Campus Cloud Security Shared Assessments

Slides:



Advertisements
Similar presentations
So You Think The Cloud Isn’t Secure?. How is this secure?
Advertisements

Survey Results and Panel: How Big Data Is Being Implemented Addison Snell
CREATING AND MANAGING CHANGE REQUESTS IN SERVICE DESK CHANGE MANAGEMENT CHANGE MANAGEMENT.
Project Life Cycle Introduction and Overview © Ed Green Penn State University All Rights Reserved.
Enterprise Architecture and Applications Committee December, 2011 Jane Wong Director, ITS Business Applications December, 2011.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy.
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Rite Aid Procure to Pay (P2P) Program Quick Reference Guide The GEP Smart Portal allows exchange of the following transactions: Purchase Orders Invoice.
USING google.docs For Presentation Projects Tahoma Jr. High 8 th Grade Science Maple Valley, WA.
Click to edit Master text styles – Second level Third level – Fourth level » Fifth level Access From Anywhere, Anytime Access wherever you are via: Computer.
© 2007 Open Grid Forum Enterprise Best (Community) Practices Workshop OGF 22 - Cambridge Nick Werstiuk February 25, 2007.
Educause Security 2006 © Baylor University Security Assessments for Information Technology Bob Hartland Director of IT Servers and Network Services.
Less Paper, More Power. Document Digitization and Management Solution. digipaper.
GroupRocket.net. Years back checking s in the morning was the first ever thing most of the professionals would start their day with. And with the.
WEB API AND CLOUD DEVELOPMENT BY TRAWEX TECHNOLOGIES.
FOSS4VGI: An Introduction to the Open Source Geospatial Community
+ September 7, $100,000 IN PRIZES! + First Prize: $70,000 Second Prize: $30,000.
OpenRegistry: What’s New Jasig San Diego 3/10 1 What’s New With OpenRegistry Scott Battaglia Benjamin Oshrin March 2010.
Planning the Digital Transformation Readiness Check for SAP S/4HANA
First Appointment Meeting Presented by: Presented to: Date:
Insider Connectivity Review & Savings Analysis
Business Impact Analysis
To Encrypt or Not Encrypt
Collaborative Innovation Communities: Bringing the Best Together
Academic Planning Summit Degree Proposal, Review and
Securing the Science DMZ and Research
Distributed Asset Management Making The Business Case
Innovative Solutions from Internet2
Firewall Management Task Force
Cloud Service Procurement: Engaging the CISO for a Risk Assessment
CUSTOMER CENTRIC Parisha Shah
Glendale Community College PeopleSoft Project Update
William Band, Vice President, Principal Analyst
Successful Event Planning
Streamlining Vendor Risk Management with the HECVAT
As we all know that Kaspersky Antivirus Support is one of the best and most trustworthy companies for third-party technical support in the US. We have.
As we all know that Kaspersky Antivirus Support is one of the best and most trustworthy companies for third-party technical support in the US. We have.
How to Fix Common Issues of Mozilla Thunderbird? Mozilla Thunderbird is the popular browser when it comes to manage all your.
Why Yahoo Technical Support is Useful?. Users have to do for Contacting Yahoo Support Team.
ILMT/BigFix Inventory Demo
How to Submit an Event Proposal
Introducing your University I.T., and Learning Systems
Vulnerability Management Team Information Security Office
11/28/2018 5:35 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
American Joint Replacement Registry 2018 Annual Report Figures
Systems analysis and design, 6th edition Dennis, wixom, and roth
OWASP Charlotte What, Why, Where and How
Web Applications: Get a Grip on Privacy
Systems analysis and design, 6th edition Dennis, wixom, and roth
Dan Bieler, Principal Analyst
Jean Reale Sloan Technology Services
Solutions oriented outcomes
Direct Energy Green Schools Mid-Year Meeting
Using the Cloud App Marketplace Monitoring cloud app migrations
IMC Digital and IT 2018 Awards Application Form
Is Cloud Identity Management Ready
Outbound Inventory From a Vendor Managed Perspective [Luis Gil]
Medication Reconciliation
CUSTOMER CENTRIC Parisha Shah
Crowdfunding Let’s Grow State Getting Started
Why QRA monitor? Knowing what should be done for:
CX/CRM BEST PRACTICES SALES CLOUD BEST PRACTICE SHARING
Writing for Cloud Tools, Process, & D
Your Social Enterprise Name Your Name(s), Grade(s)
Welcome to the NC-SARA Webcast SARA Notification Requirements
Academic Planning Summit Degree Proposal, Review and
DO NOT BEGIN UNTIL YOU ARE TOLD TO
The state of digital supplier risk management: In partners we trust
Presentation transcript:

Campus Cloud Security Shared Assessments Jon Allen, Baylor University and Nick Lewis, Internet2 April 2016

Agenda Current State Existing Solutions Somewhere to Start Questions

Current state Campuses are rapidly adopting cloud services and deploying software systems Assessing the risk for cloud services and software systems as quickly as possible Developing vendor risk mgmt programs Developing enterprise risk mgmt programs Evolving information security programs as quickly as possible Too much to do to effectively do it all!

What problem are you trying to solve? How to as easily and quickly as reasonably possible share work done at one campus with other campuses Freeing up time to dedicate back to critical information security functions Create a forum/space to share and find existing shared assessments Build on the existing higher education information security community sharing

Example Graduate Admissions wants to use Slate for applications Add to risk assessment list to address ASAP Could e-mail various security lists to see if anyone has used or assessed it Could check external vendor, or NET+, to see if it has been assessed Work with dept on assessment and contract Potentially spend significant amount of time and slow down dept requestor

We’re not proposing…. Replacing your information security risk assessment programs Replace existing communities Approve the security of a cloud service or software Replace NET+ program

Existing Solutions? Existing vendor management programs Existing commercial service providers like 3PAS, Skyhigh Registry, and others Community service providers like Shared Assessments, CSA CSTAR, and others NET+ program On this slide, go over why each won’t work

Potential Challenges Intent is not for “approval”, but to help a campus save some time in managing their third party vendors and service providers Could provide insight into security operations on a campus Providing access control to just higher ed Materials can’t be under NDA How to incorporate into your information security programs

What Assessment Questionnaire? Existing security questionnaires CSA’s Consensus Assessments Initiative Questionnaire Google’s Vendor Security Assessment Questionnaire NIST 800-53v4, ISO27001, and many others Develop something new – NO!

Potential Solutions Does this need to be more than just some metadata and a pointer to a report? Trying for low maintenance, but high value (also free) Can this be done in existing community activities? Email list, Box folder, Internet2 forum, wiki, other?

Somewhere to start Start with an Internet2 Working Group Start with mailing list - shared-security-assessments@internet2.edu  Figure out if Box folder, Internet2 Forum, or Mailing list would meet the need Do we want to have a conference call? Develop a usage document explaining how to use, metadata required, and disclaimer Announce!

Questions for you Do you want to help get this started? Is this of interest of you and your teams? Would you actually use it? Would you be willing to share your assessments? Do you want to help get this started?

Questions for us? If you have any questions, please contact: Jon Allen, CISSP, EnCE Assistant Vice President & CISO Jon_Allen@baylor.edu Nick Lewis, Internet2 NET+ Program Manager, Security and Identity nlewis@internet2.edu

Campus Cloud Security Shared Assessments Please remember to fill out your session evaluation! It’s all Nick’s fault if this sucks!