Leadership Tabletop Exercise (LTTX) Cybersecurity Overview And Resource Guide 2018 LTTX 508

2018%20LTTX%20Cybersecurity%20Overview%20and%20Resource%20Guide_508

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 16

DownloadLeadership Tabletop Exercise (LTTX) Cybersecurity Overview And Resource Guide 2018 LTTX 508
Open PDF In BrowserView PDF
Leadership Tabletop Exercise
Cybersecurity Pilot Overview and Resource Guide

Leadership Tabletop Exercise (LTTX)
Cybersecurity Overview and
Resource Guide
April 2018

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide

TABLE OF CONTENTS
CONTENTS
Table of Contents .......................................................................................................................... 1
Introduction ................................................................................................................................... 2
BACKGROUND .............................................................................................................................. 2
LTTX Description ................................................................................................................... 2
Purpose & Organization of Report .......................................................................................... 2
PILOT OVERVIEW ......................................................................................................................... 3
Pilot Objectives........................................................................................................................ 3
Pilot Format ............................................................................................................................. 4
Pilot Participants ...................................................................................................................... 4
Pilot Results ............................................................................................................................. 5
Resource Guide ............................................................................................................................. 7
CYBER INFRASTRUCTURE RESOURCES ......................................................................................... 7
Critical Physical Infrastructure Tools & Assessments ............................................................ 7
CYBERSECURITY RESOURCES ...................................................................................................... 7
Cybersecurity Tools & Assessments ....................................................................................... 7
Cybersecurity Resources & Awareness ................................................................................... 9
Information Sharing & Threat Analysis ................................................................................ 10
GENERAL RESILIENCE RESOURCES ............................................................................................ 10
Emergency Preparedness Resources ..................................................................................... 10
Exercise & Training Resources ............................................................................................. 11
Federal Components & Offices ............................................................................................. 12
Resilience Planning Resources .............................................................................................. 13
Appendix A: Acronyms .............................................................................................................. 15

Page 1

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide

INTRODUCTION
OVERVIEW
LTTX Description
Sponsored by the Department of Homeland Security’s (DHS) Office of Academic Engagement and the
Federal Emergency Management Agency’s (FEMA) National Exercise Program (NEP), the Leadership
Tabletop Exercise (LTTX) is a half-day event for campus leadership designed to highlight their role in
managing institutional risk during emergency incidents. These executive events bring together campus
leadership, local, state, and federal officials, and industry subject matter experts to simulate emergencies
through tailored case studies on a range of threats.

Purpose & Organization of Report
This Leadership Tabletop Exercise Cybersecurity Overview and Resource Guide provides members
of the academic community with a summary of the format and structure of the pilot LTTX event, hosted by
the North Dakota University System, as a model for initiating critical conversations with campus leadership
on their roles in preparedness for, response to, and recovery from campus emergencies. To accompany this
overview, the Resource Guide includes a list of useful resources for promoting cybersecurity preparedness.
This report is intended for two purposes:
1) To provide an overview of the pilot LTTX to discuss the event as a model for leadership-focused
events; and
2) Provide a list of key Federal resources within the focus area.
A description of the pilot event appears in the Event Overview section. While the focus of the pilot event
was on cybersecurity, the LTTX is built to be adaptable to any threats or hazards that a host institution or
system would like to explore.

BACKGROUND
The Campus Resilience Program (CR Program), launched by DHS in 2013, was created to enhance the
ability of IHEs to anticipate the unforeseen, withstand disruptions, manage crises, and seize opportunity
amidst increasingly turbulent times. The program improves the resilience of IHEs by facilitating
collaboration with other institutions and academic professionals interested in resilience; drawing on existing
resources from Federal, state, tribal and territorial stakeholders; and providing access to tools and resources
that strengthen their campuses through innovative resilience-building practices. The CR Program offers a
number of other resources, including:
•

The Campus Resilience Program Tabletop Exercise Series (TTX Series): The TTX Series is a
collection of tailored events, each with unique objectives and outcomes, designed for the higher
education community. Each event in the series challenges participants with multi-faceted threat-based
scenarios that test and strengthen their institution’s preparedness, response, and recovery capabilities.
The other events within the TTX Series are:
o

The National Seminar and Tabletop Exercise Series for Institutions of Higher Education
(NTTX): The NTTX is an annual event to test and promote campus resilience and emergency
preparedness. The NTTX brings together senior higher education leaders, as well as Federal,
state and local representatives from departments and agencies that support campus resilience
to participate in seminars and work through a designed emergency scenario. For more
information on the NTTX, including the 2018 event, visit: https://www.dhs.gov/nttx.

Page 2

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
o

Regional Tabletop Exercises (RTTX): The RTTXs are one-day events that include a tabletop
exercise designed to address specific regional threats. The regional events are hosted multiple
times per year in locations across the U.S. For more information on the RTTX, including past
and upcoming events in 2018, visit: https://www.dhs.gov/rttx.

