1 of 47

May 13, 2025

2 of 47

May 13, 2025

3 of 47

May 13, 2025

4 of 47

May 13, 2025

5 of 47

Threats to Critical Infrastructure

  • America remains at risk from a variety of threats including:
    • Acts of Terrorism
    • Domestic Violence
    • Cyber Attacks
    • Extreme Weather
    • Pandemics
    • Accidents or Technical Failures

5

May 13, 2025

6 of 47

Critical Infrastructure

6

May 13, 2025

7 of 47

Security Advisors

Security Advisors are personnel who serve as critical infrastructure specialists with areas of expertise in physical security and cybersecurity.

  • Provide state, local, tribal, territorial (SLTT) officials and the private-sector with CISA resources
    • Security advice
    • Information sharing
    • Incident response
    • Special event planning
    • Training and exercises
    • Reach back to DHS / CISA

7

May 13, 2025

8 of 47

Protected Critical Infrastructure Information (PCII)

The Protected Critical Infrastructure Information (PCII) Program protects critical infrastructure information voluntarily shared with the federal government for homeland security purposes.

  • PCII protected information is not released through:
    • Freedom of Information Act disclosure requests
    • State, local, tribal, territorial disclosure laws
    • Use in civil litigation
    • Use for regulatory purposes

8

May 13, 2025

9 of 47

Use of PCII

  • PCII is used by CISA and other Federal and SLTT security analysts to:
    • Analyze and secure critical infrastructure and protected systems (cyber)
    • Identify vulnerabilities and develop risk assessments
    • Enhance recovery preparedness measures

9

May 13, 2025

10 of 47

PCII Protections

  • To qualify for PCII protections:
    • Information must be related to the security of the critical infrastructure; and
    • A submitter must attest the information is:
      • Voluntarily submitted
      • Not customarily found in the public domain
      • Not submitted in lieu of compliance with any regulatory requirement

10

May 13, 2025

11 of 47

Physical Security

11

May 13, 2025

12 of 47

Protective Security Advisors

  • Coordinate and collaborate with executive-level Federal, State, Local, Tribal, Territorial (FSLTT)  and private-sector officials to:
    • Identify, assess, and protect nationally and regionally significant critical infrastructure
    • Conduct risk reduction surveys and assessments
    • Analyze and identify dependencies, gaps, interdependencies, and vulnerabilities during planning and event execution for NSSE and SEAR events
    • Respond to, and recover from, natural or man-made incidents, both physical and cyber, in accordance with the National Response Framework
    • Coordinate DHS training based on needs analysis
  • Provide advice to FSLTT and private-sector on security and resilience policies

12

May 13, 2025

13 of 47

Infrastructure Survey Tool

The Infrastructure Survey Tool (IST) is a web-based vulnerability survey tool that applies weighted scores to identify infrastructure vulnerabilities and trends across sectors.

  • Facilitates the consistent collection of security information, such as:
    • Physical Security
    • Security Force
    • Security Management
    • Information Sharing
    • Protective Measures
    • Dependencies

13

May 13, 2025

14 of 47

Infrastructure Survey Tool Data Categories

  • Facility Information
  • Contacts
  • Facility Overview
  • Information Sharing*
  • Protective Measures Assessment*
  • Criticality*
  • Security Management Profile*
  • Security Areas/Assets

  • Physical Security*
    • Building Envelope
    • Vehicle Access Control
    • Parking
    • Site’s Security Force
    • Intrusion Detection System (IDS)/Video Surveillance System (VSS)
    • Access Control
    • Security Lighting

  • Additional DHS Products and Services
  • Criticality Appendix
  • Images
  • Security Force*
  • Cyber Vulnerability
  • Dependencies*

14

* Comparative analysis provided

May 13, 2025

15 of 47

Infrastructure Survey Tool Deliverables

  • Generates the Protective Measures Index and Resilience Measurement Index
  • Allows CISA and facility owners and operators to:
    • Identify security gaps
    • Compare a facility’s security in relation to similar facilities
    • Track progress toward improving critical infrastructure security

15

May 13, 2025

16 of 47

Infrastructure Survey Tool Dashboards

  • Survey and assessment information is shared with owners and operators through interactive dashboards
  • Dashboards allow users to explore the impacts of potential improvements to their security and resilience status

16

May 13, 2025

17 of 47

Security Assessment at First Entry (SAFE) Tool

  • The Security Assessment at First Entry (SAFE) tool is designed to assess the current security posture and identify options for facility owners and operators to mitigate relevant threats
  • The SAFE tool is suited for all facilities, including smaller ones such as rural county fairgrounds, houses of worship with only weekend services and few members, and small health clinics

