OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office

Slides:



Advertisements
Similar presentations
Module: 201 Create and Manage Your Agent Account.
Advertisements

Kings County Mobile & Remote Desktop Technology Jody McCrone Reah Tibayan.
Speaker Name, Title Windows 8 Pro: For Small Business.
McAfee One Time Password
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Data Encryption Overview South Seas Corporation Jared Owensby.
Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting April 10, 2015 Information Security
ITA/ISA Monthly Meeting November 14, 2014 Facilitator: Ben Garcia Director – OIT Support Services.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
The Office of Information Technology Two-Factor Authentication.
Penn State University College Of Education Understanding College of Education Resources.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Welcome School of Business Information Technology Services Group Chris Buckridge, Chris Zissis Provide Support for OPIM Virtual Desktop (OVD)
Service Professional Advisory Council Technology Tools Available to Service Professionals Chris Greenough, Team Lead, Enterprise Information Solutions.
Using Skype For Business
Passwords are Dead (or how I learned to love my phone)
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Site License Advisory Team October 31, 2012 meeting.
+ -SIG Information Systems & Computing University of Pennsylvania June 27, /13.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
HOW-TO guide This tutorial has sound.
Orientation to CaTS Computing and Telecommunications Services (CaTS)
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study: Cisco VPN Client Cisco Information Technology May 19, 2004.
ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services.
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting October 23, 2015 Technical Session Information Security Office
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
How Not to Have Your Research Stolen or Corrupted Security Best Practices and Resources at Brandeis Melanie Radik and Raphael Fennimore Library & Technology.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Introduction TO Network Administration
Two-Factor Autentication myUTSA ID+ It takes two!.
Grow: Computing Resources Information Technology Department Nichole Kosier.
A leap ahead... Darren Kearney Don Miller Ilya Pinchuk.
Microsoft Office 365 x The new Office for Small Businesses Robert Clark, LucidPointe Advisors4Advisors Office 365 Webinar Series.
Office 365 Overview Sara Grachek Craig Overboe Mary Shrode.
OFFICE OF BUDGET AND FINANCE Information Security Office Information Security Coordinators Meeting May 25, 2016 Information Security Office
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
1 Forrester Mobile Workforce Adoption Trends; 2 Pivoting SMBs to Buy PCs; Techaisle, 2015; 3 Estimated based on Windows* 8.1 Local HD Video Playback Power,
OneDrive for Home. Office 365 and OneDrive: Services available to staff for home use.
The information contained in this document represents the current view of Microsoft Corp on the issues discussed as of the date of publication. Because.
IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Case Study: Cisco VPN Client
ArchPass Duo Presentation
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Two Factor Authentication (2FA)
Norton Antivirus How to install Norton antivirus on windows 8 | Norton.com/setup download.
Everything You Wanted to Know About Encryption in Just 10 Minutes
ComArtSci Technology Update
Two-factor authentication
Multifactor Authentication
Education – Partnership – Solutions
SCSU Technology Update FY05
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Who We Are Pitt Information Technology provides resources at the University for students, faculty, and staff Technology Support Computer Accounts .
Division of Engineering Computing Services
Presentation transcript:

OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office

OFFICE OF BUDGET AND FINANCE Information Security Office CISO Update Presented by Nate Howe

OFFICE OF BUDGET AND FINANCE Information Security Office Education Solutions Partnership

OFFICE OF BUDGET AND FINANCE Information Security Office

OFFICE OF BUDGET AND FINANCE Information Security Office

OFFICE OF BUDGET AND FINANCE Information Security Office What Could Go Wrong? Bad publicity Reduced fundraising Fewer applicants Research disruptions Accreditation scrutiny Regulatory fines Lost productivity Low morale Leadership turnover 6

OFFICE OF BUDGET AND FINANCE Information Security Office Security Has To Matter To You 7

OFFICE OF BUDGET AND FINANCE Information Security Office Campus Access Tool Presented by Shivani Narain

OFFICE OF BUDGET AND FINANCE Information Security Office CAR form will soon become Campus Access Tool (CAT) User-friendly and interactive Easy NetID and UTD-ID creation and modification of access Pilot tool will be open to select departments in September and campus-wide in December CAR Form Is Going Green