•

The CR Program Resource Library: The CR Program Resource Library organizes resources
according to threat or hazard, and then further categorizes each resource according to its relevant
mission area (Preparedness, Response, Recovery), as outlined in the Federal Emergency Management
Agency’s (FEMA) National Preparedness Goal. The resources included reflect the collaborative efforts
of many program and partner organizations, and represent a variety of Federal, state, local, privatesector, emergency management, and academic association entities. For more information and to access
the library, visit https://www.dhs.gov/campus-resilience-program-resource-library.

•

General information on the CR Program, including upcoming events, available resources, and
opportunities for engagement, is accessible at: https://www.dhs.gov/academicresilience.

OAE invites the higher education community and other stakeholders to receive updates on campus
resilience and other issues in academic engagement at DHS by signing up for our email announcements.
To subscribe, visit the Academic Engagement GovDelivery page and submit your email address.

EVENT OVERVIEW
The 2018 North Dakota University System Leadership Tabletop Exercise took place on February 7,
2018, and was hosted by the National Energy Center of Excellence at Bismarck State College in Bismarck,
North Dakota. The event brought together the presidents and senior level staff of 11 colleges and
universities from across the state of North Dakota as well as five tribal colleges from the state. More than
75 individuals representing the emergency management, cybersecurity, tribal colleges and operational
leadership of each institution in the System attended. Participants also included representatives from
federal, state, and local departments and agencies that support campus resilience. The event focused on
cybersecurity threats to higher education.

Pilot Objectives
This four-hour event focused on cybersecurity resilience and provided an opportunity for all participants to
receive and share information technology (IT)-related information while also identifying IT risks,
vulnerabilities, and best practices. Table 1: 2018 LTTX Objectives and Core Capabilities below outlines
the overall objectives for the event. Each objective is linked to core capabilities, which are distinct critical
elements necessary to achieve the associated objective and mission area.
Table 1: 2018 LTTX Objectives and Core Capabilities
Exercise Objective

Core Capability

1. Advance the understanding of the role of
institution leadership in campus resilience









Page 3

Public Information and Warning
Cybersecurity
Intelligence and Information Sharing
Community Resilience
Long-term Vulnerability Reduction
Environmental Response/Health and Safety
Economic Recovery

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
Exercise Objective
2. Provide actionable approaches for institutional
leadership to direct and bolster the resilience of
their campus communities








3. Identify campus resilience vulnerabilities
requiring attention from institutional leadership






Core Capability
Public Information and Warning
Cybersecurity
Intelligence and Information Sharing
Community Resilience
Long-term Vulnerability Reduction
Cybersecurity
Intelligence and Information Sharing
Community Resilience
Long-term Vulnerability Reduction

To achieve these objectives, the LTTX consisted of the following three (3) components:


An unclassified Cyber Threat Brief, provided by the state Homeland Security Advisor, with
higher education-specific context provided by an association subject matter expert from the
Western Interstate Commission for Higher Education (WICHE) Cooperative for Educational
Technologies (WCET), highlighting the current cyber threat landscape facing higher education in
North Dakota;



A Tabletop Exercise (TTX), facilitated by FEMA/NED, that focused on preparedness, response,
and recovery efforts for two different types of cyber incidents; and



An Options for Consideration Briefing, provided by the DHS/National Protection and Programs
Directorate (NPPD) Cyber Security Advisor and Protective Security Advisor, summarized
cybersecurity programs, offerings, and assessment opportunities available to the higher education
community.

Pilot Format
The exercise portion of the event featured a two-hour TTX that examined two different cyber incidents
based on real-world case studies. The TTX consisted of the following activities:


Opening Discussion: Introduced the exercise topic and set expectations across each institution and
across the university system



Module 1: Featured discussions on a cyber attack on university HVAC systems scenario



Module 2: Featured discussions on a ransomware attack on IT systems scenario

During the Opening Discussion, participants were presented with a set of discussion questions to initiate
conversations on campus resilience and cybersecurity. Modules 1 and 2 that followed reviewed the scenario
and engaged participants in a facilitated discussion centered on predetermined questions. While participants
were seated by institution, they were encouraged to engage other IHEs and organizations in discussions.

Pilot Participants
Convened by the NDUS Chancellor, the event brought together the presidents and senior level staff of 11
colleges and universities from across the state of North Dakota as well as five tribal colleges from the state.
Nearly 100 individuals representing the emergency management, cybersecurity, tribal colleges and
operational leadership of each institution in the System attended. Participants also included representatives
from federal, state, and local departments and agencies that support campus resilience. The event focused
on cybersecurity threats to higher education. Participants included:

Page 4

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
•

Players – Players have an active role in discussing their response and recovery activities during
the exercise. Delegations of players respond to the situation presented based on expert knowledge
of response procedures, as well as how they would perform their functions on their respective
campus or organization. For the pilot LTTX, Players included:
o

Presidents: The presidents of each campus were the ‘touchstone’ for the event, with other
players being responsible for reporting in to these individuals on how they would respond
to the institutional risks from leadership’s perspective during a cyber crisis.

o

Campus Liaisons: Prior to the event, each campus president appointed one Campus
Liaison to serve as the key point-of-contact with the Department. This individual’s role
included responding to pre- and post-event surveys from the DHS on the institution’s
resilience-building efforts as well as serving as the proxy for the president, requiring both
a knowledge of cybersecurity on campus and direct access to the president. As such, these
Campus Liaisons were typically the Chief Information Officers from each campus.

o

Senior Staff / Subject Matter Experts (SMEs): In addition to the principals and liaisons
from each of the campuses, key institution SMEs were essential in building the institution’s
response to the scenario. These individuals typically represented the leadership from
information technology and security, risk and emergency management, student and
academic affairs, and facilities / campus operations from each campus.