17

May 13, 2025

18 of 47

Snapshot of Common Physical Security Vulnerabilities

18

  • Lack of designated security manager
  • No written security, emergency management or business continuity plans
    • Lack of access control & perimeter security
    • Suspicious package procedures
    • Mass notification procedures
    • Active Shooter procedures
    • Training and exercising
  • Lack of alarm and video surveillance systems
  • Missed opportunities to collaborate with Law Enforcement and Fusion Centers
  • Lack of employee background and recurring checks

May 13, 2025

19 of 47

Services Snapshot

19

  • Security Assessment at First Entry
  • Infrastructure Survey Tool
  • Infrastructure Visualization Platform
  • Security planning best practices
  • Tabletop Exercise Templates
  • Planning and facilitation services for tabletops to Full-scale exercises
  • CISA Active Shooter Preparedness
  • Protecting Infrastructure During Public Demonstrations
  • De-escalation Series
  • Power of Hello
  • Personal Security Considerations
  • Unauthorized Drones over Stadiums
  • Countering Improvised Explosive Device Programs
  • Insider Threat Mitigation
  • Vehicle Ramming Mitigation
  • Cyber Vulnerability Scanning​
  • Cyber Resilience Review
  • Cyber Infrastructure Survey
  • Cyber Security Evaluation Tool (CSET)

May 13, 2025

20 of 47

Information Sharing Example- Physical Security Considerations for Temporary Facilities

20

Temporary facilities are those established for set timeframes for hosting a venue/event.

  • Unique security challenges due to their provisional nature.

  • The dynamic threat environment underscore the importance of incorporating security measures to keep facilities and people safe.

  • Although there are currently no specific or imminent threats to temporary facilities, CISA recommends operators determine whether a security plan exists for the facility and if current protective measures provide the necessary security.

May 13, 2025

21 of 47

Information Sharing Example- Protecting Infrastructure During Public Demonstrations

21

The right to assemble is recognized as a key American value and is protected in the First Amendment of the U.S. Constitution.

Risk Mitigations:

  • Communicate with Law Enforcement and Fusion Centers to understand when demonstrations could become violent criminal acts.
  • Close business for the day or identify scheduled demonstrations and adjust business hours
  • Maintain emergency plans which include evacuations and shelter-in-place procedures
  • Consider shutting down power, water and ventilation
  • Remove valuables from plain view and increase visual security to deter a criminal act

May 13, 2025

22 of 47

Suspicious Activity Reporting

  • The Nationwide Suspicious Activity Reporting Initiative is a joint collaborative effort by DHS, FBI, and SLTT law enforcement for gathering, documenting, processing, analyzing, and sharing suspicious activity reporting to help prevent terrorism

22

May 13, 2025

23 of 47

Recognize the Signs - Indicators

23

May 13, 2025

24 of 47

“If You See Something, Say Something”

To become a partner, send an email to:

seesay@hq.dhs.gov

For more information visit:

www.dhs.gov/see-something-say-something

24

“If You See Something, Say Something®” is a national anti-terrorism campaign that raises public awareness of the indicators of terrorism and terrorism-related crime, as well the importance of reporting suspicious activity to state and local law enforcement.

May 13, 2025

25 of 47

Cybersecurity

25

26 of 47

Cybersecurity Advisors

26

  • Offer cybersecurity assistance to critical infrastructure owners and operators and SLTT officials.

  • Introduce organizations to various CISA cybersecurity products and services, along with other public and private resources, and act as liaisons to CISA cyber programs.

  • Provide:
    • Cyber preparedness assessments and protective resources
    • Working group support
    • Leadership, partnership in public-private development
    • Coordination and support in times of cyber threat, disruption, or attack.

27 of 47

Threat Actor Tactics, Techniques and Procedures

27

UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE

Initial Access Tactics, Techniques and Procedures

    • Known Exploited Vulnerabilities (KEVs) and Common Vulnerabilities and Exposures (CVEs)
    • Exploitation of end-of-life hardware and software
    • Unsecure edge devices
    • Use of default passwords or weak passwords
    • Phishing
    • Credential compromise
    • Access brokering and zero-day exploits

 

28 of 47

Common Threat Vectors

28

  • (U) Compromised Credentials
    • (U) Threat actors can obtain valid credentials through data breaches, social-engineering and phishing attacks, or simple brute force tactics
    • (U) Since 2013, malicious cyber actors have leveraged stolen credentials in approximately 31 percent of all breaches

  • (U) Third-party Service Providers
    • (U) Typically require trusted network connectivity and privileged access to customer networks
    • (U) Service provider compromises can expand to impact multiple customer environments
    • (U) Legitimate remote monitoring and management software can help threat actors avoid defenses

  • (U) Public-facing Devices and Applications
    • (U) Common vector used by both state-sponsored cyber actors and cybercriminal groups
    • (U) Threat actors scan for internet-facing devices, such as firewalls, virtual private networks, and routers

29 of 47

Common Threat Vectors (cont.)

