{"id":19833,"date":"2022-03-09T06:58:41","date_gmt":"2022-03-09T14:58:41","guid":{"rendered":"https:\/\/origin-www.parsons.com\/?p=19833"},"modified":"2023-08-01T14:51:45","modified_gmt":"2023-08-01T18:51:45","slug":"protecting-our-nations-infrastructure-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/","title":{"rendered":"Protecting Our Nation’s Infrastructure Cybersecurity"},"content":{"rendered":"\n
\"infrastructure\"<\/figure>\n\n\n\n

Over the last two decades, the rapid advancement of technology has presented challenges for cybersecurity. As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown. Much of the focus for cyber-attacks has been on the DoD and the impact on the military and government. We are a leading supplier of cybersecurity and operation technology security for the US government and many intelligence communities, but cyber-attacks aren\u2019t specific to government agencies. With that, we are branching out to provide Critical Infrastructure with the same level of cybersecurity we provide the US government.<\/p>\n\n\n\n

The impact cyberattacks have on Critical Infrastructure impacts the global economy. Additionally, it impacts public and national security through industries like aviation, mass transportation, medical care, construction, and electricity, water, finances, food, and agriculture; the list of how a cyber-attack can impact our daily lives is extensive.<\/p>\n\n\n\n

One of our successes in managing cyber risk and resiliency is founded in being trusted advisors and collaborators with customers and teammates. <\/p><\/div>\n\n\n\n

Our team\u2019s real-world experience ensures we aren\u2019t just speaking about theory, best practices, tools, challenges, and risk-we really do live them every day on the cyber battlefield. One of the keys to becoming an integral part of any organization\u2019s cyber defense is that our Chief Information Officer runs our cyber engagements by leveraging our global IT operational capabilities. <\/p>\n\n\n\n

One of the things we\u2019ve learned is incorporating a shared ownership mindset with our customers as we develop programmatic, risk-based solutions to continuously improve the cybersecurity posture against a dynamic and ever-changing threat. Our holistic Cyber IT and OT programs incorporate a phased approach to baseline cybersecurity and functionality goals and standards, assess current networks, and identify potential vulnerabilities and design, and implement mitigations to improve a network\u2019s security posture continuously and programmatically.  In many cases, IT supports Operational Technology. While IT uses computers to create, process, store, and exchange electronic data and information, OT is hardware and software that detects or causes a change, through the direct monitoring and\/or control of industrial [physical process] equipment, assets, processes, and events.<\/p>\n\n\n\n

Based on the industry best practices that align with our customer\u2019s security requirements, we work with customers to tailor this process to their needs. Meetings are conducted to address issues, develop reviews, prepare for the risk management process, and determine the baseline.<\/p>\n\n\n\n

Our approach to Critical Asset Protection includes a cybersecurity Compliance Analysis<\/em> based on the National Institute of Standards and Technology (NIST) risk management framework (RMF) for cybersecurity as well as a reliability and resilience assessment based on design\/build specifications for critical infrastructure.  If the customer has not applied a formal RMF to all systems, our team can provide a reference set of security controls and implementations, based on guidance in NIST Special Publications 800-53 and 800-171, which we apply as the basis of a Cybersecurity Assessment.  We also refer to UFC 4-010-06 Cybersecurity of Facility-Related Control Systems as this standard is widely used in US critical installations. This approach is used to determine<\/em> and develop a risk-based baseline<\/em> that represents the security goal for the networks and systems analyzed.<\/p>\n\n\n\n

Cybersecurity history has shown that it is unlikely that all attacks can be avoided. Therefore, if attacked, we are well-positioned to apply best practices: quickly identify the attack, immediately respond by applying a carefully crafted incident response plan, recover to full operation as soon as practical, and adjust normal operations to add mitigations to the type of attack experienced. We understand that many customers effectively operate 24 hours a day, 365\/366 days a year, but to operate in this fashion, our customers must also be resilient. Our risk-based approach helps establish the organization, policies, procedures, tools, and techniques to achieve success in cybersecurity operations.<\/p>\n\n\n\n