•

Event and Support Staff – The event and support staff guided exercise play and were responsible
for ensuring that participant discussions remained focused on the event objectives. They also
provided additional information and resolved questions as required, and performed administrative
and logistical support tasks during the exercise. (e.g., registration, catering, etc.).

•

Observers – Observers visited and viewed selected segments of the exercise but were not actively
asked to respond to the scenario in reference to their organization. During this LTTX, observers
interacted with exercise players to support the development of player responses to the situation by
asking relevant questions or providing subject-matter expertise.

Pilot Results
As a result of the event, the System received a detailed report with a summary of the major findings,
takeaways, and discussion points from the event, as well as resources linked to the specific challenges
identified during the event. The format of the event-specific Summary of Conclusions is:
Examples of key findings:
•

Example #1: Public Communication and Engagement: Institutions identified that they have
existing plans, procedures, and mechanisms in place for communicating with students, faculty, and
staff during emergencies. To improve the efficiency of these communications, participants noted
the benefits of developing more formal protocols and agreements with local news/media outlets as
well as establishing backup communication channels.

•

Example #2: External Stakeholder Coordination and Engagement: To enhance existing
emergency plans, policies, and procedures, institutions would benefit from increased coordination
with other Federal, regional, state, local, private-sector, academic, and non-governmental
organizations. These external stakeholders can bring to bear useful guidance and resources to
support preparedness, response, and recovery efforts for both cyber and natural incidents.

Page 5

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
•

Example #3: Cyber Partnerships: In addition to improving overall security preparedness,
institutions identified the need to establish teaming or partnership agreements with both
municipalities and third-party vendors dedicated to guiding response actions in the event of a cyberattack on campus systems.

These key findings are related to the self-evaluation and discussion during the exercise itself, and thus, are
different for every participant. Actual key findings from each event are considered sensitive and are
only released to the participants from the event itself and not released to the public or broader higher
education community. The Department does not formally track or regulate these findings, but rather, looks
to deliver relevant resources and support to participants in the event based on those conversations. As stated
previously, all discussions and any information captured in the Summary of Conclusions is not for
attribution and does not identify any specific vulnerabilities at an institution.

Page 6

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide

RESOURCE GUIDE
This section provides a list of resources for preparedness, response, and recovery efforts related to a cyber
incident, including information security, enterprise risk management, and cyber-physical infrastructure
protection. Any additional requests for information should be directed to DHS/OAE at:
AcademicEngagement@hq.dhs.gov.

CYBER INFRASTRUCTURE RESOURCES
Critical Physical Infrastructure Tools & Assessments
Industrial Control Systems Cyber Emergency Response Team Web Page. The Industrial Control
Systems Cyber Emergency Response Team (ICS-CERT) works to reduce risks within and across all critical
infrastructure sectors by partnering with law enforcement agencies and the intelligence community and
coordinating efforts among Federal, state, local, and tribal governments and control systems owners,
operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector
Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and
mitigation measures. For more information, visit: https://ics-cert.us-cert.gov/.
Infrastructure Protection Gateway – Rapid Survey Tool. The Rapid Survey Tool (RST) is a nonregulatory data collection capability that examines the most critical aspects of a facility’s security and
resilience posture with efficient, baseline questions. It is a shorter survey that allows assessors to gather the
general status of a facility before deciding whether an in-depth survey is required. The Web-based Rapid
Survey Tool, available through the Infrastructure Protection Gateway (IP Gateway), captures a facility’s
physical and operational security and resilience data. The data is then analyzed to determine the facility’s
relative security and resilience in comparison to the national average for similar facilities. The resulting
analysis is used to develop a Rapid Survey Information Center that equips owners and operators with
knowledge to detect and prevent physical, cyber, and natural threats and respond to, recover from, and
remain resilient against all hazards. For more information, contact the IP Gateway Help Desk at
IPGateway@hq.dhs.gov or 1-866-844-8163.
Protected Critical Infrastructure Information Program. The Protected Critical Infrastructure
Information (PCII) program protects infrastructure information voluntarily shared with DHS to be used for
homeland security purposes. The PCII program was created by Congress in the Critical Infrastructure
Information Act of 2002, ensuring that PCII in the government’s hands is protected from disclosure. PCII
is used by DHS and other government homeland security professionals to identify vulnerabilities,
mitigation strategies, and protective measures. DHS works closely with critical infrastructure asset owners
and operators to provide a wide array of services and products to help them protect the Nation’s critical
infrastructure, and PCII is a key component in these efforts. PCII also allows DHS to collect and protect
sensitive security critical infrastructure information, cyber-attack, risk, and vulnerability information to
protect the nation’s infrastructure. PCII protections allow access to a vast amount of critical information
necessary to detect, deter, and defend against threats to the nation. For more information, contact the IP
Gateway Help Desk at IPGateway@hq.dhs.gov or 1-866-844-8163.

