Past, present & future at Pepperdine University

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
BYOD: Bring Your Own Device! Mark Ray Teacher Librarian Instructional Technology Facilitator Vancouver Public Schools Groundhog Day, 2012 BYOD: Bring Your.
CTS Wireless Pilot Status Quarterly Customer Meeting January 22, 2013.
Educause Chuck Bartel Wireless Andrew- An Update on Lessons Learned.
LHHS – BYOD Pilot Project (DRAFT) April – June 2012.
© 2003 Bluesocket, Inc. Proprietary and Confidential. Do not copy. Security, Management & Mobility of Wireless Networks (WLANs) Issues Approaches Solutions.
The State of Security Management By Jim Reavis January 2003.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Managed Host Security – Patch Management   BigFix Deployment April-September 2004 Jay Stamps, ITSS Turing Auditorium, May 21, 2004.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Introduction  Trinity guest network project objective  College wireless network overview  Public wireless/hospitality internet access  Guest network.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
TAKING COMPREHENSIVE DISTANCE-FLEXIBLE LEARNING TO THE NEXT LEVEL Prof. Dr. Karim Zerhouni Chief Information Officer Head of Sciences Division Prof. Dr.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
2007 Office of the CIO Technology Poll Results Information Technology Questions Office of the Chief Information Officer.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
2005 The Ohio State University Poll Results Information Technology Questions Office of the Chief Information Officer.
2006 Office of the CIO Technology Poll Results Information Technology Questions Office of the Chief Information Officer.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
GatorLink Password Management Policy March 31, 2004.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
BYOD BRING YOUR OWN DEVICE November 15, 2012 Ken Gibson IT Administrator - Twin Valley School District
2004 The Ohio State University Poll Results Information Technology Questions Office of the Chief Information Officer.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Frontline Enterprise Security
B.Y.O.D. Bring Your Own Device Considerations for Implementing an Open Mobile WiFi Campus By Kristin Morris M.E.T. program, June 2012 Boise State University.
Coming soon to Countryside Elementary. What is B.Y.O.T.? Bring Your Own Technology Purpose? embraces the importance of technology in the educational lives.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
XXIII HTASC Meeting – CERN March 2003 LIP and the Traveling Physicist Jorge Gomes LIP - Computer Centre.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
Kevin Watson and Ammar Ammar IT Asset Visibility.
IAUWS Implementing Advanced Cisco Unified Wireless Security (IAUWS) v CCNP Wireless It-Dumps.
1.4 wired and wireless networks lesson 1
Phase 4: Manage Deployment
Technology Policy and School Staff and Faculty
Chapter 1: Exploring the Network
COMPASS Program Presentation to Graduate Coordinators workshop series, July 12, 2016.
Integration of and Third-Generation Wireless Data Networks
BYOD: Short-term Gain Without Long-term Pain?
Loyola University Maryland
Employee Self-Service
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Network Neighborhood? Who’s on Your Wi-Fi?
EA C451 Vishal Gupta.
5th Grade 2017 Sope Creek Elementary School
Countryside Elementary
Distance Learning By MK.
IS4550 Security Policies and Implementation
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/snaptutorial.com
Free Dumps With Real Exam Question Answers | Free Update
CIS 349 Teaching Effectively-- snaptutorial.com
IS4680 Security Auditing for Compliance
Network Hardware – LO’s
Technology Policy and School Staff and Faculty
Online Learning.
Read this to find out how the internet works!
Coming soon to Countryside Elementary
SBS 2008 – One year on David Overton
Chapter 10. Mobile Device Security
CIAT CIS101A Week 4 Class 1 Networking.
Presentation transcript:

Past, present & future at Pepperdine University BYOD Past, present & future at Pepperdine University BYOD a new acronym for a long time issue

Pepperdine University “Obligatory campus slide,” as Educause speakers like to say.

Background Undergraduate 4 Graduate Schools Law Public Policy Business Education & Psychology Several thousand visitors yearly Educational context with implications for BYOD

Who is bringing devices? Undergrad students Grad students Professional practitioners among faculty Business, Education and Psychology Adjunct and Full-time Visitors Conferences Camps Significant populations with large BYOD impact.

4 Graduate Campuses You think anyone in these office towers is interested in using our WLAN and Internet? They’d like BYOD.

Rough BMOD Timeline 1992 LANs – hobbyist PC 1996 WLANs & Dorm LANs, Student PCs Brought my PC to the dorm. 1999 first personal PowerBooks and Portables – Classroom LANs Who is on our networks? Novell>MS transition & Internet vs. LAN users 2000-2003 Wireless revolution in full swing When we get a firewall, people can war drive behind it! 2007 first iPhones (led by CIO) 2008 WLAN & LAN access control – registration 2009 influx of mobiles, led by students The point is BYOD is not a 2011 or 2012 issue at Pepperdine, nor unless I miss my guess, is it on your campuses!

Current BYOD Goals Ease of connection Provide appropriate access What is our standard in 2012? Provide appropriate access What do visitors need? Guidance Common Services Prevent inappropriate access Limit visitors Hold campus users accountable for insecurity See our use policy at https://community.pepperdine.edu/it/security/policies – brief and to the point! Each BYOD user must subscribe.

Facilitating BYOD 2003 WLAN access control – session timeout Pros: Domain Integrated, Guest Access Cons: reauthentication, in-band, closed 2008 WLAN/LAN access control – registration Pros: Out of band, wide network & device support Enterprise authentication, IP network standards Settable user and device registration timeout Configurable user & device roles; remediation Minable information Cons: needs agent to tie NICs Systems facilitating BYOD

Agreement! Brief, readable use policy must be accepted

Data! Your system should be able to inform your decision making about IT services.

What’s next? Device security posture. Who manages it? Users: need helpers, helpers want monoculture System: do it for the user, across platforms Now: WSUS (Apr 2008) for domain connected systems New Rollout: Device Management Agent December > March this academic year University devices only (not BYOD) Web plug-in patches first Apple system patches, other Our users are most willing! However, they are have proven to be unable to consistently manage device security and updates. Successes in this area, both in usability and in compliance, have been when a system performs the necessary configurations and updates for the user.

What is our future? Access based on role > role+security? Now: Done wrong & you’re done. Done right, you’re in the last mile. Now: Visitor – limited Student, FacStaff, Guest – full Maybe: Student, FacStaff, Guest – no LAN, no ActiveSync Student, FacStaff + managed – full This is speculative and we can’t commit to this til we see the effectiveness of our new management system on University devices, WRT user experiences & compliance.

Questions! How do you… ? Why don’t you… ? Dr. Kim Cary CISO – Pepperdine University kim.cary@pepperdine.edu (310) 506-6655