29

  • (U) Social-engineering
    • (U) Includes phishing and all its variations (e.g. vishing, smishing, etc.)
    • (U) Generative artificial intelligence (GenAI) can improve attack success rates

  • (U) Unpatched Vulnerabilities in Software/Hardware
    • (U) One of the most common poor security practices
    • (U) In 2023, more than half of the most frequently exploited vulnerabilities were publicly disclosed vulnerabilities initially exploited as zero-days

  • (U) Insider Threats
    • (U) Includes both malicious and non-malicious insider threats
    • (U) Can result in theft, espionage, and sabotage of an organizations IT infrastructure, systems, and data

30 of 47

Common Indicators of Compromise

30

  • (U) Unusual outbound network traffic
    • (U) Anomalous traffic patterns or volumes could indicate attempted data exfiltration or communications with a command-and-control server

  • (U) Geographic abnormalities
    • (U) Connections from multiple geographically distant locations within a short timeframe from a single user is a potential indicator of compromise

  • (U) Abnormal account behaviors
    • (U) Abnormal behavior includes unusual login times, unauthorized access to files or databases, and failed login attempts

31 of 47

Common Indicators of Compromise

31

  • (U) Increased database read requests or modifications
    • (U) Routine review of application, security, and event logs can help identify changes to databases and detect attempted data exfiltration

  • (U) Suspicious files or processes
    • (U) Malware may disguise itself as legitimate software or initiate startup processes that may appear suspicious

  • (U) Unusual system behavior
    • (U) Unusual behavior includes system crashes, unexpected restarts, slow performance, and unexpected patches

  • (U) High-volume web traffic levels
    • (U) Abnormal volumes of web traffic or unauthorized connections with known-bad threat indicators

32 of 47

Criticality of Periodic Assessments

  • Periodic assessments are essential for physical and cyber resilience
  • Can’t protect if you don’t know what needs protection
  • Can’t fix what needs if you don’t know what’s wrong

TLP:WHITE

32

33 of 47

Cybersecurity Services (Voluntary & No Cost)

  • Cyber Resilience Review (CRR)
  • External Dependencies Management (EDM)
  • Cyber Infrastructure Survey (CIS)
  • Ransomware Readiness Assessment (RRA)
  • Cyber Tabletop Exercises (CTTX)
  • Cybersecurity Performance Goals (CPG)
  • Vulnerability Scanning / Hygiene (CyHy)
  • Known Exploited Vulnerabilities (KEV)
  • Cyber Security Evaluation Tool (CSET)

33

Tactical

Strategic

STRATEGIC

(C-Suite Level)

TECHNICAL

(Network Admin Level)

May 13, 2025

34 of 47

Vulnerability Scanning / Hygiene

34

Purpose: Assess Internet-accessible systems for known vulnerabilities and configuration errors.

Delivery: Identify public-facing Internet security risks, through service enumeration and vulnerability scanning online by CISA.

Benefits:

  • Continual review of system to identify potential problems
  • Weekly reports detailing current and previously mitigated vulnerabilities
  • Recommended mitigation for identified vulnerabilities

Network Vulnerability & Configuration Scanning:

  • Identify network vulnerabilities and weakness

May 13, 2025

35 of 47

Vulnerability Scanning Report Card

35

High Level Findings

Latest Scans

Addresses Owned

Addresses Scanned

Hosts

Services

Vulnerable Hosts

Vulnerabilities

Vulnerabilities

Severity by Prominence

Vulnerability Response Time

Potentially Risky Open Services

May 13, 2025

36 of 47

Cybersecurity Performance Goals

36

EXAMPLE

  • The CPGs are a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators can implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques.
  • Informed by existing cybersecurity frameworks and guidance, as well as the real-world threats and adversary tactics, techniques, and procedures (TTPs) observed by CISA and its government and industry partners.
  • Aids in identifying areas for potential future investment.