CYBERSECURITY RESOURCES
Cybersecurity Tools & Assessments
Cyber Infrastructure Survey. The Cyber Infrastructure Survey (CIS) is a no-cost, voluntary survey that
evaluates the effectiveness of organizational security controls, cybersecurity preparedness, and overall
resilience. CIS provides an assessment of the organization’s cybersecurity practices in place for a critical
service. For more information, or to schedule a CIS, contact cyberadvisor@hq.dhs.gov.

Page 7

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
Cyber Resilience Review (CRR). The CRR is a no-cost, voluntary, non-technical assessment to evaluate
an organization’s operational resilience and cybersecurity practices. The CRR may be conducted as a selfassessment or as an on-site assessment facilitated by DHS cybersecurity professionals. The review assesses
enterprise programs and practices across a range of ten domains including risk management, incident
management, service continuity and others. For more information, visit: http://www.uscert.gov/ccubedvp/self-service-crr.
Cybersecurity Evaluation Tool (CSET®). The Cyber Security Evaluation Tool (CSET®) is a DHS
product that assists organizations in protecting their key national cyber assets. It was developed by
cybersecurity experts under the direction of the DHS Industrial Control Systems Cyber Emergency
Response Team. The tool provides users with a systematic and repeatable approach to assessing the security
posture of their cyber systems and networks. It includes both high-level and detailed questions related to
all industrial control and IT systems. For more information, visit: http://ics-cert.us-cert.gov/assessments.
DHS Cybersecurity Publications. A ready-reference collection of documents published by DHS
cybersecurity programs that can help private and public organizations with everything from setting up
computers to understanding the nuances of emerging threats. For more information, visit: https://www.uscert.gov/security-publications.
External Dependencies Management Assessment. The External Dependencies Management (EDM)
assessment is a no-cost, voluntary, interview-based assessment to evaluate an organization’s management
of their dependencies. Through the EDM assessment, organizations can learn how to manage risks arising
from external dependencies within the information and communication technology (ICT) supply chain. The
ICT supply chain consists of outside parties that operate, provide, or support ICT. For more information,
or to schedule an EDM Assessment, contact cyberadvisor@hq.dhs.gov.
FEMA Cybersecurity Preparedness. Cybersecurity involves preventing, detecting, and responding to
cyber incidents that can have wide ranging effects on the individual, organizations, the community and at
the national level. For more information, visit: https://www.ready.gov/cybersecurity.
Department of Education / FFIEC Cybersecurity Assessment Tool. In light of the increasing volume
and sophistication of cyber threats, the Federal Financial Institutions Examination Council1 (FFIEC)
developed the Cybersecurity Assessment Tool (Assessment), on behalf of its members, to help institutions
identify their risks and determine their cybersecurity maturity. The content of the assessment is consistent
with the principles of the FFIEC Information Technology Examination Handbook (IT Handbook) and the
National Institute of Standards and Technology (NIST) Cybersecurity Framework, as well as industry
accepted cybersecurity practices. The Assessment provides institutions with a repeatable and measurable
process to inform management of their institution’s risks and cybersecurity preparedness. For more
information, visit: https://ifap.ed.gov/eannouncements/attachments/FFIEC_CAT_form.pdf.
Higher Education Cloud Vendor Assessment Tool. The Higher Education Cloud Vendor Assessment
Tool attempts to generalize higher education information security and data protection questions and issues
regarding cloud services for consistency and ease of use. The matrix: 1) Helps higher education institutions
ensure that cloud services are appropriately assessed for security and privacy needs, including some that
are unique to higher education; 2) Allows a consistent, easily-adopted methodology for campuses wishing
to reduce costs through cloud services without increasing risks; and 3) Reduces the burden that cloud service
providers face in responding to requests for security assessments from higher education institutions. For
more information, visit: https://library.educause.edu/resources/2016/10/higher-education-cloud-vendorassessment-tool.
Mutually Agreed Norms for Routing Security (MANRS). The Routing Resilience Manifesto initiative,
underpinned by the “Mutually Agreed Norms for Routing Security (MANRS)” document that includes a
set of actionable recommendations aimed at supporting this goal. For more information, visit:
https://www.routingmanifesto.org/.

