Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting April 10, 2015 Information Security

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Networking Academy Advanced Technology Update June 19, 2008.
Page 1 Organize for Success IST Organization Design January, 2013 MALCOLM BERNSTEIN CONSULTING.
Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting December 5 th, 2014 Information Security
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 2: Logging in and out of OBIEE This course, Introduction.
TRIRIGA Anywhere 10.4 Beta Registration Steps
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Mobility Methods for document access while away from the office.
The Office of Information Technology Two-Factor Authentication.
Penn State University College Of Education Understanding College of Education Resources.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
Tyler Schultz L&S Administration 1 Welcome to the presentation: “Cloud Storage – Welcome to UW Box,” this presentation was included in the “Campus IT Tools”
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Cost Policy Training Sponsored Project Training Program April 30, 2012 Beverly Blakeney & Jennifer Gagnon April 30, 2012Sponsored Project Training Program1.
ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
K-12 Web & Content Filtering Michael I. DeBakey Network and Systems Administrator Lester S. Stoltzfus Director of.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Office 365 Overview Sara Grachek Craig Overboe Mary Shrode.
OFFICE OF BUDGET AND FINANCE Information Security Office Information Security Coordinators Meeting May 25, 2016 Information Security Office
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Education – Partnership – Solutions The New CISO Survival Guide Nate Howe Chief Information Security Officer University of Texas.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Project CLASP: Common Login and Access rights across Services Plan Goal  Propose a detailed plan to reduce the number of login/passwords entered by users.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
ORNL is managed by UT-Battelle for the US Department of Energy Multifactor Authentication June 15, 2016.
Decluttering Your Digital Life
Library IT - Security and Remote Access
From 0 to 34,000 Multifactor Users in Six Months
Multifactor Authentication
INFORMATION TECHNOLOGY NEW USER ORIENTATION
ISSeG Integrated Site Security for Grids WP2 - Methodology
Implementing bomgar remote support tool in the school of medicine
Education – Partnership – Solutions
Technology Services Multi-Factor Authentication gsw
IT Development Initiative: Status and Next Steps
doc.: IEEE <doc#>
How to Set up Remote Access to Personal U: drive
doc.: IEEE <doc#>
12 STEPS TO A GDPR AWARE NETWORK
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Connecting Remotely Winter 2014.
Getting Kids Connected with
INFORMATION TECHNOLOGY NEW USER ORIENTATION
doc.: IEEE <doc#>
Chapter 10: Advanced Cisco Adaptive Security Appliance
BTEC level 3 Learning Aim D.
Presentation transcript:

Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting April 10, 2015 Information Security

Information Security The University of Texas at Dallas Education – Partnership – Solutions Information Resources Update Presented by Information Resources Management

Information Security The University of Texas at Dallas Education – Partnership – Solutions CISO Update Presented by Nate Howe

Initiatives Firewall architecture review and reduction of “global allow” Identity Finder – disabled monthly scanning WordPress administrative pages SANS Securing the Human videos Information Security Office Education – Partnership – Solutions Information Security The University of Texas at Dallas Education – Partnership – Solutions

Information Security The University of Texas at Dallas Education – Partnership – Solutions 6 month collaborative drafting process, including more than 75 reviewers Replaces all “policy” documents formerly published by ISO Outlines expectations for secure use of University data and computing resources New Information Security and Acceptable Use Policy

Information Security The University of Texas at Dallas Education – Partnership – Solutions Convenient reference table covering applicability to personal and University data, on personal or University equipment Updated language for data classification: confidential, controlled, and public data References standards, rather than incorporating technical details into policy All portions of the policy are subject to exemptions Policy Highlights

Information Security The University of Texas at Dallas Education – Partnership – Solutions Will detail specific configuration requirements for key technologies in use across campus The first set of standards will cover: – Desktops and laptops – Mobile computing devices – Servers – Web applications We will be seeking input from technical specialists on campus Coming Soon: Standards

Information Security The University of Texas at Dallas Education – Partnership – Solutions 2-Factor Authentication Presented by Nate Howe & Brian McElroy

Problem to be Solved Direct deposit routing number changed Passwords can be obtained if recovery questions are predictable based on social media research Phishing victims provide username and password by or fraudulent website Information Security Office Education – Partnership – Solutions Information Security The University of Texas at Dallas Education – Partnership – Solutions

Information Security Office Education – Partnership – Solutions Information Security The University of Texas at Dallas Education – Partnership – Solutions

Information Security Office Education – Partnership – Solutions Information Security The University of Texas at Dallas Education – Partnership – Solutions

Information Security The University of Texas at Dallas Education – Partnership – Solutions What is 2-Factor Authentication? 3 Categories of authentication elements: Something you know Something you have Something you are

Information Security The University of Texas at Dallas Education – Partnership – Solutions What is 2-Factor Authentication? 3 Categories of authentication elements: Something you know (username, password, PIN, questions and answers) Something you have (ATM card, SecureID keychain, mobile phone) Something you are (fingerprint, retina, voice)

Information Security The University of Texas at Dallas Education – Partnership – Solutions What is 2-Factor Authentication? Video of Duo:

Information Security The University of Texas at Dallas Education – Partnership – Solutions What is 2-Factor Authentication? Traditional authentication only uses elements from the first category, such as username and password Reduced risk when using more elements from the first category, referred to as “multifactor authentication” Further risk reduction when using elements from two categories Authentication model should match the risk; ATMs use two factors because most people like cash

Information Security The University of Texas at Dallas Education – Partnership – Solutions Scope 2-Factor is the right thing to do for our high risk connections UT System memo defines August 31, 2015 target for: High-value PeopleSoft transactions, in particular direct deposit VPN remote access Remote administrative tasks [via external SSH]

April May June July August September -Initial committee meetings -Product decision Awareness campaign Letter to UT System 9/1 Moat & Mote for Admins - SSH Cisco VPN March Budget Proposal PeopleSoft Direct Deposit Change Draft Timeline

Information Security The University of Texas at Dallas Education – Partnership – Solutions Cloud Storage Update Presented by Brian McElroy

Information Security The University of Texas at Dallas Education – Partnership – Solutions Cloud Storage Update We have reviewed and approved several storage providers for various use cases We endorse box.com for the most allowed purposes This month we are launching utdallas.edu/cometspace Table indicating allowed use cases Frequently Asked Questions Link to our box.com instance

Information Security The University of Texas at Dallas Education – Partnership – Solutions Box.com The service is live – Login using your NetID and password 100GB storage quota Departmental shared folders are available 500+ early adopters are already using the service Very few questions, even with our FAQs not available yet

Information Security The University of Texas at Dallas Education – Partnership – Solutions Questions & Discussion Information Security