Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Creating Executive Awareness about Information Security Joy Hughes, VP, George Mason Univ. Jack Suess, VP, UMBC EDUCAUSE.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
David A. Brown Chief Information Security Officer State of Ohio
Making the Case for Security: An Application of the NIST Security Assessment Framework to GW January 17, 2003 David Swartz Chief Information Officer Guy.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 Telstra in Confidence Managing Security for our Mobile Technology.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Awareness is the Key to Security
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
CYBER CRIME AND SECURITY TRENDS
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Website Hardening HUIT IT Security | Sep
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
ELI Online Participant Orientation Session January 24, 2013 From Denver, Colorado.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Data Privacy Day 2012 on Campus Jolynn Dellinger Program Manager, Data Privacy Day National Cyber Security Alliance.
A First Course in Information Security
Rodney Petersen Security Task Force Coordinator EDUCAUSE
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
A Cyber- Security Portal for Southern Africa Dr. Johan van Niekerk & Prof. Rossouw von Solms.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
South Western School District Differentiated Supervision Plan DRAFT 2010.
United States Department of Justice Global Security Working Group Update Global Advisory Committee November 2, 2006 Washington, D.C.
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
EDUCAUSE 2005 Annual Conference October 19, 2005.
TIF-Security Update Robert Ono, IT Security Coordinator October 2010.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
SHARING SOCIAL MEDIA academic and professional information through.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Information Security in Laurier Grant Li Wilfrid Laurier University.
An Introduction to the USENIX Association The Advanced Computing Systems Association.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
OIT Security Operations
EDUCAUSE/Internet2 Computer & Network Security Task Force
Educause/Internet 2 Computer and Network Security Task Force
Security Aspects of Web Site Design
Information Security Seminar
I have many checklists: how do I get started with cyber security?
Curating an Effective Security Culture
Security Aspects of Web Site Design
How to Mitigate the Consequences What are the Countermeasures?
Introduction to the PACS Security
Presentation transcript:

Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE Live! October 6, 2004

2 Agenda What is security awareness? Why is awareness important? Awareness and Higher Education  EDUCAUSE Security Education & Awareness Working Group  Higher Education Events in October  Cyber Security Resources CD  GW’s Cyber Security Awareness Day Questions

3 What is Security Awareness? Security awareness is knowledge of potential threats. It is the advantage of knowing what types of security issues and incidents members of your organization may face in the day-to-day routine of their University functions. Technology alone cannot provide adequate information security. People, awareness and personal responsibility are critical to the success of any information security program.

4 Why is Security Awareness Important? Security is only as strong as it’s weakest link. Security relies on people. Technology is important, but if people are unaware of security issues, even the best technology will not ensure that information is protected. If people are ill-prepared, information is threatened by:  Social engineering  Abuse of privileges and trust  Misuse of systems and network  Password guessing  Physical access to bypass controls  Theft of laptops, storage media, and other technologies  Accidental disclosure  Financial Fraud

5 Awareness and Higher Education

6 Security Task Force Education & Awareness Working Group Mission/Purpose: The Education and Awareness Working Group will identify and take steps to implement and/or publicize various methods by which awareness of information technology security issues are raised amongst university and college computer and network users, administrators, and executives.

7 Security Task Force Education & Awareness Working Group Team Goals/ Expected Outcomes (Deliverables and Metrics): The team will: 1) Identify current projects and current materials and methods (primarily developed within the higher education and non-profit communities, but also vended products) where they have been proven to be (or may be) particularly useful to universities and colleges. 2) Use existing methods available via EDUCAUSE and Internet2 to publicize identified offerings. 3) Where gaps may exist in available offerings, commission development of programs or materials as needed.

8 Higher Education Events in October Meeting IT Challenges: National Strategies and Local Solutions Virginia Alliance for Secure Computing and Networking (VASCAN) and The Association of Collegiate Computing Services (ACCS) Charlottesville, VA October 11-12, ts/vascan_accs/index.htm Symposium on Cybersecurity Policy National Press Club in Washington, DC October 12-13,

9 Higher Education Events in October Guide to Implementing an Effective Security Education & Awareness Program EDUCAUSE 2004 Pre-Conference Seminar Denver, Colorado October 19, 1-4:30 p.m. EM11P&ME NSCA’s National Cyber Security Awareness Month Focus on Education Week Three October 18 – 22,

10 Cybersecurity Awareness Resources CD The Education & Awareness Working Group of the EDUCAUSE/Internet2 Security Task Force compiled cyber security awareness resources that will be distributed on a CD. The resources were collected to showcase the variety of security awareness efforts underway at institutions of higher education and to provide resources for colleges and universities that are looking to jump-start a program for their organization.

11 What’s on the CD? Pamphlets Post Cards Presentations Security Awareness Documents Security Cards Security Tools Security Quizzes Surveys Videos Book Marks Brochures Checklists Flyers Games Government Resources Handouts Industry Resources Links to School’s Security Web Page(s)

12 GW’s Cyber Security Awareness Day November 1, 2004 Targeted to GW Community but open to the public Two main events: Cyber Security Awareness Forum Cyber Security Awareness Fair FREE – thanks to help from sponsors!

13 Cyber Security Awareness Forum Four speaker sessions “Cybersleuths: High Technology Crime Investigators” Panel Topic – “How Direct Recording Electronic (DRE) voting machines can do tomorrow what a paper ballot count could not do in the 2000 election.” “Information Security: From Brains to Bits” "Exploitation and Countermeasure in Open- access High-speed Networks"

14 Cyber Security Awareness Fair Tables with Games PC Security - Personal Firewalls and Patching Virus Clinic Strong Authentication Creating Good Passwords Identity Theft Incident Response GWireless Peer to Peer Information Security Handouts Other Attractions Mobile Information Warfare Lab Security Videos Area Door Prizes Popcorn Stand Cotton Candy Stand Caricaturist Fortune Teller Cyber Guy and Cyber Gal to engage the community

15 Questions? Contact  Krizi Trivisani