Secure Tomorrow Series Toolkit
Overview
The Secure Tomorrow Series Toolkit is a diverse array of interactive and thought-provoking products uniquely designed to assist stakeholders across the critical infrastructure community to self-facilitate and conduct strategic foresight activities that will enable them to derive actionable insights about the future, identify emerging risks, and develop risk management strategies that, if taken today, could enhance long-term critical infrastructure security and resilience to implement now.
Central to the Secure Tomorrow Series effort is the selection of topics that are likely to have highly disruptive impact across multiple National Critical Functions. To this end, the National Risk Management Center worked with subject matter experts from academia, think tanks, the private sector, and the National Labs to help build and refine the knowledge base that underlies the Toolkit activities.
These free voluntary resources are available to stakeholders in every critical infrastructure sector. More specifically, the Toolkit will assist users in identifying and examining risk mitigation strategies, managing uncertainty and encouraging strategic foresight methods in their long-term planning.
Topics
The Secure Tomorrow Series Toolkit currently addresses nine topics:
- Anonymity and privacy: Maintaining the balance between identity verification—for purposes such as voting, disease-related contact tracing, and law enforcement—and protecting anonymity is becoming increasingly challenging.
- Trust and social cohesion: Exploring how emerging risks to critical infrastructure and cybersecurity and potential mitigation strategies affect social cohesion—a sense of belonging within a community.
- Data storage and transmission: Accelerating rates of data creation and transmission places increasing importance on secure data storage and transmission.
- Brain-computer interfaces (BCIs): BCIs provide a direct communication pathway between the brain and an external device, for the purposes of either “reading from” or “writing to” the brain.
- Synthetic biology: The redesigning and harnessing of biological organisms to impart new or improved abilities and produce products.
- Quantum technologies: Technologies associated with understanding and manipulating quantum phenomena (such as entanglement and superposition) for acquiring, communicating, and processing information.
- Advanced Manufacturing: Advanced manufacturing describes the use of innovative technologies and processes—such as artificial intelligence, automation, robotics, 3D printing, sensors, and big data analytics—to make existing products and create new ones.
- ICT supply chain resilience: The information and communications technology (ICT) supply chain comprises the hardware and software that make up the Internet and telecommunications technology.
- Water availability: For Secure Tomorrow Series activities, water availability entails having access to water resources of both sufficient quantity and quality.
Getting Started: Toolkit Activities
The Toolkit provides a powerful means of increasing risk awareness, identifying risk mitigation solutions, and encouraging systems-level thinking and long-term planning. Specifically, it contains game templates; facilitator, player, and controller guides; read-ahead materials, and other materials needed for users to self-facilitate four* different activities:
- Scenarios workshop: Participants will explore different future scenarios to identify ways in which the operating environment for owners and operators may evolve and how this evolution may affect the security and resilience of critical infrastructure systems. Participants will learn how to identify a prioritized set of risk mitigation strategies that will increase critical infrastructure resilience and security, regardless of future uncertainties.
- Matrix games: Players tackle incidents and trends that could negatively affect the U.S. in the future and debate strategies to mitigate accompanying risks to critical infrastructure security and resilience. Participants will engage and challenge each other to think strategically about critical infrastructure resilience and preparedness from multiple perspectives.
- Cross-impacts sessions: Participants focus on how emerging and evolving risks and key drivers of change might affect different National Critical Functions in distinct ways. Participants will come away with a better understanding of the ramifications of these drivers of change for different critical functions.
- Threat timelines activity: Players generate fictional news headlines that describe future security threats to a particular technology or system. Through these headlines, players think about plausible futures, reflect on potential threats to critical infrastructure security and resilience; and identify corresponding mitigating actions that can be put into motion today.
*The Threat timelines activity is available only for the following topic areas: (1) anonymity and privacy, (2) trust and social cohesion, and (3) data storage and transmission.
By downloading the Toolkit, users will learn how to conduct foresight activities that will enable them to derive actionable insights about the future, identify emerging risks, and proactively develop corresponding risk management strategies they can implement now. As a starting point, please review the Scenarios Workshop Synopses about future risks, and then move on to explore the Matrix Games and Cross-Impacts depending on time and participant needs and interest.
Workshop 1 materials cover anonymity and privacy; trust and social cohesion; and data storage and transmission.
Workshop 2 materials cover brain-computer interfaces (BCIs); synthetic biology; and quantum technologies.
Workshop 3 materials cover advanced manufacturing; ICT supply chain resilience; and water availability.
Scenarios Workshops
Minimum Number of Participants Required: 30-40 participants
Time Estimate: 8 hours
Scenarios Workshop 1 Synopses
Scenarios Workshop 2 Synopses
Scenarios Workshop: Introduction and Roadmap Slides and Notes
Scenarios Workshop Facilitator(s) Guides
Secure Tomorrow Series Scenario Workshop 1 Narratives
Secure Tomorrow Series Scenario Workshop 2 Narratives
Secure Tomorrow Series: Are We There Yet?
Matrix Games
Minimum Number of Participants Required: 3-5 participants
Time Estimate: 2.5 hours
Matrix Games Data Privacy, Storage, and Transmission
Matrix Game: Trust and Social Cohesion
Matrix Game: Brain-Computer Interfaces
Matrix Game: Quantum Technologies
Matrix Game: Synthetic Biology
Matrix Game: Advanced Manufacturing
Matrix Game: ICT Supply Chain Resilience
Matrix Game: Water Availability
Cross-Impacts
Minimum Number of Participants Required: 8-12 participants
Time Estimate: 4 hours
Participants focus on how emerging and evolving risks and key drivers of change might affect different National Critical Functions in distinct ways. Participants will come away with a better understanding of the ramifications of these drivers of change for different critical functions.
Cross-Impacts Session 1 Resources
Cross-Impacts Session 2 Resources
Cross-Impacts Session 3 Resources
Threat Timeline Resources
Minimum Number of Participants Required: 30-40 participants
Time Estimate: 8 hours
Threat Timelines Resources
Toolkit Next Steps
CISA’s National Risk Management Center is working on the next iteration of the Toolkit focused on the following topics: (1) critical resource shortages; (2) electrification; and (3) self-organized emergent behaviors in AI complex adaptive systems.
Toolkit Feedback Survey
We welcome your feedback! Please share your thoughts about these products through this voluntary, anonymous Product Feedback Survey
Contact Us
If you do need some assistance in setting up a Toolkit activity or have a question/comment, please email SecureTomorrowSeries@cisa.dhs.gov.