October 16, 20061 Network Planning Task Force Information Security Strategy.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Security for Mobile Devices
The International Security Standard
1 NETWORK PLANNING TASK FORCE August 2, 2004 “SUMMER FOCUS GROUP SESSION ”
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Security Controls – What Works
1 10/31/05 NETWORK PLANNING TASK FORCE Information Security.
Chapter 17 Controls and Security Measures
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
1 NETWORK PLANNING TASK FORCE November 15, 2004 FALL FY 2005 MEETINGS “STRATEGIC DISCUSSIONS”
11/29/20041 Network Planning Task Force “Consensus Building: Preliminary Rate Setting”
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 NETWORK PLANNING TASK FORCE November 01, 2004 FALL FY 2005 MEETINGS “OPERATIONAL DISCUSSIONS”
1 NETWORK PLANNING TASK FORCE August 16, 2004 SUMMER FOCUS GROUP SESSIONS “SETTING THE AGENDA”
1 NETWORK PLANNING TASK FORCE “ SUMMER PLANNING SESSIONS ” 8/01/05.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Network Planning Task Force Strategy Discussions.
1 NETWORK PLANNING TASK FORCE September 20, 2004 FALL FY 2005 MEETINGS “OPERATIONAL BRIEFING”
12/1/20031 Network Planning Task Force “Consensus Building: Preliminary Rate Setting”
Network Planning Task Force Network Strategy Discussions.
1 NETWORK PLANNING TASK FORCE FY’07 “ Setting the Rates” 11/20/06.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 NETWORK PLANNING TASK FORCE “ SUMMER PLANNING SESSION ” 08/21/06.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
1 NETWORK PLANNING TASK FORCE Fall Agenda Setting and Focus Group Planning
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
FY ‘08 NETWORK PLANNING TASK FORCE Fall Agenda Setting and Discussion
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
How Safe Is Your Mobile Information? Issues and Safeguards for Mobile Devices Dan Morrissey, CHSP Catholic Health Initiatives Fourteenth National HIPAA.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security considerations for mobile devices in GoRTT
Chapter 6 of the Executive Guide manual Technology.
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
1 NETWORK PLANNING TASK FORCE “ FY ’06 FALL SESSIONS ” 10/03/05.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Note1 (Admi1) Overview of administering security.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
NPTF Planning Session 6 April FY ‘10 NPTF Members 2  Robin Beck, ISC  Michael Palladino, ISC (Chair)  Mark Aseltine /Amy Phillips, ISC  Gary.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
NPTF Strategy Session May FY ‘10 NPTF Members 2  Robin Beck, ISC  Michael Palladino, ISC (Chair)  Mark Aseltine /Amy Phillips, ISC  Gary Delson.
Chapter 2 Securing Network Server and User Workstations.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Scott Charney Cybercrime and Risk Management PwC.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
IS3220 Information Technology Infrastructure Security
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Payment Card Industry Data Security Compliance
Security week 1 Introductions Class website Syllabus review
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

October 16, Network Planning Task Force Information Security Strategy

2 NPTF FY ’07 Members ■ Mary Alice Annecharico/Rod MacNeil, SOM ■ Robin Beck, ISC ■ Chris Bradie/Dave Carrol, Business Services ■ Cathy DiBonaventura, School of Design ■ Geoff Filinuk, ISC ■ John Keane/ Grover McKenzie, Library ■ John Irwin, GSE ■ Marilyn Jost, ISC ■ Deke Kassabian /Melissa Muth, ISC ■ Doug Berger/ Manuel Pena, Housing and Conference Services ■ Mike Weaver, Budget Mgmt. Analysis ■ Dominic Pasqualino, OAC ■ James Kaylor, CCEB ■ Helen Anderson, SEAS ■ Kayann McDonnell, Law ■ Donna Milici, Nursing ■ Dave Millar, ISC ■ Michael Palladino, ISC (Chair) ■ Jeff Fahnoe, Dental ■ Mary Spada, VPUL ■ Marilyn Spicer, College Houses ■ Steve Stines / Joseph Shannon, Div. of Finance ■ Ira Winston, SEAS, SAS, School of Design ■ Mark Aseltine/ Mike Lazenka, ISC ■ Ken McCardle, Vet School ■ Brian Doherty, SAS ■ Richard Cardona, Annenberg ■ Deirdre Woods/Bob Zarazowski, Wharton

