National Academies Press: OpenBook
« Previous: 3. SUMMARY OF TASKS
Page 13
Suggested Citation:"4. PRIORITIZED RECOMMENDATIONS FOR FUTURE RESEARCH." National Academies of Sciences, Engineering, and Medicine. 2023. Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs, Volume 1: Project Summary Report. Washington, DC: The National Academies Press. doi: 10.17226/27024.
×
Page 13
Page 14
Suggested Citation:"4. PRIORITIZED RECOMMENDATIONS FOR FUTURE RESEARCH." National Academies of Sciences, Engineering, and Medicine. 2023. Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs, Volume 1: Project Summary Report. Washington, DC: The National Academies Press. doi: 10.17226/27024.
×
Page 14

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

13 4. PRIORITIZED RECOMMENDATIONS FOR FUTURE RESEARCH This research focused on identifying best practices to help chief executives of state transportation agencies address the unique cybersecurity challenges related to the protection of OT assets. In the course of research activities and in the development of the guide, we identified multiple additional opportunities for how state transportation agencies could potentially operationalize cybersecurity best practices and capabilities. However, the exploration and development of these incremental opportunities remains beyond the scope of this project. Hence, we propose these as future research projects to be considered by TRB, which could potentially promote the ultimate objective of helping transportation agencies more effectively prepare for, mitigate, and respond to cybersecurity threats and risk. Opportunity Concept Relevance Output State of OT Cyber Risk Evaluation Research the current state of OT cybersecurity with state DOTs to identify, evaluate, and quantify current cyber risks to OT across the industry Creating a summary of current threats to OT cybersecurity would help DOT CEOs and other agency leadership to understand, prepare for, mitigate, and respond to threats and risks Document detailing current state of OT Cyber Risk Evaluation Knowledgebase of Cybersecurity Resources Create a knowledgebase of available resources and sources of funding for cybersecurity risk and mitigation projects and guidelines for how to find further funding DOT executive leadership who seek to invest in cybersecurity risk mitigation programs are often unaware of available resources and funding, such as federal programs Knowledgebase of available cybersecurity resources IT/OT Organizational Structure Assessment Conduct research to compare and contrast the differences, efficacy, and comparative benefits of different approaches to organizing cybersecurity efforts within a DOT, e.g., compare a unified state IT or cybersecurity department versus a DOT-specific department, as well as benefits to separating or combining IT and OT leadership There is a variety of strategies for implementing IT, OT, and cybersecurity organizational structures from state to state and even from department to department. Research into the benefits of each model could help CEOs determine which model would work best for their situation Example models of IT/OT organizational structures with benefits highlighted.

14 Opportunity Concept Relevance Output Quantification of Cybersecurity Capability Maturity Levels Research to define and quantify an organization’s level of capability to develop an appropriate index model for cybersecurity maturity. Currently, no comparative scale exists to help state agencies benchmark their current or desired cybersecurity capabilities Maturity is based on an organization’s unique security risk and resilience to cyber threat. By utilizing an index model, it could provide a more effective assessment of state DOTs with respect to their own capabilities Capability Maturity Model with fully researched levels Cybersecurity Maturity Self-Assessment Tool Develop a self-assessment tool in which state DOTs can determine their appropriate and current level of maturity based on their existing programs, capabilities, and risk. Creating a self-assessment could produce a more proactive security position by providing more immediate feedback and could allow state DOTs to more efficiently identify the areas in which their cybersecurity practices are more or less mature than expected Assessment tool that provides DOTs with level of CMM Cybersecurity of Connected vs. Non- connected OT Devices Research the different cybersecurity requirements between connected and non- connected OT devices and weigh the benefits of introducing new connected OT devices versus the cost of introducing new cyber vulnerabilities. With the increasing number of connected devices, it is imperative to identify the cyber risk involved, determine their security requirements, and distinguish between those of non-connected devices, providing organizations with proper guidance to mitigate cybersecurity threats Document quantifying risk associated with OT devices Cybersecurity Risk Level Quantification Develop a procedure for quantifying the impact of cybersecurity attacks and the risk levels associated with them. Being able to quantify the impact of cyber risks could help DOT leadership better prioritize cyber vulnerability response. Additionally it could help for quantifying monetary damage on insurance claims in the event of an attack. Procedures for providing a risk quantification, for use in securing funding

Next: 5. CONCLUSION »
Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs, Volume 1: Project Summary Report Get This Book
×
 Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs, Volume 1: Project Summary Report
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Chief executive leadership of transportation agencies have placed substantial emphasis on the protection of IT systems against cyber threats. Less focus has been devoted to the risks to operational technology (OT) and equipment or in protecting transportation business operations.

The TRB National Cooperative Highway Research Program's NCHRP Web-Only Document 355: Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs seeks to mitigate that imbalance, especially as physical OT assets become increasingly connected through electronic networks and managed remotely by software. Volume 1, Project Summary Report provides details of the research project that developed the Transportation Cyber Risk Guide, which is found in NCHRP Web-Only Document 355: Cybersecurity Issues and Protection Strategies for State Transportation Agency CEOs, Volume 2.

Supplemental to the document is a presentation of an overview of the research.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!