Matt Langford, UNC Mike Hart, MSU Denver

Slides:



Advertisements
Similar presentations
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Advertisements

How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
City of Chicago Certification & Compliance System
Information Security Phishing Update CTC
Director of Research, SANS Institute
IT security By Tilly Gerlack.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
HOW TO VIEW YOUR BILL ON JOE’SS. 1. Go to Campus Finances Log on to Joe’SS, then click on “Student Center”, and then “Campus Finances”
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
CERT AM: Securing NREN in Armenia. Armenian NREN ASNET AM – Connecting more than 40 academic institutes of NAS RA and more than 10 other research, educational.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Microsoft Data Insights Summit March 22-23, 2016, Bellevue, Build 2016 March 30 – April 1,
Avira Home Office Products: In the year of its 30th anniversary, Avira is going from strength to strength! No experiments when it comes to security.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
EDUCAUSE/Internet2 Computer & Network Security Task Force
Exchange Online Advanced Threat Protection
Louisiana State University
MALWAREBYTES ANTIVIRUS SUPPORT
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
From Red Light to Yellow Light
Report Phishing Forward phishing s to
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Demo Advanced Threat Protection
Call AVG Antivirus Support | Fix Your PC
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
4 ways to stay safe online 1. Avoid viruses and phishing scams
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Office 365 Security Assessment Workshop
Success with Collaboration Software
Microsoft Lync / Skype for Business
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Auburn Information Technology
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Welcome and thank you for choosing SharkGate
Real World Advanced Threat Protection
Report Phishing Forward phishing s to
Unique features of Bitdefender Cloud Security for MSPs
Perkins September 2014.
Cyber Security Culture
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
G Suite, Office 365, Slack & More
Training 101 : Accessing iBoomerang Tools
How to Do a Custom Scan with Bitdefender Antivirus?
Information Protection
Spear Phishing Awareness
5/30/ :10 PM Turn to for the expertise you need to help you safeguard your business data. We know IT security and we know.
Phishing 101.
<offer name> with Microsoft 365 Business Secure Deployment
Phishing Don’t get caught!.
JISC FRAMEWORKS FOR CYBERSECURITY Implementation at Havering College
Office 365 Security Features For SharePoint Admins
Peer Cybersecurity Assessments: For and by Higher Education
Information Protection
Cybersecurity Simplified: Phishing
“Workplace Behaviour: Activating your greatest security asset”
Thames Valley Chamber / Claire Logic
Phishing Don’t get caught!.
Presentation transcript:

Matt Langford, UNC Mike Hart, MSU Denver CISO ROUNDTABLE Matt Langford, UNC Mike Hart, MSU Denver

Office 365 Advanced Threat Protection (ATP) On 7/31/17, IM&T deployed ATP to all faculty, staff and student email accounts. ATP helps protect your mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it complements the security features of Exchange Online Protection to provide better zero-day protection. Safe Attachments – Scans all attachments for malware prior to delivery Safe Links – Rewrites links in emails making it easy to block malicious sites Knowledge Center Keyword: ATP Or click here for more information: https://uncoit.atlassian.net/wiki/pages/viewpage.action?pageId=50167845#Spam&JunkEmail-Office365AdvancedThreatProtection

MSU Denver Security Team Toolkit External sources for alerts – REN-ISAC, Educause Constituent Groups, Infraguard, HaveIBeenPwned, Pastebin, US-CERT.gov, others Internal sources for alerts – Daily Log Reviews, SPAM@MSUDenver.edu, O365 reports, InsightIDR, others Training resources – Campus Security Training, ITS Staff Security Training, Conferences Security Advocates in Other Departments

Recent Security Challenges Discontinued Managed Security Service Provider New Tools Uncovering New Issues Bill Burr and NIST 800-63 NIST 800-171 Pastebin with username/password list Kaspersky

Security awareness efforts

Thank you