3 Meeting Schedule – FY ‘07 ■ Meetings 1:30-3:00pm, 3401 Walnut Street ■ Fall Meetings / Process ■ Intake and Current Status Review – August 21 ■ Agenda Setting & Focus Group Planning – September 18 ■ Strategy Discussions – October 2 ■ Security Strategy Discussions – October 16 (357A) ■ Strategy Discussions – October 30 ■ Prioritization – November 6 ■ Focus Group Feedback – November 20 ■ Rate Setting – December 04

4 Security Feedback from 8/21 ■ Review of what we are currently doing and where we are going and policy impact on LSPs. ■ Review of each step and our response/procedures including prevention, detection, escalation, impact of incidents and forensics. ■ Connecting the appropriate people – having a local security provider and a privacy security liaison. ■ A need for low probability / high catastrophe case studies with a playbook type response. (Business continuity type tabletop exercises) Brown bag lunch? ■ Encryption ■ Scan and Block

5 Other security concerns or priorities?

6 FY07 Information Security Initiatives ■ Achieve Full Payment Card Industry Standards Compliance ■ Scan and Block available for implementation in 5 or more University areas. ■ SPIA ■ Complete Early Adopters project ■ Implement Risk Management and Reporting ■ Pilot Campus Authorization Service ■ Evaluate Security Incident Tracking and Management ■ LSP Security Certification ■ 2007 SANS Windows Security Class

7 Possible Policy Directions Jul 1, 2007■ Scanned monthly ■ Password cracking twice/year ■ Accounts disabled when employees leave ■ Physically secure ■ Management overseen by full time IT ■ professional Jul 1, 2008■ Mandatory backup and recovery for ■ Operational Data ■ Firewall (or comparable) for confidential data Jul 1, 2009■ Intrusion detection for confidential data ■ Schools/Centers must identify Personal Computing Devices that pose a significant threat and employ encryption and personal firewall

8 Encryption ■ Pros ■ Encrypting disks or file systems are now widely available within operating systems of all supported platforms. ■ Offers considerable protection from some of our most likely threats: theft of portable computing devices, if used in conjunction with other methods. ■ Cons ■ Associated support cost and limited pilot experience ■ Risk of total loss of data requires backup of encrypting keys. ■ Will require additional spending on storage. ■ Not widely available as standard option in common PDAs.

9 Personal Computing Device Security ■Scope: Laptops, PDAs, Blackberries, Treos, USB storage, iPods, etc. ■Background/Issues ■Specifically included in “risk assessment” section of proposed critical host policy. ■PDAs not as mature a market as desktops/laptops w/r/t security. Solutions are many and varied. No silver bullets -- lots of point solutions for many and varied devices. Sometimes security can be achieved with configuration changes, but sometimes requires 3rd party products. ■Personal ownership and shared family use at home complicates matters.

10 Possible Personal Computing Device Security Strategy ■ Short-term ■ Require basic protections such as encryption, strong passwords, anti-virus (where available) and best practice configuration. ■ Long-term ■ Preference to keep confidential data off of personal computing devices. ■ Otherwise, waiver required with compensating controls. ■ Provide secure remote access to secure, decentralized servers ■ May require broad use of virtual private networks or comparable feature. ■ Standards apply irrespective of ownership ■ Devices are for exclusive use of employee

11 Possible Plans FY07FY08FY09Beyond ■ Create documentation for recommended security configurations for most common devices ■ Evaluate 3rd party mobile data security tools and services. ■ Develop a secure remote access strategy. ■ Develop a strategy for protecting mobile devices, poss. to include key recovery ■ Pilot a central file service (e.g. WebDav). ■ Pilot mobile data security tools as appropriate ■ Design and implement secure remote access pilot. ■ Develop decentralized IDS strategy. ■ In policy, require encryption of confidential data. ■ Roll out WebDav, secure remote access, mobile security tools as approp. ■ Design and pilot decentralized IDS. ■ In policy, forbid confidential data on portable devices without a waiver. ■ Universal access control: authentication, scan and block ■ Perimeter firewall