Page 8

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
Phishing Campaign Assessment. The Phishing Campaign Assessment (PCA) is a no-cost, six-week
engagement offered to Federal, State, Local, Tribal and Territorial (SLTT) Governments, as well as Critical
Infrastructure and Private Sector Companies, that evaluates an organization’s susceptibility and reaction to
phishing emails. The results of a PCA are meant to provide guidance, measure effectiveness, and justify
resources needed to defend against spear-phishing and increase user training and awareness. For more
information, contact ncciccustomerservice@hq.dhs.gov.
Risk and Vulnerability Assessment. A Risk and Vulnerability Assessment (RVA) is a no-cost offering
that combines national threat and vulnerability information with data collected and discovered through
onsite assessment activities to provide customers with actionable remediation recommendations prioritized
by risk. Engagements are designed to determine whether and by what methods an adversary can defeat
network security controls. Components of the assessment include scenario-based network penetration
testing, web application testing, social engineering testing, wireless testing, configuration reviews of servers
and databases, and evaluation of an organizations detection and response capabilities. For more
information, or to schedule an RVA, contact ncciccustomerservice@hq.dhs.gov.
Validated Architecture Design Review. The Validated Architecture Design Review (VADR) is a
voluntary, no-cost assessment based on standards, guidelines, and best practices. The assessment
encompasses architecture and design review, system configuration, log file review, and sophisticated
analysis of network traffic to develop a detailed representation of the communications, flows, and
relationships between devices and, most importantly, to identify anomalous (and potentially suspicious)
communication flows. For more information, contact ncciccustomerservice@hq.dhs.gov.
Vulnerability Scanning. DHS offers Vulnerability scanning (formerly known as Cyber Hygiene scanning)
of i-accessible systems for known vulnerabilities on a continual basis as a no-cost service. As potential
issues are identified, DHS notifies impacted customers so they may proactively mitigate risks to their
systems prior to exploitation. The service incentivizes modern security practices and enables participants
to reduce their exposure to exploitable vulnerabilities, which decreases stakeholder risk while increasing
the nation’s overall resiliency. For more information, contact ncciccustomerservice@hq.dhs.gov.

Cybersecurity Resources & Awareness
Critical Infrastructure Cyber Community (C3) Voluntary Program. As part of Executive Order (EO)
13636, the Department of Homeland Security (DHS) launched the Critical Infrastructure Cyber Community
or C³ (pronounced “C Cubed”) Voluntary Program to assist the enhancement of critical infrastructure
cybersecurity and to encourage the adoption of the National Institute of Standards and Technology’s (NIST)
Cybersecurity Framework (the Framework), released in February 2014. The C³ Voluntary Program was
created to help improve the resiliency of critical infrastructure’s cybersecurity systems by supporting and
promoting the use of the Framework. The C³ Voluntary Program helps sectors and organizations that want
to use the Framework by connecting them to existing cyber risk management capabilities provided by DHS,
other U.S. Government organizations, and the private sector. For more information, visit: https://www.uscert.gov/ccubedvp/academia.
Information Products: National Cyber Awareness System. NCCIC offers no-cost, subscription-based
information products to stakeholders through the www.us-cert.gov and www.ics-cert.gov websites. NCCIC
designed these products — part of the National Cyber Awareness System (NCAS) — to improve situational
awareness among technical and non-technical audiences by providing timely information about
cybersecurity threats and issues and general security topics. Products include technical alerts, control
systems advisories and reports, weekly vulnerability bulletins, and tips on cyber hygiene best practices.
Subscribers can select to be notified when products of their choosing are published. For more information
on available products, visit https://www.us-cert.gov/ncas and https://ics-cert.us-cert.gov/, and to subscribe
to select products, visit https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new.

Page 9

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
National Initiative for Cybersecurity Careers and Studies. DHS developed the National Initiative for
Cybersecurity Careers and Studies (NICCS) in close partnership with NIST, the Office of the Director of
National Intelligence, the Department of Defense, and other government agencies, to leverage efforts of
government, industry, and academia to provide a comprehensive, single resource to address the nation’s
cybersecurity knowledge needs. NICCS is an online resource for cybersecurity training that connects
government employees, students, educators, and industry with cybersecurity training providers throughout
the nation. For more information, visit https://niccs.us-cert.gov/ or contact NICCS@hq.dhs.gov.
Stay Safe Online. A community-focused and partnership-based cybersecurity resource, with security
practices, tips, and resources ready-made for use and implementation by individual users, business and
industry, and academia. Sponsored by the National Cyber Security Alliance and promoted by DHS as a
one-stop informational source for cybersecurity. For more information, visit: https://staysafeonline.org/.
Stop.Think.Connect. Academic Alliance. Opportunities with technology and the internet appear to have
no limit. Academia is often at the forefront of expanding our ever-evolving cyber universe. As new ground
is forged, and benefits of a digitally connected world are enhanced, academia has an opportunity to lead by
example in ensuring that online practices of students, faculty, staff, alumni, and the community are as secure
as possible. The Stop.Think.Connect. Academic Alliance is a nationwide network of nonprofit colleges and
universities committed to promoting safe online practices. For more information, visit:
http://www.dhs.gov/stopthinkconnect-academic-alliance.

