Higher Education-Industry Collaborations to Improve Security Joy Hughes, George Mason University Peter Siegel, University of California, Davis Jack Suess,

Slides:



Advertisements
Similar presentations
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Advertisements

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
David A. Brown Chief Information Security Officer State of Ohio
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Mark S. Bruhn, Interim Director University Copyright.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
Security Controls – What Works
Information Security Policies and Standards
REN-ISAC Update Doug Pearson, REN-ISAC Technical Director DICE 12 February 2008 Athens, Greece 1.
1 REN-ISAC Research and Education Networking Information Sharing and Analysis Center Internet2 Member’s Meeting Chicago 5 December 2006.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
REN-ISAC Research and Education Networking Information Sharing and Analysis Center.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Network security policy: best practices
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
ERP Risks, Security Checklist, and Priorities for Change Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
EDUCAUSE Security Conference Denver, Colorado April 10 to 12, 2006 Bob Beer Biggs Engineering 117 (419)
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
Security Professionals Conference May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
PROJECT OBJECTIVES Identify, procure, and implement software that provided a common system for students, faculty, and staff to enter and measure.
2 Overview With active participation from individuals and chapters all over the world, the Information Systems Security Association (ISSA)
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information Sharing Challenges, Trends and Opportunities
Shared Darknet Project Internet2 Spring 2006 Member Meeting Doug Pearson Technical Director, REN-ISAC.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
NSF Cybersecuity Summit May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within the higher.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC Doug Pearson Director, REN-ISAC Copyright.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC Doug Pearson Director, REN-ISAC
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
1 REN-ISAC Update Research and Education Networking Information Sharing and Analysis Center Joint Techs Madison WI July 2006.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Spring 2004 Internet2 Member Meeting NLR Service Center Update Dave Jent Indiana University.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
A network of European National Platforms and Focal Points for Natural Disaster Reduction Common Goals To facilitate and improve the exchange of information.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
EDUCAUSE/Internet2 Computer & Network Security Task Force
Higher Education Information Security Council
Educause/Internet 2 Computer and Network Security Task Force
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Corporate Forum Presented by
Presentation transcript:

Higher Education-Industry Collaborations to Improve Security Joy Hughes, George Mason University Peter Siegel, University of California, Davis Jack Suess, UMBC

Security Task Force Goals The Security Task Force (STF) has been pursuing the following strategic goals since 2003: Education and Awareness Standards, Policies, and Procedures Security Architecture and Tools Organization and Information Sharing

STF Priorities for Strategic Plan: Making Progress on Data Protection, Risk Assessment, Incident Response and Business Continuity 1.Executive Commitment and Action 2.Professional Development for Information Security Officers (ISOs) 3.Awareness of Available Resources 4.Security of Packaged Software 5.New Tools and Technologies

Awareness of Resources EDUCAUSE/Internet2 Security Task Force  Blueprint for Handling Sensitive Data  Cybersecurity Awareness Resource Center  Data Incident Notification Tool  Information Security Governance Assessment Tool  Risk Assessment Framework  Security Discussion Group  Research and Educational Networking Information Sharing and Analysis Center (REN-ISAC) EDUCAUSE Cybersecurity Resource Ctr Effective IT Security Practices Guide

Security 2007 April 10-12, 2007, Denver, Colorado Keynote Speakers  Ira Winkler, authors of The Spies Among Us  Pamela Fusco, Head Global InfoSec, CitiGroup Pre-Conference Seminars  Continuity of Operations Planning, IT Disaster Planning, Wireless Security, DNS Security, Compliance & Legal Issues, Establishing Information Security Program, Handling Sensitive Data, Incident Response Processes and Tools, and Privacy and Security Training Concurrent Sessions: Campus & Vendor Presentations Corporate Displays Human Networking  BoF’s, Roundtable Discussions, Reception, etc.

Why collaborate with Industry? Original Security Issues still there, some growing Problems in new areas- web/db apps Growing Complexity for end users a PR problem for us Challenge of “professionalizing” non-security staff on security issues Heightened state security requirements Are attacks more sophisticated? professional? organized crime? “industrial” espionage?

Most critical vendor areas? O/S Vendors in Redmond and Cupertino Unix vendors ERP Vendors Database companies Networking Vendors Web 2.0 suppliers Others???

Networking Vendors Convergence of networking and security products? Multiple vendors are now integral to the network

OS Vendors: Microsoft Vista rollout Higher Education Advisory Group has been strong advocate for security.

How to Engage Vendors Common effective practices? Advisory groups? Checklists of key issues? Scream Identity Management - Collaboration opportunity?

Identity Management High-value collaboration opportunity?

ERP Security Checklist Topics Managing Roles and Responsibilities Passwords, IDs and PINs Data Standards and Integrity Process Documentation Exporting Sensitive Data

Sample from Roles/Responsibilities Is security controlled at the database level or is it left to the applications that are supposedly integrated with the ERP to each control security? How easy is it to set up role based access? e.g. can roles be associated with position categories; can default roles be established?

