Addressing Information Security at Heller October 16, 2013 secureHeller.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
The System Center Family Microsoft. Mobile Device Manager 2008.
Region 4 Pre-SFIREG October What We Will Cover Today Executive SummaryCompany ProfileWhy Use iCBT?iCBT OverviewiCBT Step-by-StepAgency Tools & ReportsSecurity.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Security Controls – What Works
Information Security Policies and Standards
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Understanding Active Directory
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Stephen S. Yau CSE , Fall Security Strategies.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Security Guide for Interconnecting Information Technology Systems
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
HIPAA COMPLIANCE WITH DELL
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Lowe’s Certification and Accreditation.  Systems Boundaries and Functions  Vulnerabilities, Threats, and Threat Sources  Annual Loss Expectancy  Identification.
California State University, Northridge Certification Process Team B Carlos Guzman John Kramer Stacey LaMotte University of Phoenix.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
The University of Georgia. /1002 Ensure that the University is appropriately managing risk to information assets and information services.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Module 6: Designing Security for Network Hosts
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Chap1: Is there a Security Problem in Computing?.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
In Depth Security Review Martin Rogers Computer Horizons Corp. © Copyright eB Networks All rights reserved. No part of this presentation may be reproduced,
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Security and Ethics Safeguards and Codes of Conduct.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Personal data protection in research projects
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Managed IT Services JND Consulting Group LLC
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Computers in the Ambulatory Care Setting
Working at a Small-to-Medium Business or ISP – Chapter 8
Secure Software Confidentiality Integrity Data Security Authentication
Move this to online module slides 11-56
County HIPAA Review All Rights Reserved 2002.
Bethesda Cybersecurity Club
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
IS4680 Security Auditing for Compliance
Lesson 1: Introduction to HIPAA
PLANNING A SECURE BASELINE INSTALLATION
Cloud Storage-as-a-Service and Course Reflection
Session 1 – Introduction to Information Security
Fy ‘08 NETWORK PLANNING TASK FORCE
Bethesda Cybersecurity Club
Presentation transcript:

Addressing Information Security at Heller October 16, 2013 secureHeller

Security Awareness Welcome to the secureHeller, the program focused on addressing Heller’s information security. Simplified Usability Data Protection Tools Network Protection Tools secureHeller

Security Awareness Our key focus is to educate the Heller community, including all staff, faculty and students, on information security concepts through various channels including user training and web-based tools. Annual User Training for Information Security Training will be provided for every Heller user. Will include overview of Policies and Processes and will touch on all of the major areas of information security. Code of Conduct Each Heller faculty, staff and student will be responsible for reading the Security Policy and signing the Code of Conduct. Periodic Updates The Information Security Policy manual and other frequently used documents will be available online at myHeller to all students, faculty and staff. secureHeller

Simplified Usability The key focus of this Information Security initiative is to provide value to the Heller research community through improved security for research data, assurance to our funders and an enhanced Data Management Plan. Data Management Plan Robust data privacy protections for original physical research media and any copies, including maintaining an inventory of data files and managing physical access to them for the duration of each Data Use Agreement (DUA). Centralized Documentation Data Use Agreements (DUA’s), Certificates of Disposition (COD’s), Chain of Custody for Physical Media, et al will be maintained centrally at Heller. Proposal Support The Heller Information Security Policy is available on myHeller, for use in proposal writing, and will provide assurance to funders. Other frequently used documents are on myHeller, including Data Destruction Policy and Certificate of Disposition. secureHeller

Data Protection Tools Our key focus is to protect both Heller’s data and funders’ data that is housed on individual workstations. Secure Data Center The on-site data center is locked at all times. Only authorized personnel can access the room using an identification card reader Our safeguards comply with the Physical Security Requirements and Best Practices for NIST/HIPAA/ISO File Backup and Storage The Heller community has access to file storage that is backed up twice a day on the Heller file share. However, sensitive information should not be stored on the file share. For sensitive information we can back it up in the secure domain on a project by project basis. Encryption Software If research projects require encryption, the secureHeller group can provide full disk and removable media encryption. secureHeller

Network Protection Tools The goal is to protect Heller servers and clients from network intrusions and attacks. Server and Internet Firewalls Protect Heller’s stored data from incoming threats. Incident Management Framework Defines what is a security incident and what steps need to be taken. Network Administration Recent hire of a Heller network administrator. There is an ongoing partnership with LTS to work with Heller. Support includes dedicated Heller ticket queue for issues. VDI - Virtual desktop infrastructure In the secure research environment, we are now using virtual desktops which allow Heller Researchers to work in an isolated secure environment for confidential data. Authorized users will be able to interact with and manipulate confidential data, while providing a high degree of assurance against data loss. secureHeller

Next Steps 1.Read the Information Security Policy on myHeller at heller.brandeis.edu 2.Sign the Code of Conduct and give to Debbie DeWolfe – Schneider cube Look for Information Security documents on myHeller webpage 4.Feel free to share comments and suggestions – this is a living document 5.Questions? secureHeller