FY ‘08 NETWORK PLANNING TASK FORCE Fall Agenda Setting and Discussion 09.17.07.

Slides:



Advertisements
Similar presentations
Page 1 Organize for Success IST Organization Design January, 2013 MALCOLM BERNSTEIN CONSULTING.
Advertisements

1 NETWORK PLANNING TASK FORCE August 2, 2004 “SUMMER FOCUS GROUP SESSION ”
October 16, Network Planning Task Force Information Security Strategy.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Data Ownership Responsibilities & Procedures
Secure Computing Network
1 10/31/05 NETWORK PLANNING TASK FORCE Information Security.
Information Security Policies and Standards
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
1 NETWORK PLANNING TASK FORCE November 15, 2004 FALL FY 2005 MEETINGS “STRATEGIC DISCUSSIONS”
1 MAIS Student Administration Advisory Group Meeting #31 October 4, 2006.
11/29/20041 Network Planning Task Force “Consensus Building: Preliminary Rate Setting”
1 NETWORK PLANNING TASK FORCE November 01, 2004 FALL FY 2005 MEETINGS “OPERATIONAL DISCUSSIONS”
1 NETWORK PLANNING TASK FORCE August 16, 2004 SUMMER FOCUS GROUP SESSIONS “SETTING THE AGENDA”
1 NETWORK PLANNING TASK FORCE “ SUMMER PLANNING SESSIONS ” 8/01/05.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
1 11/21/05 NETWORK PLANNING TASK FORCE FY’06 Final Strategy Meeting.
Network Planning Task Force Strategy Discussions.
1 NETWORK PLANNING TASK FORCE September 20, 2004 FALL FY 2005 MEETINGS “OPERATIONAL BRIEFING”
NPTF Wireless Discussion. 3/3/20032 Agenda Goals Strategy Current status Future plans Challenges Options.
1 NETWORK PLANNING TASK FORCE FY’06 Network Strategic Discussions 11/7/05.
12/1/20031 Network Planning Task Force “Consensus Building: Preliminary Rate Setting”
Network Planning Task Force Network Strategy Discussions.
Network Planning Task Force Special Spring Session.
1 NETWORK PLANNING TASK FORCE FY’07 “ Setting the Rates” 11/20/06.
1 MAIS & ITSS FY09 Priorities Joint UL Meeting October 27, 2008.
1 NETWORK PLANNING TASK FORCE “ SUMMER PLANNING SESSION ” 08/21/06.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
IP Telephony Phase II Rollout OIT ComTech. Outline Why are we meeting? Roadmap Centrex vs Call Manager What happens now ? Deployment objectives Phone.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
1 NETWORK PLANNING TASK FORCE Fall Agenda Setting and Focus Group Planning
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
BCNET Security Policies Jens Haeusser Information Security Officer, UBC and Chair, Security Working Group, BCNET Internet2 Joint Techs Vancouver, BC July.
ISC Networking & Telecommunications Migrating from Centrex to IP Telephony at Penn Deke Kassabian University of Pennsylvania.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
1. 1. Overview: Telecommunications Project  Planning and implementation (2007-today) 2. Discussion: Proposal to Improve Infrastructure  Upgrade horizontal.
FY ‘08 NETWORK PLANNING TASK FORCE Strategy Discussions
STRATEGY SESSION November 3, 2008 NETWORK PLANNING TASK FORCE.
1 NETWORK PLANNING TASK FORCE “ FY ’06 FALL SESSIONS ” 10/03/05.
Np163 Dennis Baron, April 3, 2008 Page 1 VoIP at MIT Merit VoIP Seminar Dennis Baron April 3, 2008.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
NPTF Planning Session 6 April FY ‘10 NPTF Members 2  Robin Beck, ISC  Michael Palladino, ISC (Chair)  Mark Aseltine /Amy Phillips, ISC  Gary.
Outsourcing Student at USC Institute for Computer Policy and Law Cornell University, August 2008 Asbed Bedrossian Director of Enterprise Applications.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
NPTF Strategy Session May FY ‘10 NPTF Members 2  Robin Beck, ISC  Michael Palladino, ISC (Chair)  Mark Aseltine /Amy Phillips, ISC  Gary Delson.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
FY ‘08 NETWORK PLANNING TASK FORCE Rate Setting
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
12/15/20031 Network Planning Task Force “Consensus Building: Final Rate Setting for FY ‘05”
NETWORK PLANNING TASK FORCE FY ‘08 Planning Session I 1.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
Moving to BYOD Gary Audin 1.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
| UNC.
In the attack index…what number is your Company?
Fy ‘08 NETWORK PLANNING TASK FORCE
Information Technology Organization Overview RFP #220-05
Presentation transcript:

FY ‘08 NETWORK PLANNING TASK FORCE Fall Agenda Setting and Discussion

NPTF FY ‘08 Members ■ Robin Beck, ISC ■ Michael Palladino, ISC (Chair) ■ Mark Aseltine / Mike Lazenka, ISC ■ Gary Delson/Geoff Filinuk, ISC ■ Dave Millar, ISC ■ Deke Kassabian / Melissa Muth, ISC ■ Chris Bradie /Dave Carrol, Business Services ■ Doug Berger / Manuel Pena, Housing and Conference Services ■ Cathy DiBonaventura/Rick Haverkamp, School of Design ■ Helen Anderson, SEAS ■ Brian Doherty, SAS ■ John Irwin, GSE ■ Ira Winston, SEAS, SAS, Design ■ Deirdre Woods /Dan Alig, Wharton ■ Mary Alice Annecharico /Mike Herzog, SOM ■ Rich Cardona, Annenberg ■ Kayann McDonnell, Law ■ Donna Milici, Nursing ■ Ken McCardle, Vet School ■ Jeff Fahnoe, Dental ■ Grover McKenzie, Library ■ Mary Spada, VPUL ■ Marilyn Spicer, College Houses ■ Joseph Shannon, Div. of Finance ■ Steve Stines /Dominic Pasqualino, OAC ■ Marilyn Jost, FRES ■ Michael Weaver, Budget Mgmt. Analysis 2

Agenda 3 ■ Defining the NPTF process for FY ’08 ■ Topics gathered thus far ■ Additional discussion ■ Setting the Fall agenda

NPTF Meeting Schedule – FY ‘08 4 ■ 1:30-3:00pm in 337A Conference Room, 3 rd floor of 3401 Walnut Street ■ Process ■ Intake and Current Status Review – July 16 ■ Agenda Setting & Discussion - September 17 ■ Strategy Discussions - October 1 ■ Security Strategy Discussions - October 15 ■ Strategy Discussions - October 29 ■ Prioritization - November 5 ■ Rate Setting – November 19

NPTF Process Feedback 5 ■ Too much information is crammed into too short a timeframe. ■ We don’t get enough time to prioritize things in the Fall. ■ We don’t get enough time to discuss financial decisions with our deans before our budgets are due. ■ Is it possible to see the projected budget in September so that we know how much discretionary money there is before we start? ■ Suggestions: ■ Finish Fall process in early November. ■ Hold fewer meetings in the Fall (3-4 total) ■ Hold off-season meetings (2) to discuss strategic items ■ Hold off-season meetings (2) for a closer review of operational items. ■ Do a review of where N&T resources are going for services and R&D. ■ Do a survey to get more formal feedback on current services. ■ “Polish” current services like VoIP before spending more time on new ones.

NPTF Security Feedback ■ Security is the “beast” that ate NPTF ■ Is NPTF the right place to discuss it? ■ Is there other centralized money for it? ■ We need to see a multi-year security strategy ■ What is the budget impact of it centrally (charged by ISC if any) and locally to schools. ■ What is the budget impact of various security policies? 6

FY ‘09 Price Setting 7 ■ We will re-evaluate pricing for: ■ 10 Mbps ($6.03) ■ 100 Mbps ($7.03) ■ 1000 Mbps ($30) ■ vLANs ($2.50) ■ Wireless ($27) ■ VoIP/ Voic / IM ■ Video services ■ Analog voice services ■ Central Service Fee (headcount and IP addresses)