May 13, 2025

37 of 47

Ransomware Readiness Assessment

37

  • Ransomware disrupts or halts an organization's operations and poses a dilemma for management: pay the ransom and hope that the attackers keep their word about restoring access and not disclosing data, or do not pay the ransom and restore operations themselves.
  • The methods used to access an organization's information and systems are aimed at forcing a ransom to be paid. Ransomware attacks target the organization's data.
  • RRA helps you understand your cybersecurity posture and assess how well your organization is equipped to defend and recover from a ransomware incident.

EXAMPLE

May 13, 2025

38 of 47

The Cyber Security Evaluation Tool (CSET)

  • The Cyber Security Evaluation Tool (CSET) provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture.
  • CSET is a desktop software tool that guides asset owners and operators through a step-by-step process to evaluate industrial control system (ICS) and information technology (IT) network security practices.
  • Users can evaluate their own cybersecurity stance using many recognized government and industry standards and recommendations.

38

May 13, 2025

39 of 47

Ransomware Vulnerability Warning Pilot (RVWP)

A new effort to warn critical infrastructure entities that their systems have exposed vulnerabilities that may be exploited by ransomware threat actors.

  • Leverages existing authorities and technology to proactively identify information systems that contain security vulnerabilities commonly associated with ransomware attacks.

    • CISA’s Cyber Hygiene Vulnerability Scanning
    • Known threat vectors
    • Administrative Subpoena Authority
    • Homeland Security Act of 2002.

39

May 13, 2025

40 of 47

Pre-Ransomware Notification Program

  • Ransomware actors often take some time after gaining initial access to a target before encrypting or stealing information, a window of time that often lasts from hours to days (dwell time).

  • CISA’s Joint Cyber Defense Collaborative – receives tips from the cybersecurity research community, infrastructure providers, and cyber threat intelligence companies about potential early-stage ransomware activity.

  • Local CISA field forces receive notification from our JCDC and contact the affected entity.

May 13, 2025

41 of 47

Known Exploited Vulnerabilities Catalog (KEV)

May 13, 2025

42 of 47

Cybersecurity Training Resources

42

CISA is committed to providing the nation with access to cybersecurity training and workforce development efforts to develop a more resilient and capable cyber nation.

  • The National Initiative for Cybersecurity Careers and Studies (NICCS) website contains a searchable training catalog with over 6,000 cyber- related courses offered by nationwide cybersecurity educators
    • Interactive National Cybersecurity Workforce Framework
    • CISA Learning
    • Scholarships for Service and Centers for Academic Excellence
    • Cyber Competitions
    • Tools and resources for cyber managers
  • Incident Response Training though IMR Series
  • Industrial Control Systems

May 13, 2025

43 of 47

Our Nation’s Cyber Workforce Foundation

The National Cybersecurity Workforce Framework is a collection of definitions that describe types of cybersecurity work and skills requires to perform it. �

  • When used nationally, the definitions help establish universally applicable cybersecurity skills, training/development, and curricula
  • 7 Categories, 30+ Specialty Areas
  • Baselines knowledge, skills, and abilities & tasks

Operate & Maintain

Securely Provision

Analyze

Collect & Operate

Oversight &

Development

Protect &

Defend

Investigate

May 13, 2025

44 of 47

Key Takeaways

  1. Become familiar with the CISA webpage and subscribe to CISA advisories
  2. Engage with your local CISA region and stay connected with your advisors.
  3. Develop, train and exercise physical, cyber, emergency action and business continuity plans.
  4. Sign-up for CISA’s vulnerability scanning services and other resilience services
  5. Encourage lowering cyber incident reporting thresholds and report suspicious activity

23

May 13, 2025

45 of 47

  Sign up for CISA Communications

Includes information about upcoming trainings, events, and notifications about CISA publications.

Subscribe Here  (public.govdelivery.com/accounts/USDHSCISA/subscriber/new)

      • Enter your email address on the landing page.
      • Be sure to check the box for the “Region 4 Stakeholder Update” at the bottom of the subscriber preference page under the General tab. 

45

May 13, 2025

46 of 47

46

Andrew Balter

Protective Security Advisor

E: andrew.balter@mail.cisa.dhs.gov

C: 202.821.9034

Ryan K. Lewis

Cybersecurity Advisor

E: ryan.lewis@mail.cisa.dhs.gov 

C: 202.975.9453

CISARegion4@cisa.dhs.gov 

May 13, 2025

47 of 47

47

May 13, 2025