Sample from Roles/Responsibilities Are there some features of the system that require that the user, no matter what their role, be given access to the underlying database? If so, how is security managed? Can context-sensitive roles be defined (i.e. the user can perform a function for specified records only at a specified point in the processing cycle)?

Sample from Roles/Responsibilities Is there a web-based tool that allows you to see the access that has been provided to a user with respect to the fields/tables/forms in the product, its underlying database, and integrated third party products and reporting tools?

Sample from Roles/Responsibilities Can the vendor provide you with the names of institutions similar to yours that have implemented role based security on a wide variety of roles so that you can assess the person hours that will be needed to implement and maintain role based security?

Sample from PINs/IDs/Passwords Does the system require strong passwords? Are the IDs randomly or sequentially generated? Are they at least 8 characters long?

Sample from Data Standards/Integrity Are data fields encrypted at the database level? Is each standardized data field adequately documented in a data dictionary? As the institution articulates the standards/rules that define a data field, do these standards/rules then become part of a data dictionary?

Sample from Data Standards/Integrity Can the vendor provide you with the names of institutions similar to yours that have implemented features such as: - encrypted data fields - audit trails on data fields so that you can determine the effect on performance of implementing these features on all the fields that need to be protected?

Sample from Process Documentation Are there visual representations of processes, role approvals, security checkpoints, data flow, and tables touched/accessed during each process? Are there clear and complete work flow diagrams?

REN-ISAC Research and Education Networking: Information Sharing and Analysis Center

REN-ISAC Mission Serve as a trusted connector hub for the security community to collaborate. Focus is to improve network security through information collection, analysis, dissemination, early warning, and response; Unique capability to support the R&E community because of NOC at Indiana University; and Supports efforts to protect the U.S. national cyber infrastructure by participating in the formal ISAC structure.

REN-ISAC Members Membership is open and free to institutions of higher education, teaching hospitals, research and education network providers, and government-funded research organizations.  Current membership  300 individual members  165 institutions  Predominately research universities to date but increasingly new members are coming from non- research universities. Membership is aimed at security staff and vetted to insure trust relationship.

REN-ISAC Organization Hosted by Indiana University Three permanent staff Executive Advisory Group Technical Advisory Group  Support and contributions from:  Indiana University, Internet2, EDUCAUSE  Louisiana State University, Worchester Polytechnic Institute, University of Massachusetts Amherst  And the members

Technical Advisory Group The REN-ISAC Technical Advisory Group (TAG)  Chris Misra - University of Massachusetts Amherst (Chair)  Tom Davis - Indiana University  Phil Deneault - Worcester Polytechnic Institute  Brian Eckman - University of Minnesota  Stephen Gill - Team Cymru  John Kristoff - UltraDNS  Randy Raw - Missouri Research & Education Network (MOREnet)  Joe St Sauver - University of Oregon  Michael Sinatra - University of California, Berkeley  Ex-officio Members Doug Pearson - REN-ISAC/Indiana University Dave Monnier - REN-ISAC/Indiana University

Executive Advisory Group The REN-ISAC Executive Advisory Group  Jack Suess - University of Maryland-Baltimore County (Chair)  Brian Voss - Louisiana State University  Theresa Rowe - Oakland University  Marty Ringle - Reed College  Ken Klingenstein - Internet2 & University of Colorado  Rodney Petersen - EDUCAUSE  TBD - HPC center representative  Ex-officio Members Mark Bruhn - REN-ISAC/Indiana University Chris Misra - TAG Chair, University of Massachusetts Amherst Focus is on developing business plan

External Relationships Internet2 and EDUCAUSE Other private threat collection and mitigation efforts, e.g. among ISPs,.edu regional groups, etc. Global Research NOC at Indiana University, servicing Internet2 Abilene, National LambaRail, and international connecting networks National ISAC Council and other sector ISACs Department of Homeland Security & US-CERT Coming soon - vendors!

Vendor Relationships REN-ISAC is uniquely positioned to work with vendors by its status as an ISAC. Vendors won’t and can’t share security secrets with 2000 institutions, they will consider sharing with REN if we demonstrate we can be trusted. In final negotiations with one major vendor.

REN-ISAC Activities A vetted trust community for cybersecurity Information-sharing and communications channel for vendor security issues Information products aimed at protection and detection Participate in incident detection, response, and dissemination Develop tools for information sharing and response

Information Products Daily Weather Report provides situational awareness and actionable protection information. Alerts provide critical, timely, actionable protection information concerning new or increasing threat. Notifications identify specific sources and targets of active threat or incident involving member networks. Threat Information Resources provide information regarding known active sources of threat.

Information Products (2) Advisories inform regarding specific practices or approaches that can improve security posture. Instruction on technical topics relevant to security protection and response. Monitoring views provide aggregate information for situational awareness.

For More Information Visit:  EDUCAUSE/Internet2 Security Task Force Contact:  Joy Hughes, GMU, STF Co-Chair  Peter Siegel, UC-Davis, STF Co-Chair  Rodney Petersen, EDUCAUSE, STF Staff