Auburn Information Technology

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
EC Group, LLC Part of the NSLP team. Financial Aid Community College Enrollment Management & Student Success Strategies Pathways to College & Beyond October.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
RSA Attack Analysis Karl F. Lutzen, CISSP S&T Information Security Officer.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Phishing – Read Behind The Lines Veljko Pejović
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Information Security Phishing Update CTC
Marketing of Information Security Products. The business case for Information Security Management.
2013 Pennsylvania Donate Life Hospital Challenge Plan Activities, Register Donors, and Win Gold!!! Kelly Hoover Thompson – HAP John Green – Gift of Life.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Cyber Security & Fraud – The impact on small businesses.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
ACS Encryption- Filter Audit Product of ACS Encryption Services.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Information Security: Current Threats Marc Scarborough Information Security Officer
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
October 28, 2015 Cyber Security Awareness Update.
ArchPass Duo Presentation
Pace University | Information Technology Services
Louisiana State University
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Cybersecurity - What’s Next? June 2017
Michael Menne IT Solutions Chief Information Security Officer
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Lessons Learned in Managing IT Risk
Bank ReBIT - Operational Excellence Webinar Series (DMARC)
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Team 2 – understand vulnerabilities
Cyber Security Awareness Workshop
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Dissecting the Cyber Security Threat Landscape
Presented by: Brendan Walsh Manager, Security and Access Management
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
Today’s Risk. Today’s Solutions. Cyber security and
HRL Update: Human Resource Development
IT Development Initiative: Status and Next Steps
Cyber attacks on Democratic processes
Strong Security for Your Weak Link:
Threat landscape financial sector
Curating an Effective Security Culture
Keeping your data, money & reputation safe
The Critical Incident Notification System (CINS) Update C. H. E. C. O
Anatomy of a Large Scale Attack
Policies and Procedures to Protect you, your Office and your Data
Information Security Update
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Employee Cybersecurity Program
XX XX $ $ Dark Web Scans Simulated Phishing
Dark Web Domain Status Report
DATA BREACHES 6 4 , 9 3 There were…
Multi-factor Authentication Jacob Farmer
Fy ‘08 NETWORK PLANNING TASK FORCE
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Auburn Information Technology Cyber Security Risks & Strategies 11/13/2018 Auburn Information Technology Cyber Security Update

Cyber Security risks to Auburn Threat statistics: Processed 231M emails August 1-31 92.2% of email in August contained some form of malware/SPAM 350 viruses blocked at the border 120 compromised accounts just in Aug. Projecting 500+ in 2017 (currently @ 341) 241 incidents in all of 2016 115 incidents in all of 2015 Credit card fraud will cost Americans $16B in 2017 (per CNBC) Equifax breach – unpatched web server $16B – CNBC $24B – Digital Shadows Security 11/13/2018 Auburn Information Technology Cyber Security Update

Solutions to these risks 2-Factors (2FA) Security Roll-out Clean-up Old Data Continue scanning and threat monitoring Implemented automated patching tools for IT staff Education and Awareness Campaigns – Phishing, Equifax Auburn Cyber Security Center 11/13/2018 Auburn Information Technology Cyber Security Update

Auburn Information Technology Cyber Security Update More Information June 27 – [To: Ditmc] Training Message – Compromised Credentials June 30 – [To: IT Providers] 2-Factor (Duo) Registration Lists & Support Docs August 11 – [To: IT Providers] List of users not Duo registered August 25 –[To: Campus Leadership] Data Clean-up Project August 15 – [To: Provost Fall Leadership Team] General Security Update August 21 – [To: Students] – Phishing Information Sept 13 – [To: IT Providers] Sending messages about Duo enrollment Sept 13 – [To: IT Providers] Upgrades (includes “2-Factor Authentication”) Sept 13 – [To: (Targeted) Employees not registered] Duo Security enrollment Sept 13 – [Auburn News] DUO security/2-Factor authentication expanding Sept 13 – [Auburn News Article] Equifax Data Breach Information Sept 13 – [To: Campus] OIT homepage – Cyber Security Central Link 11/13/2018 Auburn Information Technology Cyber Security Update