1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer.

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
David A. Brown Chief Information Security Officer State of Ohio
Secure Computing Network
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Disaster Recovery and Business Continuity Gretchen Grey.
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
Stephen S. Yau CSE , Fall Security Strategies.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
The University of Kansas Process Management: Where and How to Begin? Jerree Catlin, University of Kansas Program & Service Management Office Information.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Website Hardening HUIT IT Security | Sep
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Component 2: The Culture of Health Care Unit 3: Health Care Settings— The Places Where Care Is Delivered Lecture 3 This material was developed by Oregon.
Minnesota’s Internal Control Initiative National Association of State Comptrollers March 25, 2011 Speaker Jeanine Kuwik, MBA, CPA, CISA Director of Internal.
Marketing of Information Security Products. The business case for Information Security Management.
Information Security Issues at Casinos and eGaming
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
The Cyber Defense center and its services portfolio McAfee Professional Services – Foundstone Services.
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17.
Computer and Network Security Issues –the Security Officer’s Perspective Jeff Savoy, Information Security Officer.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Project Management Plan HOW TO PROCESS SEARCHES AND NEW HIRE TRANSACTIONS FOR REGULAR FACULTY (HT-REG) Online Course Development Presented to: Dr. Nancy.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
UKI ROC/GridPP/EGEE Security Mingchao Ma Oxford 22 October 2008.
Pro-active Security Measures
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Information Security Services. Overview  Administrative Systems Security  Legislative Requirements  SUNet Security  Individual Security Awareness.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
26/01/2007Riccardo Brunetti OSCT Meeting1 Security at The IT-ROC Status and Plans.
Information Security tools for records managers Frank Rankin.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Information Security Seminar
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Cyber Security coordination in Europe CERT-EU’s perspective
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Managing the Security Function
Executive Committee Meeting May 18, 2018
IT Development Initiative: Status & Next Steps
Information security planning
What IS A Project Office?
Presentation transcript:

1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer

2 ITSS Overview Service offerings Security council Initial activities Questions

3 ITSS Offerings Reactive ServicesProactive ServicesSecurity Quality Management Services Alerts and Warnings Incident Handling Incident Handling – Incident analysis – Incident response on site – Incident response support – Incident response coordinationIncident analysisIncident response on siteIncident response supportIncident response coordination Vulnerability Handling Vulnerability Handling – Vulnerability analysis – Vulnerability response – Vulnerability response coordinationVulnerability analysisVulnerability response coordination Artifact Handling Artifact Handling – Artifact analysis – Artifact response – Artifact response coordinationArtifact analysisArtifact response coordination Announcements Technology Watch Security Audits or Assessments Configuration and Maintenance of Security Tools, Applications, and Infrastructures Development of Security Tools Intrusion Detection Services Security-Related Information Dissemination Risk Analysis Security Consulting Awareness Building Education/Training Product Evaluation or Certification

4 Security Council Cross University membership consisting of a few Deans, business owners, UMHS, and several faculty. Makes policy recommendations to Provost, CFO, and EVP for Medial Affairs. Dialog & sane decisions around risk management. Provides general direction for ITSS.

5 Initial Activities Planning for –Staff sharing / training (discussed later) –Incident response –Security assessments Hiring for several security positions. Join FIRST. Prompt reporting of all computer security incidents.

6 Initial Activities – cont. Establish an Incident Response Oversight Team. Vulnerability scans of all wired & Wi-Fi campus networks. ITSS Web site. Dark IP space for identifying scanning and other activity.

7 Initial Activities – cont. NetFlow collection / processing at all UM- Internet interconnects. Document and maintain network contacts for all wired & Wi-Fi networks. Tools and procedures to locate a Wi-Fi computer / AP.

8 Staff Sharing Program Goals Scale security skills within the existing workforce Medium level of competency Training done over a 4 to 6 month period, consisting of a combination of self-paced, lecture & lab, and on-the-job Pre-testing and post-testing measure progress New security job title and compensation, fraction determined by local needs Periodic rotation through ITSS for 4 to 6 months at half-time for on-going skills updating