1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.

Slides:



Advertisements
Similar presentations
Culture Change: What IT Takes to Create a Quality Customer Service Environment Presented By: Anne Agee, Executive Director, Division of Instructional and.
Advertisements

Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Evaluating IT Professionals Through Values - Based Performance Appraisal Systems February 17, 2005 Presented by: Jenifer Jarriel and Mary Sloan.
Southeast Regional Educause Conference, June 6, 2005 The Learning, Teaching and Innovative Technologies Center (LT&ITC): A Partnership to Support Faculty.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Portfolio Assessment: Pleasure and Profit in Self-Evaluation Star A. Muir, Director Learning Support Services George Mason University MS 5E7, Fairfax,
Supporting and Hosting Web- Based Learning Systems Educause 2001 Charlene Douglas – Director Kathryn Gomm - Training Manager Sharon McCarrager – Accessibility.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
University of Notre Dame Office of Information Technologies March 26, Maintaining the Right Balance Using the Project Charter to Set IT Project Prioritization.
TESL Ontario Conference October 28 & 29, Project Team Project Lead - Carolyn Cohen Research Lead - Antonella Valeo Research Consultants - Sheila.
Achieving the Impossible Through Partnerships and Alliances Shirley Payne & Martha Sites University of Virginia 2006 EDUCAUSE Conference October 9 th,
Regional Performance and Innovative Consortia(RPIC) Georgia Community Action Association Annual Conference Author: Lorraine Daniels, Executive Director.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
IT Strategic Planning From Technical Dreams to Institutional Reality
INSTITUTE FOR DISTANCE AND DISTRIBUTED LEARNING Three Approaches to Distance Learning Support Services EDUCAUSE 2002 Copyright Bridget Moore and Mark Raby,
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Foundations of Excellence: Support Services for Online Learning Midwest Regional Conference, 2005 Chicago, Illinois Presenters: Diane Dates Casey Jan Engle.
National Research Agenda to Support Transformation National Learning Infrastructure Initiative Focus Session June, 2003 Copyright Jillian Kinzie, 2003.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
1 sm Using E-Business Solutions to Meet Management Challenges: Interoperability & Flexibility Bring Success to the Implementation of Specialized Components.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Return On Security Investment Taz Daughtrey Becky Neary James Madison University EDUCAUSE Security Professionals Workshop May 18, 2004 Copyright Taz Daughtrey.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Security Awareness: Taking the Medicine and Liking It Shirley C. Payne Director for Security Coordination University of Virginia EDUCAUSE Conference October.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Center for Instructional Technology James Madison University Strategies for Transitioning to the Age of Digital Media Sarah E. Cheverton James Madison.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
Copyright Statement Copyright William F. Hogue, This work is the intellectual property of the author. Permission is granted for this material to.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
Copyright Jack Chambers, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
February 22, Southwest Educause Conference 1 Copyright Rebecca Frost Davis, This work is the intellectual property of the author. Permission.
ASK ME The ASK ME Program Putting Support at the Center: A New Model for Help Desk Staffing Presented By: Ann Genovese and Kathy Gillette George Mason.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Higher Education and the New International Imperative David Ward President American Council on Education Global Challenges and Higher Education Duke University.
November 6, 2003 Leveraging Resources and Building Partnerships for Critical Infrastructure Protection John B. Noftsinger, Jr., Associate Vice President.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
NLII05 Annual Meeting Professional Development of Faculty and Instructional Technology Staff through Communities of Practice University of Memphis: Technology.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
A Cat-Herding Tale Forging a Single Course Management System for a Decentralized Institution Copyright Abdul Shibli, 2004.This work is the intellectual.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Top 10 Challenges of the Academic Technology Community Veronica Diaz, John Campbell, Dennis Trinkle Wednesday, October 24, :50 p.m. - 4:40 p.m.
Systemic Progress in Teaching and Learning Common Elements that Support Campus-Wide Innovation Copyright Andrea Nixon, A. Michael Berman, Christine Haile,
Vision to Reality: How Knowledge Sharing Promotes Efficiencies Through Process Improvement  History of the Knowledge Collaboration Centre (KCC)  The.
Plan It, But Will They Come?
Julian Hooker Assistant Managing Director Educause Southwest
Educause/Internet 2 Computer and Network Security Task Force
CIO Constituent Group Meeting
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Presentation transcript:

1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison University Shirley Payne, University of Virginia 2005 EDUCAUSE Conference October 20 th, 2005 Copyright Wayne Donald, Cathy Hubbs, Darlene Quackenbush, Shirley Payne; This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Agenda The why and what of the alliance Products and services Creation, support, and strategies for success Benefits realized Q&A

3 The Why & What of the Alliance Wayne Donald Information Technology Security Officer Virginia Tech

4 Events Influencing Formation Cooperative efforts were already underway among four institutions Governor Mark Warner charged higher education to help meet cybersecurity goals Development of Higher Education CIO’s plan for supporting Virginia IT strategic plan JMU and GMU cybersecurity research centers’ charge to assist State in meeting security goals

5 V irginia A lliance for S ecure C omputing A nd N etworking

6 Purpose Strengthen security programs across Virginia higher education by integrating and making available field-proven tools, best practices, and people from VA SCAN partner institutions Establish links to security research, instruction, and federal/state government initiatives to enhance security opportunities

7 VA SCAN The alliance brings together Virginia higher education security practitioners, who develop and maintain security programs emulated by other institutions, and Researchers responsible for creating cybersecurity instruction and research programs nationally recognized for excellence

8 Current VA SCAN Partners Security Practitioners at George Mason University James Madison University University of Virginia Virginia Tech Security Researchers at Institute for Infrastructure and Information Assurance (JMU) Center for Secure Information Systems (GMU) Critical Infrastructure Protection Project (GMU/JMU)

9 Status Endorsed by Higher Education CIO’s Group and University Presidents First products and services were made available March 2003 Assisted other State institutions in defining and organizing security programs Additional products and services under development with input from “user” institutions

10 Products & Services Cathy Hubbs Information Technology Security Coordinator George Mason University

11 Present Offerings Full service website Consulting “Ask the Expert” service On–site engagements Annual conference and SANS workshop

12 Present Offerings Information resources: Security instructional materials Moderated mail list for general security discussions VA-CIRT group for tracking new threats Compliance Checklist for State of Virginia Web-based toolkit of tools & best practices

13 Creation, Support, & Strategies for Success Shirley Payne Director for Security Coordination & Policy University of Virginia

14 Set-up Steps (May 2002 – February 2003) Developed concept paper Held monthly half-day planning sessions Developed formal charter Identified best practices and training materials Designed and implemented website Developed operating procedures Planned and executed communication and marketing efforts

15 Ongoing Support Efforts Monthly meetings to share information and plan new activities Website content enhancement Mail list activity Consulting & training engagements Conference/workshop planning & delivery Promotion

16 Strategies for Success Support of Commonwealth of Virginia’s IT agency Support of partner institutions’ executives Long history of collaboration among partners Linkage of security research and practice in the field We’re filling a critical need Continuous service enhancement is a priority Services offered are within staffing/funding means

17 Strategies for Success Our principles: We teach and guide clients to develop and maintain strong security programs We base offerings on state and federal standards Offerings balance security risks with other organizational priorities. We promote security being integrated into everything an organization does. We use research to keep offerings on the cutting edge. Cooperation among Alliance members transcends competition.

18 Benefits Realized Darlene Quackenbush University Information Security Officer James Madison University

19 Benefits Realized Saves time and improves quality

20 Benefits Realized Saves time and improves quality Reduces security training costs

21 Benefits Realized Saves time and improves quality Reduces security training costs Helps avoid costs

22 Benefits Realized Saves time and improves quality Reduces security training costs Helps avoid costs Greater influence

23 Benefits Realized Saves time and improves quality Reduces security training costs Helps avoid costs Greater influence BUILDS RELATIONSHIPS

24 Governor’s Technology Award Winner September, 2003 EDUCAUSE Excellence in Information Technology Solutions Award Winner October, 2005

25 Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Shirley Payne, University of Virginia Darlene Quackenbush, James Madison University