OFFICE OF BUDGET AND FINANCE Information Security Office Security Tech Update Presented by Brian McElroy

OFFICE OF BUDGET AND FINANCE Information Security Office NetIDplus powered by DUO – Two-factor authentication initiative – Something you know (your NetID and password) – Plus something you have (such as a mobile device) 11

OFFICE OF BUDGET AND FINANCE Information Security Office NetIDplus Benefits – Greater protection of UT Dallas systems – Reduced risk of criminals using your NetID account to perform harmful activities, such as hijack direct deposit – Compatible with a wide variety of mobile devices – Multiple log-on options even when wireless signal is weak or you are traveling – Compliant with UT System requirements 12

OFFICE OF BUDGET AND FINANCE Information Security Office NetIDplus Duo mobile application on your phone or tablet SMS text message Voice call to your mobile or landline phone Hardware token that generates a one-time code 13

OFFICE OF BUDGET AND FINANCE Information Security Office Where will NetIDplus be used? Direct Deposit within PeopleSoft Galaxy VPN Remote Access SSH Remote Access 14

OFFICE OF BUDGET AND FINANCE Information Security Office New Cisco VPN Launching Fall

OFFICE OF BUDGET AND FINANCE Information Security Office How do I register for NetIDplus? Log-in to the NetID account portal and select the NetIDplus link 16

OFFICE OF BUDGET AND FINANCE Information Security Office How do I register for NetIDplus? 17

OFFICE OF BUDGET AND FINANCE Information Security Office NetIDplus Additional Information 18

OFFICE OF BUDGET AND FINANCE Information Security Office Anti-Malware Tools McAfee VirusScan costs increasing annually Several competing products, none of them perfect 19

OFFICE OF BUDGET AND FINANCE Information Security Office Microsoft Endpoint Protection Early adopter feedback has been positive Definitions through Windows Updates Clients available for both Windows and Mac We plan to completely migrate from McAfee to Microsoft by August

OFFICE OF BUDGET AND FINANCE Information Security Office Windows 10 The ISO is not currently recommending the use of Windows 10 – Anti-virus incompatibility – BitLocker / SecureDoc – Privacy concerns need to be addressed – More information may be found here: 21

OFFICE OF BUDGET AND FINANCE Information Security Office CometSpace powered by Box 1,800 users have signed up for a CometSpace account 3.5TB of storage used Feedback has been overwhelmingly positive 22

OFFICE OF BUDGET AND FINANCE Information Security Office CometSpace Benefits Existing NetID and password Each user provide 100GB Access files from any location Clients available for most devices Easily share files inside and outside of UTD More information at: 23

OFFICE OF BUDGET AND FINANCE Information Security Office Xythos Information Resources is retiring Xythos in favor of Box If you need assistance migrating files from Xythos to Box, contact the Information Security Office 24

OFFICE OF BUDGET AND FINANCE Information Security Office SecureDoc and Absolute Manage 25

OFFICE OF BUDGET AND FINANCE Information Security Office Future of SecureDoc Built-in OS encryption is usually better than third-party but must still be manageable Windows clients should be using BitLocker for the best user experience The ISO is working on a SecureDoc alternative for Mac that uses FileVault2 and will handle future OS X upgrades Alternatives for Linux that use native encryption will also be investigated 26

OFFICE OF BUDGET AND FINANCE Information Security Office Absolute Manage Absolute Manage server has already been decommissioned Any installed agents may be removed Reporting will come from the SCCM agent used with BitLocker and Microsoft Endpoint Protection 27

OFFICE OF BUDGET AND FINANCE Information Security Office Awareness and Outreach Presented by Stephenie Edwards

OFFICE OF BUDGET AND FINANCE Information Security Office Meetings will now be twice a semester with a longer format for facilitating discussion. One meeting will focus on technical security topics and products, the other will focus on security training, policy explanation, and risk reduction. Meetings will still be remotely accessible and files loaded to our website. Refreshments will be served! New ISC meeting format

OFFICE OF BUDGET AND FINANCE Information Security Office SANS Securing the Human video series Short 3-5min videos on topics such as encryption, social media, phishing, and home security topics. In e-Learning, select “Information Security- Securing the Human for Employees” Faculty, Staff, and Students SANS Training for Everyone

OFFICE OF BUDGET AND FINANCE Information Security Office