<\/span>
About The Author<\/h5>

Juan is a licensed Professional Engineer with over 20 years of experience in project and program management supporting cybersecurity, design, and construction programs for the Department of Defense, Department of State, and US Army Corps of Engineers. He led a team of ten engineers supporting, creating, and implementing the Industrial Controls Systems (ICS) Cybersecurity Modernization Program for a DoD customer. This program includes the creation of standards for Critical Infrastructures, including SCADA and EMCS for cybersecurity and functionality modernization. In addition, he has led a multidisciplinary team of controls engineers and cyber security experts to provide critical infrastructure and SCADA cybersecurity consulting services for critical government facilities. Juan has extensive overseas design-build experience managing federal projects in over ten countries, including military infrastructure and U.S. Embassy construction.<\/p><\/div><\/figure>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Over the last two decades, the rapid advancement of technology has presented challenges for cybersecurity. As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown.\u00a0<\/p>\n","protected":false},"author":29,"featured_media":25122,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"11291,1012,5171,12874,828,14792","_relevanssi_noindex_reason":"","footnotes":""},"categories":[7663,7716],"tags":[],"class_list":["post-19833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber","category-critical-infrastructure"],"yoast_head":"\nProtecting Our Nation's Infrastructure Cybersecurity<\/title>\n<meta name=\"description\" content=\"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Our Nation's Infrastructure Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Parsons Corporation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/parsonscorporation\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T14:58:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T18:51:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Theresa Wederman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:site\" content=\"@parsonscorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Theresa Wederman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\"},\"author\":{\"name\":\"Theresa Wederman\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\"},\"headline\":\"Protecting Our Nation’s Infrastructure Cybersecurity\",\"datePublished\":\"2022-03-09T14:58:41+00:00\",\"dateModified\":\"2023-08-01T18:51:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg\",\"articleSection\":[\"Cyber\",\"Global Infrastructure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\",\"url\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\",\"name\":\"Protecting Our Nation's Infrastructure Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.parsons.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg\",\"datePublished\":\"2022-03-09T14:58:41+00:00\",\"dateModified\":\"2023-08-01T18:51:45+00:00\",\"description\":\"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg\",\"contentUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg\",\"width\":780,\"height\":419,\"caption\":\"cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.parsons.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Our Nation’s Infrastructure Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.parsons.com\/#website\",\"url\":\"https:\/\/www.parsons.com\/\",\"name\":\"Parsons Corporation\",\"description\":\"Infrastructure, Defense, Security, and Construction\",\"publisher\":{\"@id\":\"https:\/\/www.parsons.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.parsons.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.parsons.com\/#organization\",\"name\":\"Parsons Corporation\",\"url\":\"https:\/\/www.parsons.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"contentUrl\":\"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png\",\"width\":684,\"height\":353,\"caption\":\"Parsons Corporation\"},\"image\":{\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/parsonscorporation\",\"https:\/\/x.com\/parsonscorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f\",\"name\":\"Theresa Wederman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.parsons.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g\",\"caption\":\"Theresa Wederman\"},\"url\":\"https:\/\/www.parsons.com\/author\/theresa-wederman\/\"}]}<\/script>\n","yoast_head_json":{"title":"Protecting Our Nation's Infrastructure Cybersecurity","description":"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Our Nation's Infrastructure Cybersecurity","og_description":"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...","og_url":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/","og_site_name":"Parsons Corporation","article_publisher":"https:\/\/www.facebook.com\/parsonscorporation","article_published_time":"2022-03-09T14:58:41+00:00","article_modified_time":"2023-08-01T18:51:45+00:00","og_image":[{"width":780,"height":419,"url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg","type":"image\/jpeg"}],"author":"Theresa Wederman","twitter_card":"summary_large_image","twitter_creator":"@parsonscorp","twitter_site":"@parsonscorp","twitter_misc":{"Written by":"Theresa Wederman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/"},"author":{"name":"Theresa Wederman","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f"},"headline":"Protecting Our Nation’s Infrastructure Cybersecurity","datePublished":"2022-03-09T14:58:41+00:00","dateModified":"2023-08-01T18:51:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"image":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg","articleSection":["Cyber","Global Infrastructure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/","url":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/","name":"Protecting Our Nation's Infrastructure Cybersecurity","isPartOf":{"@id":"https:\/\/www.parsons.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg","datePublished":"2022-03-09T14:58:41+00:00","dateModified":"2023-08-01T18:51:45+00:00","description":"As the world becomes more and more interconnected, the frequency of major cyber-attacks has increased, and the impacts of these attacks have grown...","breadcrumb":{"@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#primaryimage","url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg","contentUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2022\/03\/protectying_cybersecurity_innovation_780x419_v2b-1.jpg","width":780,"height":419,"caption":"cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/www.parsons.com\/2022\/03\/protecting-our-nations-infrastructure-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.parsons.com\/"},{"@type":"ListItem","position":2,"name":"Protecting Our Nation’s Infrastructure Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.parsons.com\/#website","url":"https:\/\/www.parsons.com\/","name":"Parsons Corporation","description":"Infrastructure, Defense, Security, and Construction","publisher":{"@id":"https:\/\/www.parsons.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.parsons.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.parsons.com\/#organization","name":"Parsons Corporation","url":"https:\/\/www.parsons.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","contentUrl":"https:\/\/www.parsons.com\/wp-content\/uploads\/2020\/02\/parsons-logo-for-social.png","width":684,"height":353,"caption":"Parsons Corporation"},"image":{"@id":"https:\/\/www.parsons.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/parsonscorporation","https:\/\/x.com\/parsonscorp"]},{"@type":"Person","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/ffd34de8b6b2440a671ee6cbf6676c5f","name":"Theresa Wederman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parsons.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e75b9003608a0a78196a3423011a34c5?s=96&d=mm&r=g","caption":"Theresa Wederman"},"url":"https:\/\/www.parsons.com\/author\/theresa-wederman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/19833"}],"collection":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/comments?post=19833"}],"version-history":[{"count":0,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/posts\/19833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/media\/25122"}],"wp:attachment":[{"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/media?parent=19833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/categories?post=19833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.parsons.com\/wp-json\/wp\/v2\/tags?post=19833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}