46
Andrew Balter
Protective Security Advisor
E: andrew.balter@mail.cisa.dhs.gov
C: 202.821.9034
Ryan K. Lewis
Cybersecurity Advisor
E: ryan.lewis@mail.cisa.dhs.gov
C: 202.975.9453
CISARegion4@cisa.dhs.gov
May 13, 2025
47
May 13, 2025