Information Sharing & Threat Analysis
Automated Indicator Sharing. Automated Indicator Sharing (AIS) enables the exchange of cyber threat
indicators between the federal government, SLTT governments, and the private sector at machine speed.
Threat indicators are pieces of information like malicious IP addresses or the sender’s address of a phishing
email. AIS is part of a DHS effort to create a cyber ecosystem where as soon as a stakeholder observes an
attempted compromise, the cyber threat indicator of compromise (IOC) is shared in real time with all
partners, protecting everyone from that particular threat. For more information, or to sign up to participate
in AIS, visit https://www.us-cert.gov/ais.
Homeland Security Information Network. The Homeland Security Information Network (HSIN) is a
trusted network for homeland security mission operations to share sensitive but unclassified information.
Federal, SLTT, and private sector partners can use HSIN to manage operations, analyze data, send alerts
and notices, and share the information they need to perform their duties. NCCIC-developed products —
such as TLP: GREEN and TLP: AMBER indicator bulletins and analysis reports — are available to
registered stakeholders in authorized communities of interest.
For information on applying for a HSIN account, contact HSIN at 866-430-0162 or
HSIN.HelpDesk@hq.dhs.gov. NCCIC TLP:WHITE products are available through www.us-cert.gov and
www.ics-cert.gov.
Malware Analysis. The Advanced Malware Analysis Center provides 24/7 dynamic analysis of malicious
code. Stakeholders submit samples via an online website and receive a technical document outlining
analysis results. Experts detail recommendations for malware removal and recovery activities. This service
can be performed in conjunction with incident response services if required. To submit malware for
analysis, visit https://www.malware.us-cert.gov. For further questions or requests, contact
ncciccustomerservice@hq.dhs.gov.

GENERAL RESILIENCE RESOURCES
Emergency Preparedness Resources

Page 10

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
Community Emergency Response Team (CERT) Programs. The CERT programs focus on disaster
preparedness and training in basic disaster response skills such as fire safety, light search and rescue, team
organization, and disaster medical operations. Using the training learned in the classroom and during
exercises, CERT members can assist others in their neighborhood or workplace following an event when
professional responders are not immediately available to help. CERT members also are encouraged to
support emergency response agencies by taking a more active role in emergency preparedness projects in
their communities. For more information, visit: https://www.fema.gov/community-emergency-responseteams.
Continuity Resource Toolkit. The Continuity Resource Toolkit provides examples, tools, and templates
for establishing and implementing continuity strategies based on the FEMA Continuity Guidance Circular
(CGC). To view the Toolkit, visit: www.fema.gov/continuity-resource-toolkit. For more information on
the FEMA Continuity Guidance Circular, visit: CGC: www.fema.gov/continuity-guidance-circular.
FEMA Monthly Continuity Webinar Series. The series covers a variety of continuity topics from a
diverse cadre of speakers. For more information, visit: http://www.fema.gov/continuity-webinar-series/.
Incident Command System (ICS) Resource Center. The FEMA ICS Resource Center website has a
multitude of ICS reference documents including ICS Forms, checklists, training course information and
links
to
other
related
resources.
For
more
information,
visit:
https://training.fema.gov/emiweb/is/icsresource/.

Exercise & Training Resources
Federal Virtual Training Environment. The Federal Virtual Training Environment (FedVTE) is a free,
online, on-demand cybersecurity training system managed by DHS that is available to federal and SLTT
government personnel, veterans, and federal government contractors. It contains more than 800 hours of
training on topics such as ethical hacking, surveillance, risk management, and malware analysis. The
department’s efforts focus on building a strong cyber workforce that can keep up with evolving technology
and increasing cybersecurity risks. DHS is coordinating its outreach about the program through the MultiState Information Sharing and Analysis Center (MS-ISAC), the focal point for cyber threat prevention,
protection, response, and recovery for the nation’s SLTT governments. For more information, visit
https://niccs.us-cert.gov/training/federal-virtual-training-environment-fedvte. To register for an account
and for more information on available courses, visit https://fedvte.usalearning.gov.
G0367 Emergency Planning for Campus Executives. This 2-hour overview of emergency planning
serves as a briefing for executives of institutions of higher education. It provides insights into multi-hazard
emergency planning and their role in protecting lives, property, and operations. For more information, visit:
https://training.fema.gov/hiedu/aemrc/eplanning/g367.aspx.
IS-100.HE Introduction to the Incident Command System for Higher Education. This FEMA training
course introduces the Incident Command System (ICS) and provides the foundation for higher level ICS
training. This course describes the history, features and principles, and organizational structure of ICS. It
also explains the relationship between ICS and the National Incident Management System (NIMS). This
course uses the same objectives and content as other ICS courses with higher education examples and
exercises. For more information, visit: https://training.fema.gov/is/courseoverview.aspx?code=IS-100.HE.
L0363 Multi-Hazard Emergency Management for Higher Education. This FEMA training course is
designed to provide institutions of higher education with knowledge and planning strategies to better protect
lives, property, and operations more effectively and efficiently within the context of comprehensive
emergency
management.
For
more
information,
visit:
https://training.fema.gov/hiedu/aemrc/eplanning/l363.aspx.
National Cyber Exercise & Planning Program (NCEPP). The National Cybersecurity and
Communications Integration Center’s (NCCIC) National Cyber Exercise and Planning Program (NCEPP)

