The increasing sophistication of cyberattacks demands that you devote precious time and resources to hone advanced capabilities to predict, identify, and respond to a broad range of threats.
Organizations that operate in critical infrastructure sectors share responsibility for sector-wide cybersecurity and effective cyber incident response. Presidential Policy Directive 41: United States Cyber Incident Coordination Policy (PPD-41) defines a framework for the federal government’s response to significant cyber incidents. This framework is dependent on coordination with the private sector and establishes the guiding principles that ensure coordinated incident response.
NUARI’s PPD-41 learning module provides your organization with the knowledge of coordinated incident response—including protocols for communication escalation and dissemination—that will enable you to understand your roles and responsibilities in the activities stipulated in PPD-41.
We live in the 21st Cyber Century. I began my career as an FBI Special Agent in the Golden Era of Cyber Crime during a lack of passwords, no defenses to denial of service, pirated software and relatively open networks. It was the Wild Wild West and one that could not fathom of the 21st Century data speeds, data volumes and computing power. Just as the terms and vernacular have evolved in the “western” computer investigations landscape since I began working cybercrime, in what sociologists would characterize as the Information Age, so has our public response in the form of executive orders, directives, commissions and plans.
As the Wild Wild West was starting to be tamed, there was Presidential Decision Directive (PPD) 63: Protecting America’s Critical Infrastructure. Fast forward to the 21st Century and we have the Presidential Policy Directive — United States Cyber Incident Coordination (aka PPD-41). This outlines the continuation of the United States Government’s maturity model by streamlining the incident coordination within its monolith of agencies as well as protecting the health and safety of the public through coordination with the overwhelming portion of today’s critical infrastructure owners in the private sector in the event of a “significant cyber incident…”
Scott Larson, former FBI Headquarters Chief of the Computer Investigations and Infrastructure Threat Assessment Program at the National Infrastructure Protection Center (“NIPC”)
Backed by Norwich University’s Center for Advanced Computing and Digital Forensics—designated a National Center of Excellence by Defense Cyber Crime—our training and curriculum services are designed to give you a valuable upper hand in a threat environment where every advantage counts.