EITAC Cybersecurity program and IT Security updates

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Computer Security: Principles and Practice
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Website Hardening HUIT IT Security | Sep
SEC835 Database and Web application security Information Security Architecture.
1.1 System Performance Security Module 1 Version 5.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Computer Security By Duncan Hall.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Information Management and the Departing Employee.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Security in Laurier Grant Li Wilfrid Laurier University.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Society for Maintenance and Reliability Professionals (SMRP)
BUILD SECURE PRODUCTS AND SERVICES
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
BruinTech Vendor Meet & Greet December 3, 2015
Office 365 Security Assessment Workshop
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
Secure Software Confidentiality Integrity Data Security Authentication
Data Compromises: A Tax Practitioners “Nightmare”
Computer Virus and Antivirus
That could never happen to me! Think again.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Business Risks of Insecure Networks
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cybersecurity EXERCISE (CE) ATD Scenario intro
Firewalls.
Teaching Internet Safety
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Staying Austin College
Cybersecurity Awareness
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
I have many checklists: how do I get started with cyber security?
Office 365 Security Assessment Workshop
IT Development Initiative: Status and Next Steps
Protective Security Advisor Program Brief
Red Flags Rule An Introduction County College of Morris
Technology Audit Plan ----BCSY University
Home Internet Vulnerabilities
Security Essentials for Small Businesses
David J. Carter, CISO Commonwealth Office of Technology
12 STEPS TO A GDPR AWARE NETWORK
The Practical Side of Meaningful Use:
Cybersecurity Am I concerned?
How to Mitigate the Consequences What are the Countermeasures?
Insert name of who presenting to
Implementing Client Security on Windows 2000 and Windows XP Level 150
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Information Protection
In the attack index…what number is your Company?
Using Software Restriction Policies
Information Protection
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Phishing
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
IT Next – Transformation Program
Presentation transcript:

EITAC Cybersecurity program and IT Security updates November 11 2016 Denise Ernst, ISO

Background Queen’s has begun a two stage approach to reduce the risk of a cyberattack. Stage 1- Reduce the likelihood of IT Hijack (over 9 -12 months) Enhance our technical capabilities to prevent and detect IT hijack; Improve peoples’ ability to identify and resist hijack attempts; Begin to foster a security-aware culture Stage 2: Reduce the overall risk of a cyberattack (2-3 year program) transition Queen’s cybersecurity practices from reactive to preventative Details on initiatives will be provided in May 2017.

Program Management Updates Engaged Sr. Security Specialist consultant Drafted governance and reporting structure. Under review. Released RFP for professional services assistance. RFP closed November 8. Identified project outcomes - network security, email Executing Communication Plan: Social media campaign, meetings held with 7 stakeholder groups and large portfolio units, article in ITS Newsletter and upcoming article in Gazette, website notices, completed Cyber Security Awareness month campaign Status: GREEN (schedule, budget, outcomes). Celebrate successes: a. Ten companies intending to respond to request for assistance with program. b. Microsoft significantly reduced the cost of their email threat protection tool. c. Awareness of, and attention to, cybersecurity improving. Key challenge: d. Re-focus of IT resources on cybersecurity

Project Groups 1 and 2 Update Description Project Updates 1. Network Security 1.1 Network Access Control Phase-in network controls to prevent unprotected/unmanaged devices from accessing the Queen’s network. Designed device risk heatmap used to identify maximum risk reward. Proof of concept underway. 1.2 Network Security Architecture Begin to modernize the existing network design and configuration to provide additional layers of security. Drafted initial recommendations. Implementation will commence upon appointment of professional services. 2. Email Security 2.1 Advanced Threat Protection Enhance security of Queen’s email service to minimize the propagation of malicious messages.

To commence upon appointment of professional services. Project Group 3 - Update Group Project Description Project Updates 3. Endpoint Security 3.1 Security Monitoring Program Design and implement a program for the continuous monitoring of the IT environment to detect and prevent attacks against devices such as laptops, servers, mobile phones. To commence upon appointment of professional services. 3.2 Vulnerability Management Program Design and implement a program for the continuous management of technical vulnerabilities across campus. Initial recommendations drafted and under ITS review.

To commence upon appointment of professional services. Project Group 4 Update Group Project Description Project Updates   4. Security Awareness 4.1 Social Engineering Exercise Design and implement an exercise aimed to verify users’ ability to identify phishing emails and inform on best practices. To commence upon appointment of professional services. 4.2 Security Course Renew security awareness course. 4.3 Ransom Policy Develop and implement a policy for ransom demands. 4.4 Security Awareness Policy Develop and implement a policy for mandatory security awareness training.

Cybersecurity program – Email Security All Queen’s mail will be scanned and filtered through O365 Mail will flow through enterprise security measures prior to forwarding onto local mail service or local mailbox Mail reputational services will be enhanced to limit others from spoofing Queen’s mail Changes to mail flow will occur first, no user impact anticipated New enterprise security measures (e.g. configuration changes, new filters) will be phased in during 2017. An implementation plan is forthcoming. It will be important to inform ITS of any local mail service to avoid an impact to users Testing will begin in December

Email Security : Local mail service The goal is to have all Queen’s user communities benefit from additional enterprise security measures, designed to reduce the number of malicious messages a user receives. Do any of your applications use a mail service other than mail.queensu.ca? a. What business purpose? b. How many users? c. What is the daily/cyclical volume? d. Does it require mass mailing? e. Mail service name? f. Can it be decommissioned? Please provide this information to Terry Black by the end of November. Responses due by end of November If app is using enterprise don’t need to know

read, share, and promote e-waste procedures IT Security: E-Waste New procedures for e-waste coming soon http://www.queensu.ca/its/security/additional-security-services/hd-destruction-disposal http://www.queensu.ca/sustainability/campus-initiatives/recycling/electronic-waste Contact the Sustainability Office to arrange pickup and destruction of e-waste E-waste awaiting pickup: store in secure area, inaccessible to the public. Never leave e-waste unattended, in an unsecured area. read, share, and promote e-waste procedures Background The campus computer store provided a hard drive cleaning (degaussing) and disposal service. The service ceased upon store closure. Hard drives no longer need to be removed from computers prior to disposal E-waste will be shredded, off-site

IT Security: Printer Security Configuration changes required on printers to protect from cyber exploits. A number of printers were exploited this year resulting in printouts of offensive propaganda material across campus. Changes to printer security– Additional printer security configurations recommended Printers will move to secure IP address http://www.queensu.ca/its/security/printer-security  read, share, and promote printer security procedures

What you should know – Printer security Printers identified as being publicly accessible have been identified and the ITSC is in the process of identifying and contacting the owners of these devices. Our current process is to filter the leased Canon’s and Xerox printers to limit access to be only from within Queen’s All other printers will move to a private network, inaccessible from the internet. All other printers: Inform the IT Support Center (ITSC) if a printer requires internet access. For more information, please contact the ITSC.

Other updates Password policy enforcement Linux vulnerability Significant number of end of life or end of support technologies discoverable on network Mirai botnet (IoT)