Page 11

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
develops and supports integrated cyber-focused exercises and guidance for federal departments and
agencies, state, local, tribal, and territorial (SLTT) governments, critical infrastructure sectors, international
partners, and special events. NCEPP offers end-to-end cyber exercise planning and conduct services at no
cost on an as-needed and as-available basis. For more information, email cep@hq.dhs.gov.
National Tabletop Exercise for Institutions of Higher Education Series. Sponsored by FEMA and OAE,
this series of national tabletop exercises was designed in collaboration with academia and interagency
planners to test and enhance campus resilience. The tabletop exercise promotes the all-hazard Guide for
Developing High-Quality Emergency Operations Plans for Institutions of Higher Education and provides
insight into common planning, preparedness, and resilience best practices and challenges of the academic
community when faced with a disruptive campus event. For more information, visit:
http://www.dhs.gov/nttx.
Student Tools for Emergency Planning (STEP). The STEP Program was designed by teachers and is
sponsored by a state’s Emergency Management Agency and FEMA. The program provides students and
their families with concrete strategies to prepare for and deal with various emergencies. For more
information, visit: http://www.fema.gov/student-tools-emergency-planning-step.
Tabletop and Emergency Planning Exercises. FEMA offers free, downloadable tabletop and emergency
planning exercises and presentations for the private sector, including academic institutions. The exercises
are designed to help organizations such as IHEs test emergency situations, such as a natural or man-made
disaster, evaluate the ability to coordinate, and test readiness to respond. For more information, visit:
http://www.fema.gov/emergency-planning-exercises.

Federal Components & Offices
Cyber Security Advisors (CSAs). CSAs are regional located DHS personnel who direct coordination,
outreach, and regional support to protect cyber components essential to the sustainability, preparedness,
and protection of the Nation’s critical infrastructure and state, local, tribal, and territorial governments.
CSAs offer immediate and sustained assistance to prepare and protect state, local, tribal, and territorial
governments and private entities. For more information, visit: http://www.us-cert.gov/ccubedvp/gettingstarted-academia.
Department of Education, Response and Emergency Management for Schools (REMS) Technical
Assistance Center. The REMS TA Center, administered by the U.S. Department of Education, Office of
Safe and Healthy Students (OSHS), supports public and private schools, school districts, and institutions of
higher education, with their community partners, in building their preparedness capacity (including
mitigation, prevention, protection, response and recovery efforts) and creating comprehensive emergency
operations plans that address a variety of security, safety, and emergency management issues. For more
information, visit: https://rems.ed.gov/.
DHS Campus Resilience Program. The DHS Campus Resilience Program was created upon a
recommendation from the Homeland Security Academic Advisory Council (HSAAC). DHS is currently in
the developmental stages of the Campus Resilience Program. This initiative builds upon best practices,
lessons learned and resources already developed to make U.S. colleges and universities more resilient. For
more information on the DHS Campus Resilience Program, visit https://www.dhs.gov/campus-resilience
or contact the Office of Academic Engagement at AcademicEngagement@hq.dhs.gov.
DHS Office of Emergency Communications. Established in 2007 in response to communications
challenges faced during the attacks on September 11, 2001 and Hurricane Katrina, the Department of
Homeland Security (DHS) Office of Emergency Communications (OEC) supports and promotes
communications used by emergency responders and government officials to keep America safe, secure, and
resilient. OEC provides training, coordination, tools, and guidance to help its federal, state, local, tribal,
territorial and industry partners develop their emergency communications capabilities. OEC’s programs

Page 12

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
and services coordinate emergency communications planning, preparation and evaluation, to ensure safer,
better-prepared communities nationwide. For more information, visit: https://www.dhs.gov/officeemergency-communications.
FEMA Emergency Management Institute (EMI) Independent Study Program. Virtual training on a
multitude of emergency preparedness and continuity resilience strategies is available through the FEMA,
EMI, Independent Study Program. For more information and a list of courses, visit:
http://training.fema.gov/IS/.
FEMA National Continuity Programs (NCP) Office. FEMA, NCP is an element of the FEMA
Administrator’s Office which supports the continuity planning and preparedness efforts of both government
and non-government stakeholders in order to sustain the continuous performance of National Essential
Functions under all conditions. For more information, visit: http://www.fema.gov/continuity-operations/.
National Center of Academic Excellence in Cyber Defense. The National Security Agency (NSA) and
DHS jointly sponsor the National Centers of Academic Excellence in Cyber Defense (CAE-CD) program.
The goal of the program is to reduce vulnerability in our national information infrastructure by promoting
higher education and research in cyber defense and producing professionals with cyber defense expertise
for the nation. For more information, visit: https://www.nsa.gov/resources/educators/centers-academicexcellence/cyber-defense/.
National Cybersecurity & Communications Integration Center (NCCIC). The NCCIC is a 24x7 cyber
situational awareness, incident response, and management center that is a national nexus of cyber and
communications integration for the Federal Government intelligence community, and law enforcement. For
more information, visit: https://www.dhs.gov/about-national-cybersecurity-communications-integrationcenter.
Protective Security Advisor (PSA) Program. DHS provides local critical infrastructure protection
support and guidance for academic institutions through the PSA Program. PSAs serve as local DHS
representatives for security officers at schools and IHEs, and coordinate requests for training and grants.
PSAs also conduct specialized security assessments of school facilities that assist schools in identifying
potential security vulnerabilities and risks. For more information, visit: http://www.dhs.gov/protectivesecurity-advisors.
Science and Technology Directorate’s (S&T) First Responder Communities of Practice. The S&T
First Responder Communities of Practice is a professional networking, collaboration, and communication
platform created by DHS’s S&T to support improved collaboration and information sharing amongst the
nation’s First Responders and other federal, state / local / tribal / territorial governments and private sector
partners supporting homeland security efforts. This vetted community of members focuses on emergency
preparedness, response, recovery and other homeland security issues. For more information, visit:
https://communities.firstresponder.gov/web/guest;jsessionid=D50CF79D14F5037D431C59C039D56172.
w4.
United States Computer Emergency Readiness Team (US-CERT). US-CERT provides publications,
alerts and tips, and resources about cybersecurity and cyber threats. For more information, visit:
http://www.us-cert.gov/.

