Library and Technology Services Heller Information Security Meeting: Year 1 at Brandeis Michael Corn DCIO and CISO

Slides:



Advertisements
Similar presentations
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Advertisements

JARED BIRD Nagios: Providing Value Throughout the Organization.
Acceptable Use Policy Quiz Boston Public Schools Technology Awareness Initiative.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
LittleOrange Internet Security an Endpoint Security Appliance.
Controls for Information Security
KUSD Student Acceptable Use Policy School Board Policy #6633.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
A Guide for Getting Started
A Guide to Getting Started
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Information Security Phishing Update CTC
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
13 September 2012 The Libraries’ Role in Research Data Management: A Case Study from the University of Minnesota Meghan Lafferty, Chemistry, Chemical Engineering,
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
Connect. Collaborate. Learn. My Big Campus extends the classroom to a safe, engaging online environment.
Supplemental Statements of Water Diversion and Use How to file the triennial reports New Part 3: Monitoring Devices.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Digital Citizenship Teaching Students of the 21 st Century Common Sense Media.
Managing End-User Development of Digital Library Resources to Support User Communities Robert R. Downs Center for International Earth Science Information.
STUDENT COMPUTER USE Digital Citizenship & Safety Real Tools, Real Life, Real Preference Federal and Local Laws Additional Resources.
IMO MEETING Summer 2015 Pace University | Information Technology Services.
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Preserving our Past: Creating our Future A Proposal Group #4.
Data Management & the Library. FACT #1 Research is increasingly digital and produces digital data.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Frontline Enterprise Security
A Guide to Getting Started BCPS – Office of Instructional Technology.
RESEARCH DATA IN UQ ESPACE ANDS WORKSHOP MANAGING RESEARCH DATA IN REPOSITORIES CASE STUDY: THE UNIVERSITY OF QUEENSLAND LIBRARY Andrew Heath Scholarly.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Transformation Accountability (TRAC) Center for Mental Health Services Version 10 October 2015 NOMs Client-level Measures for Programs Providing Direct.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B 2 DROP User.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SCC Student Technology Access Student Login Guide Log on a SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login Enter.
Troubleshooting the Library Login at Easley Library.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
QIP Education Session INFORMATION SECURITY Joseph Zurba Information Security & IT Compliance Officer Harvard Medical School February 16, 2015.
Shibboleth for Middle Schools James Burger -
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
TYLER GROUP
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Grant Writing 2012 Grant Writing for Digital Projects September 2012 IODE Project Office IODE Project Office Oostende, Belgium Oostende, Belgium.
BNU - HKBU United International College 信息科技服务中心 Information Technology Services Centre.
Online Safety The Campion School.
Clever + “District Name”
 itunes is a kind of media player, media library and a online radio broadcaster and it is developed by the Apple inc.  Through the itunes user can.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
How to Secure Facebook Using Norton. If you are Norton customers and holds a Facebook account, this is how you can secure your account in few simple steps:
Student IT Induction (UEL)
GSBS IT Resources and Security
ISMS Information Security Management System
Identity & Access Management
Data science online training.
SET-UP DIRECTIONS S E T Sit and organize materials:
Digital Resources.
Objectives. Objectives Objectives Content Configure Microsoft Azure monitor.
worlds largest IT service provider
Presentation transcript:

Library and Technology Services Heller Information Security Meeting: Year 1 at Brandeis Michael Corn DCIO and CISO

What’s new at LTS? Coming soon: a new social sciences librarian, a web team member dedicated to accessibility, increasingly looking at data analytics, communications Looking for partners around open access, grant data curation (preservation, access) Research data storage (spinning disk + box.com) New services: – – –Center for Teaching and Learning Serious examination of PeopleSoft’s future

Security and Privacy Surprisingly little to do with technology –e.g., Student outcome and analytics –Appropriate use

Focus on Structural Security Network & Infrastructure Chokepoints Endpoints (where the users sit) End User

Network and Infrastructure DNS Filtering Firewalls/Intrusion Prevention Systems Log and network monitoring Vulnerability scanning (device and application)

Endpoints (where people sit) Endpoint Management New antivirus + New Malwarebytes (windows only) New Identity Finder

You Online training New policies (access to digital content, DNS, digital ID, AUP…) Strong password enforcement Super easy password reset Coming soon (1/1/15) – password expiration

Along came a phish EDU_h5JLaVF3jXmjsQBNmMK2tktvsUZqX0W uyST=dym2csrots1gY8pihgrqlq3guQGF0IZuy5 Ovmr6FMYIEjm8ldapauth_cosign-moodle- prod_https11moodle.brandeis.edu/ EDU_h5JLaVF3jXmjsQBNmMK2tktvsUZqX0W uyST=dym2csrots1gY8pihgrqlq3guQGF0IZuy5 Ovmr6FMYIEjm8ldapauth_cosign-moodle- prod_https11moodle.brandeis.edu/

Let’s gut the Phish

Simple ways Look for too many logins from same account in different places

Contact Info All security issues / questions: Michael Corn – Social Media: –