Working Together to Improve Cyberintelligence in the Big Ten

Slides:



Advertisements
Similar presentations
International Course on Development and Disasters with Special Focus on Health February 10 – 21, 2003: St Anns, Jamaica CDERA Experience in Institutional.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Security Controls – What Works
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Network security policy: best practices
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
12/12/2013 Cluster Workshop on Cybersecurity 1 Michele Bezzi (SAP) Kazim Hussain (ATOS) SecCord & CYSPA Projects.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Top Threats WG Co-Chair Jon-Michael Brook. Agenda About our Top Threats Polling the industry Call for participation Categorizing our Top Threats.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SecSDLC Chapter 2.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Albany Bank Corporation Security Incident Management Program.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
SIEM Rotem Mesika System security engineering
Multifactor Authentication
OIT Security Operations
BruinTech Vendor Meet & Greet December 3, 2015
Deployment Planning Services
Background Post-transplant outcomes in adult Fontan patients remain poorly defined. Available studies limited to sub-groups within published registry data.
Cybersecurity - What’s Next? June 2017
Data Management Program Overview
FY17 End of Year Goals Summary FY17: Top 40 Goals Assessment
Automating Security Frameworks
“Introduction to Azure Security Center”
Socializing Attack/Defense Trees to Prevent Misuse
Presented by Jon Pastuszynski, Lead M&D Engineer
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Deployment Planning Services
California Cybersecurity Integration Center (Cal-CSIC)
Third Party Risk Governance in a Diverse Environment
Advanced Threat Protection
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Harvard CRM Service Strategy
Joe, Larry, Josh, Susan, Mary, & Ken
Instantiation of the Concept in GAMMA Prototypes
Shared Services Open Forum
I have many checklists: how do I get started with cyber security?
Information Security Services CIO Council Update
8 Building Blocks of National Cyber Strategies
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security in the Mortgage Industry
Auburn Information Technology
How to Operationalize Big Data Security Analytics
Strategy: If you don’t know where you’re going, you’ll never get there
Stop Data Wrangling, Start Transforming Data to Intelligence
Enterprise Cybersecurity Upgrade Initiation Department of Information Technology Maria Sanchez, Acting State CIO November 13, 2018.
Cybersecurity ATD technical
Risk Mitigation & Incident Response Week 12
Red Sky Update “Watching the horizon for emerging health threats”
2018 Civic Engagement Institute
Microsoft Data Insights Summit
DSC Contract Management Committee Meeting
Fy ‘08 NETWORK PLANNING TASK FORCE
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Enterprise Cybersecurity Initiative Department of Information Technology Vince Martinez, State CIO, Executive Sponsor Lorenzo Ornelas, Managing Director.
Presentation transcript:

Working Together to Improve Cyberintelligence in the Big Ten Helen Patton, Ohio State University Robert Turner, University of Wisconsin Don Welch, University of Michigan

Agenda Threat OSU Strategy U-W Strategy U-M Strategy Collaborations Personal Technical Legal Conclusions

Threat

In the News UCF alumni sue school over data breach

Value to Attackers $50-100 per identity $17 per credit card Medicare and insurance fraud Intellectual property Tracking dissidents Blackmail Turning spies

OSU Strategy FY16-17 Projects: Security Framework Enhance and Expand Security Functions: Identity and Access Management Security Operations Endpoint Protection Security Governance (Policy, Assessments & Awareness) FY16-17 Projects: Multi-Factor Authentication Training & Awareness Phishing Website Training Vulnerability Management

U-W Strategy (Year 2) Planned Buys FY16/17 Working hard to get… Complete RMF Pilot in May 5 year phase in SETA (Security Education, Training and Awareness) IT/Security Staff (April) Student (Pilot Complete) Partnerships Industry & Government Others in Higher Ed Planned Buys FY16/17 End Point Protection (Currently in source selection) SIEM (RFP by May) Working hard to get… ATP Phase I – NGFW ATP Phase II – SOC Tools ATP Phase III – Extend to UW System & 24/7 Ops

U-M Strategy One Program 4 Levels of Information Uniform risk Centralized detection 4 Levels of Information Focus on the top 2 Make the right choice the easy choice Services

Gartner Attack Chain Strategy Time Real-Time/Near-Real-Time Post Compromise Where to Look Network Network Traffic Analysis Network Forensics Payload Payload Analysis Endpoint Endpoint Behavior Analysis Endpoint Forensics

U-M Strategy Policy People Revision to meet the strategy Points to 16 Standards DR Plans People Building Academic Medical Center IA Program and team Creating detection teams Centralized IA Team

U-M Strategy Technology MFA Expansion IAM Program Advanced Detection Capability Network Traffic Analysis, SIEM, NGFW, Threat Intelligence Enclaves for Level 3 and 4 General Purpose and Research

Collaborations

Personal CIC CISOs Data Sharing Agreement Started an “Information Sharing Sub Committee” Initial action items and goals: Learning current state of incident response dashboards, queries and alterations Improving the SOC capabilities of CIC schools Improving cross institution incident detection by sharing early warning information Additional activity: Define a mechanism to share process documents (i.e., Google Docs) Define a common format to share indicators of compromise (Collective Intelligence Framework - CIF) Define types of indicators of compromise (significant events vs. routine) Define Traffic Light Protocol definitions

Cybersecurity Information Sharing Map

Technical

Principles The data should be as vendor agnostic as possible When sharing time-sensitive threat data, the solution should be as automated as technically and procedurally feasible Though Splunk is not universally used, Common Information Model (CIM) compliant field extractions will be used to define how log entries will be interpreted and labeled The Collective Intelligence Framework (CIF), a format used by REN-ISAC to share threat intelligence data, will be used to transfer the data. Traffic Light Protocol (TLP) could be considered when determining when to share threat intelligence data.

Phase 1 Initial options that allow schools to exchange data manually. The final production system will require some development work. Indicators of Compromise (IOC) will be shared via the email group. Surface any concerns such as data format criteria and applicability. Identify and prioritize the most critical incidents and corresponding IOCs. Develop and share Splunk queries and dashboards.

Phase 2 Automated data exchange (IOC) between CIF Servers Shibboleth API keys Splunk queries will be shared via a GitLab instance Hosted by UM Secured using Shibboleth. Email group will be used to Communicate status Coordinate improvements Share any data that does not fit into the other 2 categories.

Current State Proof of concept CIF server installed and tested Production server is being built The GitLab instance is built and ready The Shibboleth configuration is underway The email group is being used to Work out the details of which IOCs to share Serves as a discussion forum for the efforts The group continues to meet every 2 weeks.

Legal Data Sharing Agreements Enables: IOC/Threat Sharing and Modeling With Security AND Management Shared Security Assessments/Results Incident Response Collaboration Product evaluation collaboration

Conclusions Don’t let bureaucracy get in your way Use the teams you have, and/or use your vendors Leverage the influence of higher ed Crawl, walk, run Need strong CIO commitment

Questions?