Resilience Planning Resources
Academia and Resilience Web Page. FEMA’s Academia and Resilience web page provides tools,
resources, program guides, and training information for campus emergency managers, faculty, and students.
For more information, visit: http://www.fema.gov/academia-resilience.
Building A Disaster-Resistant University. Building A Disaster-Resistant University is a how-to guide and
distillation of the experiences of six universities and colleges that have been working to become disaster-

Page 13

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide
resistant. The guide provides basic information designed for institutions just getting started, as well as ideas,
suggestions, and practical experiences for institutions that have already begun to take steps to becoming
more
disaster-resistant.
For
more
information,
visit:
http://www.fema.gov/medialibrary/assets/documents/2288.
Guide for Developing High-Quality Emergency Operations Plans for Institutions of Higher
Education. This guide provides guidance to IHEs on best practices for taking preventative and protective
measures to stop an emergency from occurring or reduce the impact of an incident. The guide aligns and
builds upon years of emergency planning work by the Federal Government and is a joint product of DHS,
the DOJ, the DOE, and the Department of Health and Human Services (HHS). IHEs can use the guide to
create and/or revise existing emergency operations plans. For more information, visit:
http://www.fema.gov/media-library-data/20130726-1922-25045-3638/rems_ihe_guide.pdf.

Page 14

Leadership Tabletop Exercise
Cybersecurity Overview and Resource Guide

APPENDIX A: ACRONYMS
Acronyms
CR Program

Campus Resilience Program

DHS

Department of Homeland Security

ED

Department of Education

FEMA

Federal Emergency Management Agency

HVAC

Heating, Ventilation, and Air Conditioning

IHE

Institution of Higher Education

IT

Information Technology

LTTX

Leadership Tabletop Exercise

NDSU

North Dakota State University

NDUS

North Dakota University System

NED

National Exercise Division

NPPD

National Protection and Programs Directorate

OAE

Office of Academic Engagement

TTX

Tabletop Exercise

UND

University of North Dakota

WCET

WICHE Cooperative for Educational Technologies

WICHE

Western Interstate Commission on Higher Education

Page 15



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
CG Contract Customer            : 
CG Contract Name                : 
CG Contract Number              : 
CG Contract Prime               : 
CG Contract Sub                 : 
Comments                        : 
Content Type Id                 : 0x010100F7C78A18AA5C1C459B5E0DF3783052B4
Create Date                     : 2018:04:05 15:18:50-04:00
Keywords                        : "Exercises, NEP, Adaptation, Resilience"
Modify Date                     : 2018:04:05 15:29:24-04:00
Obsidian Created                : Nick Matthews
Obsidian Modified               : Nick Matthews
Source Modified                 : D:20180405191736
Dlc Doc Id Item Guid            : 9ca85c9b-5f43-447b-84d1-33e6279136ea
A1e 27986701e 47dda 991f 489fc 6385df: 
F6bb 934ddfce 41b 0bcf 5b 2ac 9ca 7be 15: 
Ob 7115503d 3248d 88d 0a 9bb 6d 77c 332e: 
Language                        : EN-US
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.6-c015 84.159810, 2016/09/10-02:41:30
Metadata Date                   : 2018:04:05 15:29:24-04:00
Creator Tool                    : Acrobat PDFMaker 18 for Word
Document ID                     : uuid:4e39a589-b831-4969-9812-ce52064b82d5
Instance ID                     : uuid:01294035-6dca-4225-968d-3fefeaab2595
Format                          : application/pdf
Title                           : Leadership Tabletop Exercise (LTTX) Cybersecurity Overview and Resource Guide
Description                     : 
Creator                         : 
Subject                         : Exercises, NEP, Adaptation, Resilience
Producer                        : Adobe PDF Library 15.0
Tag dlc Doc Id Item Guid        : 9ca85c9b-5f43-447b-84d1-33e6279136ea
Page Layout                     : OneColumn
Page Count                      : 16
EXIF Metadata provided by EXIF.tools

Navigation menu