N&T Operational Initiatives for FY ’08 8 ■ Next Generation PennNet ■ Gigabit building/subnet connections (router ports) ■ Single-mode fiber to buildings (new pathway if necessary) ■ Redundant building/subnet connections ■ Customer Service ■ Online, self-service intake for voice and data orders/ Service Order Intake (SOI) ■ Always striving for better communications and feeling the urgency in your requests ■ Wireless ■ Expand 802.1x authentication to all wireless PennNet areas where current web authentication exists for wireless-PennNet. (Dual SSIDs)

Strategic Discussions for FY ’08 9 ■ Communication Names ■ Develop infrastructure necessary to implement Communication Names in order to support longer and more meaningful user names for and other electronic communications. ■ Complete name space clean up ■ Augment PennNames to support Communication Names ■ Develop application to create Communication Names ■ Create web interface to allow authorized users to lookup, add, modify and delete Communication Names ■ Create API to allow authorized applications to lookup, add, modify and delete Communication Names ■ Modify Penn Community to store Communication Names ■ Should we do cost estimates on this project? ■ Wireless ■ Seamless roaming ■ 802.1x only (visitors) ■ Earthlink as wireless overlay. Outsource outside?

Strategic Discussions for FY ’08 (Contd.) 10 ■ Integrated Communications ■ VoIP ■ Softphones ■ IM ■ VoIP redundancy & scheduled down-time ■ Video Strategy ■ Digital video ■ Desktop teleconferencing ■ File sharing and archiving/Flexible method for sharing data ■ How broadly and on what time line should PennNet Gateway (scan and block) be deployed once it is fully ready? Or as desktop/laptop operating systems with automated security updates become common, does PennNet Gateway become a lower priority? ■ What should the timing be for a single campus-wide network access control for both wired and wireless networks? ■ Can we enhance perimeter intrusion detection? ■ UPS on all network electronics ■ Cell phone coverage in buildings

FY ‘08 Security Goals 11 ■ Compliance: Roll out the Security and Privacy Impact Assessment (SPIA) process, in conjunction with Penn’s Privacy Office to better manage University- wide IT security and privacy risk to 8-12 schools & centers. ■ Prevention: Establish Penn LSP security training & certification (computer based training and testing) and conduct security technology training for 3 – 5 topics. New employee online security and privacy awareness training. ■ Identity Management ■ Security Assessment: Engage with Oracle Corporation to review database security and identity management infrastructure to ensure timely and secure access to Penn enterprise IT resources ■ Develop a plan for next generation PennKey. ■ Implement Shibboleth for federated identity. ■ Build and deploy a central authorization system to minimize the risk of exposing sensitive data and/or violation of policy or law

FY ‘08 Security Goals (Continued) ■ Select a recommended product for stored data encryption ■ Should we do centralized key escrow? ■ Limit SSN availability through Data Warehouse ■ Develop strategy documents: ■ Develop logging best practices in conjunction with HARTS team ■ Beyond passwords, next steps for authentication ■ Personal device security ■ Subnet level intrusion detection ■ Pennnet Gateway: Help prevent compromised systems from spreading malware on the network and avoid increased support needs for incidence response ■ Pilot deployment for College Houses, Sansom Place and GreekNet wireless areas and possibly two other schools and centers. 12

Possible FY ‘09 Security Goals 13 ■ Year three of four-year SPIA rollout. ■ Identity Management ■ Extend Authorization system’s group management capability to include privilege management. ■ Online provisioning for Penn administrative applications. ■ Implement first phase of Next Generation PennKey ■ Implement security event logging ■ Logging policy (protecting against brute force attacks) ■ Pilot Critical Host Vulnerability Management agent and Compliance Reporting. ■ PennNet Gateway: full roll out to residential system ■ Review campus A/V strategy vs. Host-Based Intrusion Prevention. Compare Symantec with alternatives. ■ Campus-wide all staff (then faculty) security and privacy awareness online training.

Additional Discussion 14 ■ What have we missed that is critical to be done in FY ‘08 or planned for now to do in FY’09 and beyond? ■ What can we eliminate? ■ Bluesocket wireless authentication. ■ Can we move 100% to 802.1x by Fall ’08? ■ Netnews

IT Roundtable Topics 15 ■ Benchmarking with peers ■ Trailing Edge ■ Leading Edge ■ Data Center/ Facilities Management ■ Research Computing ■ ■ Content Management