<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 26 Apr 2026 07:02:00 -0400" url="https://beta.my.umbc.edu/groups/csee/posts.xml?tag=cisa">
<NewsItem contentIssues="true" id="127703" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/127703">
<Title>Talk: Critical Infrastructure Risk Assessment and Reduction</Title>
<Tagline>Online, 12:00-1pm ET, Friday, 23 September 2022</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><strong>The UMBC Cyber Defense Lab presents</strong></div><div><br></div><h4>On A Risk Assessment and<br>Reduction Approach for<br>National Critical <span>Infrastructure</span></h4><div><br></div><h4><strong>Cyrus Jian Bonyadi</strong></h4><strong>Security Systems Analyst and PhD Student<br></strong><strong>Sandia National Labs and UMBC</strong><div><br></div><div><strong>12:00-1pm ET, Friday, 23 Sept. 2022, <span>via </span><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></div><div><br></div><div>Work by Jason Reinhardt, Merideth Secor, Lindsey Miles, Ron Lafond, Derek Koolman II, Lauren Wind, Ray Ludwig, Jeff Munns</div><div><br></div><div>The <a href="https://www.cisa.gov/" rel="nofollow external" class="bo">Cybersecurity and Infrastructure Security Agency</a> (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. CISA must assess risks that cover a broad range of scenarios over a complex set of interdependent critical infrastructure (CI) systems. While many threat and hazard impact models and data sets exist, there is no overarching analytic structure that organizes and integrates these disparate sources into a unified risk assessment. CISA is building capabilities that will address these challenges to support stakeholders across all levels of government and the private sector. </div><div><br></div><div>First, CISA has developed a <a href="https://www.cisa.gov/national-critical-functions" rel="nofollow external" class="bo">National Critical Functions</a> (NCFs) data structure to organize and describe critical infrastructure. This data set provides a set of decompositions structured as directed graphs that break down each identified function into enabling sub-functions that detail the operation and interdependencies across disparate CI systems.  <span>The functional description of NCFs serves as a complementary lens to the sector-based organization of CI and better facilitates systemic and cross-sector risk analysis. </span></div><div><span><br></span></div><div><span>Additionally, CISA has begun developing the Risk Architecture, a technology-enabled analytic tool that contains a set of standards, scenarios, visualizations, and workflows that leverage the NCF and other integrated CI data sets. This talk describes the need for an integrated approach to CI risk assessment, the NCF decomposition structure, the principles and concepts behind the Risk Architecture, and the approaches to functional interdependency analysis while also providing initial use examples.</span></div><div><br></div><div><a href="http://cyrusbonyadi.io/" rel="nofollow external" class="bo">Cyrus Jian Bonyadi</a> is a PhD student working on developing a set of corollaries for consensus theory in distributed system security. Cyrus is a former member of the UMBC <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyberdawgs</a> cyberdefense team and maintains a relationship with UMBC as a full time researcher at Sandia National Labs. </div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. <span>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.  The </span><a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a><span> meets biweekly Fridays 12-1pm. All meetings are open to the public.  Upcoming CDL meetings: Oct 7, Geoffrey Herman (Illinois), Validation of the Cybersecurity Curriculum Assessment (CCA); Oct 21, Peter Peterson (UMN Duluth), Misconceptions in cybersecurity; Nov 4, Josiah Dykstra (DoD), Myths in cybersecurity; Nov 18, Russ Fink (APL), ARMR: Autonomous resilience / machine recovery; Dec 2 Peter Peterson (UMN Duluth), Adversarial Thinking; SFS/CySP Research Study: January 2-6, 2023 (tentative).</span></div><div><br></div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents     On A Risk Assessment and Reduction Approach for National Critical Infrastructure     Cyrus Jian Bonyadi Security Systems Analyst and PhD Student Sandia...</Summary>
<Website>https://cisa.umbc.edu/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/127703/guest@my.umbc.edu/2b1521e170974ba41a6ccf6e64f0f355/api/pixel</TrackingUrl>
<Tag>cisa</Tag>
<Tag>cybersecurity</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xxlarge.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xlarge.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/large.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/medium.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/small.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xsmall.jpg?1663610286</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xxsmall.jpg?1663610286</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 19 Sep 2022 09:13:48 -0400</PostedAt>
<EditAt>Mon, 19 Sep 2022 14:01:23 -0400</EditAt>
</NewsItem>

</News>
