<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:"Book Antiqua";
        panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
span.EmailStyle19
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" style="vertical-align:baseline"><b><span style="font-size:12.0pt;font-family:"Book Antiqua",serif;color:black"><o:p> </o:p></span></b></p>
<p class="MsoNormal" align="center" style="text-align:center;vertical-align:baseline">
<b><span style="font-size:12.0pt;font-family:"Book Antiqua",serif;color:black">CISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies </span></b><span style="font-size:12.0pt;font-family:"Book Antiqua",serif;color:black"> </span><span style="font-size:12.0pt;font-family:"Book Antiqua",serif"><o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center;vertical-align:baseline">
<span style="font-family:"Book Antiqua",serif;color:black"> </span><span style="font-family:"Book Antiqua",serif"><o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center;vertical-align:baseline">
<b><i><span style="font-family:"Book Antiqua",serif">Effort Part of President Biden’s Executive Order to Improve the Nation’s Cybersecurity</span></i></b><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center;vertical-align:baseline">
<span style="font-family:"Book Antiqua",serif;color:black"> </span><span style="font-family:"Book Antiqua",serif"><o:p></o:p></span></p>
<p class="MsoNormal" align="center" style="text-align:center;vertical-align:baseline">
<b><i><span style="font-family:"Book Antiqua",serif;color:black">CISA Strongly Encourages Private</span></i></b><b><i><span style="font-family:"Book Antiqua",serif">/Public<span style="color:black"> Sector Partners to Review Playbooks to Improve Their Own Vulnerability
 and Incident Response Practices</span></span></i></b><span style="font-family:"Book Antiqua",serif;color:black"> </span><span style="font-family:"Book Antiqua",serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif;color:#264363"> </span><span style="font-family:"Book Antiqua",serif"><o:p></o:p></span></p>
<p class="MsoNormal" style="text-align:justify;vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">November 16, 2021  <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><b><span style="font-family:"Book Antiqua",serif"><o:p> </o:p></span></b></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">WASHINGTON</span><span style="font-family:"Times New Roman",serif;color:black"> </span><span style="font-family:"Book Antiqua",serif">–</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">Today,
 the Cybersecurity and Infrastructure Security Agency (CISA) released the</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif"><a href="https://us-cert.cisa.gov/ncas/current-activity/2021/11/16/new-federal-government-cybersecurity-incident-and-vulnerability" target="_blank"><span lang="EN">Federal
 Government Cybersecurity Incident and Vulnerability Response Playbooks</span></a></span><span lang="EN" style="font-family:"Book Antiqua",serif">. Produced</span><span style="font-family:"Book Antiqua",serif"> in accordance with Executive Order 14028,</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">“Improving
 the Nation’s Cybersecurity,” </span><span lang="EN" style="font-family:"Book Antiqua",serif">the playbooks provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive
 Branch networks.</span><span lang="EN" style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">“The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from
 vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity. “This important step, set in motion by President Biden’s Cyber Executive Order, will enable more comprehensive analysis and mitigation
 of vulnerabilities and incidents across the civilian enterprise. We encourage our public and private sector partners to review the playbooks to take stock of their own vulnerability and incident response practices.” <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">The Incident Response Playbook</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">applies to incidents
 that involve confirmed malicious cyber activity and for which a major incident has been declared or not yet been reasonably ruled out.</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif"> The Vulnerability
 Response Playbook applies to</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">any</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">vulnerability
 that is observed to be used by adversaries to gain unauthorized entry into computing resources.</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">This playbook builds on CISA’s <a href="https://cyber.dhs.gov/bod/22-01/" target="_blank">Binding
 Operational Directive 22-01</a> and standardizes the high-level process that should be followed when responding to these vulnerabilities</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">that pose
 significant risk across the federal government, private and public sectors. <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">Building on lessons learned from previous incidents and incorporating industry best practices, CISA intends for these two <a href="https://cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf" target="_blank">playbooks</a> to
 strengthen cybersecurity response practices and operational procedures not only for the federal government, but also for public and private sector entities.</span><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif">The
 playbooks contain checklists for incident response, incident response preparation, and vulnerability response that can be adapted to any organization to track necessary activities to completion.</span><span style="font-family:"Times New Roman",serif">   </span><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Book Antiqua",serif">For more details about the playbooks and CISAs role supporting President Biden’s Cyber Executive Order, visit <a href="https://www.cisa.gov/executive-order-improving-nations-cybersecurity" target="_blank">Executive
 Order on Improving the Nation’s Cybersecurity</a>.</span><span style="font-family:"Times New Roman",serif">  </span><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal" style="vertical-align:baseline"><span style="font-family:"Times New Roman",serif"> </span><span style="font-family:"Book Antiqua",serif"> <o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cyber Security Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_2" src="cid:image002.png@01D7DAB9.91EA8630"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>