Consequence-Driven
Cyber-Informed Engineering

Safeguarding critical operations

Consequence-driven Cyber-Informed Engineering (CCE) is a methodology focused on securing the nation’s critical infrastructure systems. Developed at Idaho National Laboratory, CCE begins with the assumption that if a critical infrastructure system is targeted by a skilled and determined adversary, the targeted network can and will be penetrated. This “think like the adversary” approach provides critical infrastructure owners and operators a four-phase process for safeguarding their critical operations.

Methodology and Four-Phase Process

CCE provides a four-phase process for safeguarding critical infrastructure operations. The following graphic and animation provide more information for each of the four phases of the CCE Methodology.

CCE Process

consequence driven cyber informed engineering

Animated CCE Kill Chain Workflow

Engagements and Training Opportunities

ACCELERATE Training

Course Description: ACCELERATE Training provides critical infrastructure companies with a self-guided approach to conducting their own CCE effort. The course is two days (16 hours) and includes CCE methodology plus a detailed guide and templates participants can use to facilitate a CCE effort within their organization. The course offers continuing educations units/credits. >>MORE INFO

Registration: FREE. Registrants are responsible for travel expenses (flight, hotel and meals).

For registration related questions, email: [email protected]

Other Training Opportunities

INL and DOE-supported CCE Engagement (Tier 1) – Specific engineering solutions — not just cyber controls — to design out cyber risk from critical operations.

Self-Driven CCE Engagement (Tier 2) – In-depth, team-based training for Tier 1 individuals

Workforce Development – In-depth, team-based training for select individuals who will help Tier 1 partners execute a CCE engagement.

CCE Licensed Industry Partners

CCE Presentation Videos

Playlist

3 Videos

For more information contact, [email protected] or send your question to National Security Communications.

Idaho National Laboratory