VA Research Information Security

Office of Information and
Technology (OI&T)
Field Security Operations
Field Security Service
1
Overview
Field Security Operations
Information Protection
Questions and Answers
2
Office of Information and
Technology
Field Security
Operations
3
OI&T Field Security Operations
Director of
IT Field Security Operations
Critical
Infrastructure
Protection
Service
Data Center ISO
Support
Division
IT Field
Security
Service
Technical Security
Officers (TSO)
Division
Enterprise
Security
Solutions
Service
(SCMS & TIS)
Information
Security
Officers
Division
Security
Project
Management
Office
Continuity of
Operation
Planning
(COOP) Division
Region 1
Region 2
Region 3
Region 4
Region 5
Network 18,
19, 20, 21 & 22
POs
Network 12,
15, 16, 17 & 23
POs
SOC
Network 6, 7,
8, 9, 10 & 11
POs
Network 1, 2,
3, 4 & 5
POs
VBA
NCA
VACO
AAC
4
Office of Information and
Technology
Field Security
Service
5
Field Security Service Mission
The mission of the OI&T Field Security
Service (FSS) is to ensure the privacy,
confidentiality, integrity, and availability of
VA information assets associated with the
services offered by the Department of
Veterans Affairs. In addition, FSS provides
assurance that cost effective security
controls are in place to protect automated
systems from financial fraud, waste, and
abuse.
6
Field Security Service
IT Field
Security
Service
Data Center
Support
Division
Enterprise
Technical Security
Officer (TSO)
Information
Security
Officers
Division
Continuity of
Operation
Planning
(COOP) Division
Region 1
Region 2
Region 3
Region 4
Region 5
Region TSO
Region TSO
Region TSO
Region TSO
Region TSO
Network 6, 7,
8, 9, 10 & 11
POs
Network 1, 2,
3, 4 & 5
POs
Network 18,
19, 20, 21 & 22
POs
Network 12,
15, 16, 17 & 23
POs
SOC
VBA
NCA
VACO
AAC
7
IT Boundaries
VISN Location
REGION
2
REGION
1
23
20
RDPC Location
REGION
4
12
2
11
19
21
1
4
10
3
15
5
Guam
9
21
22
16
18
Philippines
6
7
21
REGION
3
17
Alaska
20
Hawaii
21
8
Puerto Rico
8
8
Field Security Service
Leadership Team
IT FSS Director (Supervisor)
Randy Ledsome
Region 1 ISO (Supervisor)
John White
Region 2 ISO (Supervisor)
Alan Mattson
Region 3 ISO (Supervisor)
Barbara Smith
Region 4 ISO
(Supervisor)
Alan Papier
Region 5 ISO (Supervisor)
Dennis Smith
Network 18 ISO (Team
Lead)
Steve Kerby
Network 19 ISO (Team
Lead)
Armando Diaz De Leon
Network 20 ISO (Team
Lead)
Michael Sutherland
Network 21 ISO (Team
Lead)
Mary Ebner
Network 22 ISO (Team
Lead)
Doug Foster
Network 12 ISO (Team
Lead)
Steve Deyoe
Network 15 ISO (Team
Lead)
VACANT
Terry Taylor (Acting)
Network 16 ISO (Team
Lead)
Dan Cleaver
Network 17 ISO (Team
Lead)
Diane Dixon
Network 23 ISO (Team
Lead)
Craig Heitz
Network 6 ISO (Team
Lead)
VACANT
Steve Blackwell (Acting)
Network 7 ISO (Team
Lead)
Greg Walker
Network 8 ISO (Team
Lead)
Dale Bogle
Network 9 ISO (Team
Lead)
Chris Varacalli
Network 10 ISO (Team
Lead)
Kristin Steel
Network 11 ISO (Team
Lead)
VACANT
Mark Latendresse
(Acting)
Network 1 ISO (Team
Lead)
Tim ODonnell
Network 2 ISO (Team
Lead)
Chafica Angeli
Network 3 ISO (Team
Lead)
Alan Papier (Acting)
Network 4 ISO (Team
Lead)
Starr Washington
Network 5 ISO (Team
Lead)
Michael Barnes
Network VBA – St
Petersburg ISO (Team
Lead)
Jessica Lewis
Network VBA – St Paul
ISO (Team Lead)
Connie Hamm
Network VBA – San Diego
ISO (Team Lead)
Patrice Volante
Network VACO ISO (Team
Lead)
Louise Lovett-Robinson
NCA ISO
Judi Huffman
IT COOP (Team
Lead)
Don Sheehan
Note: This presentation only includes staff in Team Lead and Supervisor positions.
9
ISO Standardization
Position Descriptions (including series
and grades)
Performance Standards
Roles and Responsibilities
Guidance and Procedure
Training and Education
10
Office of Information and
Technology
Information
Protection
11
Information Protection
Information
Protection
Management Controls
Operational Controls
Technical
Controls
• Policy
• Directives
• Memoranda
• Training
• Human Resources
• Standard Operating
Procedures
Network TransmissionRemote Access
Security
Security
Removable Media and
Email and Document
Storage Security
Security
Smart Phone/Blackberry
Laptop Encryption
Encryption
12
Information Protection Technology
Summary
\
Security Issue
User
Technical Solution
Removable Media and Storage
Only authorized Users
And devices
Smart Phones/Blackberry Devices
Only Government
Furnished devices;
Encrypted;
password protected
Network Transmissions
No clear text;
Encrypted data
Transmissions
Remote Access
Reduce VPN access;
Scan all equipment
connecting
to VA network - RESCUE
Email and Documents
Layered approach to provide
Comprehensive information protection
of VA sensitive data
PKI, Internet Gateway Scans,
RMS - Full document control.
Control data storage and
transmission
13
Summary
Field Security Operations and Field
Security Service
Information Protection
Information Protection is EVERYONE’s
Responsibility!
14
General Questions?
Randy Ledsome
Director of Field Security Service
570-830-7025
[email protected]
15