Download presentation
Presentation is loading. Please wait.
Published byBartholomew Gallagher Modified over 8 years ago
1
OFFICE OF BUDGET AND FINANCE Information Security Office Information Security Coordinators Meeting May 25, 2016 Information Security Office infosecurity@utdallas.edu Education – Partnership – Solutions
2
OFFICE OF BUDGET AND FINANCE Information Security Office Program Update Presented by Nate Howe Education – Partnership – Solutions
3
OFFICE OF BUDGET AND FINANCE Information Security Office Budget cuts required for administrative units Continue to offer all key services Identify business partners to augment capacity as needed Restructuring Education – Partnership – Solutions
4
OFFICE OF BUDGET AND FINANCE Information Security Office Received several requests from campus Conducted Request for Proposal (RFP) to evaluate leading providers Preferred solution as a result of testing is LastPass Draft proposal under review by senior management, stay tuned Password Vault Education – Partnership – Solutions
5
OFFICE OF BUDGET AND FINANCE Information Security Office 250+ security personnel from various Texas agencies Presentations available at the DIR websiteDIR website We can help you network and solve problems together Texas DIR Information Security Forum Education – Partnership – Solutions
6
OFFICE OF BUDGET AND FINANCE Information Security Office August 10-11; streamed to web Requests for topics you would like presented? Presentations you would like to deliver? UT INFOSEC Conference Education – Partnership – Solutions
7
OFFICE OF BUDGET AND FINANCE Information Security Office Full Disk Encryption Presented by Jeff Reynolds Education – Partnership – Solutions
8
OFFICE OF BUDGET AND FINANCE Information Security Office Why Are We Doing This? To protect valuable data in support of the University's mission Compliance with UT System policy – UTS165 Compliance with regulatory requirements – HIPAA, FERPA Education – Partnership – Solutions
9
OFFICE OF BUDGET AND FINANCE Information Security Office Why Are We Doing This? HIPAA “Two entities have paid the U.S. Department of Health and Human Services Office for Civil Rights (OCR) $1,975,220 collectively to resolve potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules.” Education – Partnership – Solutions
10
OFFICE OF BUDGET AND FINANCE Information Security Office Why Are We Doing This? FERPA “This letter is for the purpose of notifying your office that the Monadock Regional School District had a data breach event involving the theft of a laptop from the residence of one of our employees.” Education – Partnership – Solutions
11
OFFICE OF BUDGET AND FINANCE Information Security Office Objectives Completeness – whole disk or partition encryption Accountability – reporting to provide assurance a machine is still encrypted Recovery – key escrow Implied objective: must ensure the usability of the system Education – Partnership – Solutions
12
OFFICE OF BUDGET AND FINANCE Information Security Office Past Efforts Education – Partnership – Solutions
13
OFFICE OF BUDGET AND FINANCE Information Security Office Current Methodologies Rely upon OS native encryption when possible If 3 rd party software is used, keep it simple Maintain security and compliance, but do not exaggerate the scope of encryption Education – Partnership – Solutions
14
OFFICE OF BUDGET AND FINANCE Information Security Office Current Methodologies Bitlocker ISCrypt Education – Partnership – Solutions
15
OFFICE OF BUDGET AND FINANCE Information Security Office ISCrypt Uses FileVault2, integrated with OS X Lightweight reporting client Easy to use web console for escrow 172 Macs currently encrypted with ISCrypt Education – Partnership – Solutions
16
OFFICE OF BUDGET AND FINANCE Information Security Office ISCrypt New Macs can be put on ISCrypt today Existing Macs with SecureDoc may be converted to ISCrypt by either: Uninstall SecureDoc, then install ISCrypt Format / reinstall OS X Machines already encrypted with FileVault2 can be manually added to the ISCrypt server Education – Partnership – Solutions
17
OFFICE OF BUDGET AND FINANCE Information Security Office ISCrypt Demonstration Education – Partnership – Solutions
18
OFFICE OF BUDGET AND FINANCE Information Security Office Documentation More information available on Confluence: https://confluence.utdallas.edu/confluence/x/8BHzAQ https://confluence.utdallas.edu/confluence/x/8BHzAQ ISCrypt for Linux is ready for testing Contact infosecurity@utdallas.edu for more information or to volunteer to help testinfosecurity@utdallas.edu Education – Partnership – Solutions
19
OFFICE OF BUDGET AND FINANCE Information Security Office Any questions? Education – Partnership – Solutions
20
OFFICE OF BUDGET AND FINANCE Information Security Office Future of SecureDoc Presented by Nick McCormick Education – Partnership – Solutions
21
OFFICE OF BUDGET AND FINANCE Information Security Office Update on the future of SecureDoc Improved stability using native encryption methods instead of SecureDoc ISO will continue to support SecureDoc for legacy machines Technicians might want to start removing SecureDoc from legacy machines when working on them Technicians encouraged to stop installing SecureDoc on new machines; we will be removing ability to do new installs at the end this month Education – Partnership – Solutions
22
OFFICE OF BUDGET AND FINANCE Information Security Office Phishing Incident Response Presented by Nick McCormick Education – Partnership – Solutions
23
OFFICE OF BUDGET AND FINANCE Information Security Office Background The campus receives roughly 12 unique phishing scams each week which were not prevented by the e-mail filters Users often detect the phishing scams and report them to the ISO A few times each year, users fall for a convincing scam… Education – Partnership – Solutions
24
OFFICE OF BUDGET AND FINANCE Information Security Office OFFICE OF BUDGET AND FINANCE
25
OFFICE OF BUDGET AND FINANCE Information Security Office OFFICE OF BUDGET AND FINANCE 25
26
OFFICE OF BUDGET AND FINANCE Information Security Office Current ISO Response Receive phishing reports from proactive users Perform analysis to confirm whether the reported e-mail and/or website is malicious Block malicious links at the Internet firewall Notify Internet domain owner or Internet Service Provider of potential compromised server Link blocking only protects on-campus users Education – Partnership – Solutions
27
OFFICE OF BUDGET AND FINANCE Information Security Office Ongoing Risk Users may still fall victim to malicious emails and links if connecting to the Internet from home or mobile device Average exposure of 24 hours before the malicious site is taken down Education – Partnership – Solutions
28
OFFICE OF BUDGET AND FINANCE Information Security Office So what can ISO do? The idea… Specialists confirm that a phishing e-mail and/or malicious link has been received by UT Dallas users Management from ISO and OIT work together to approve a containment and cleanup task An automated script removes the malicious email from the inbox of each person targeted by the message Is this feasible? Yes, ISO collaborated with OIT and developed a proof-of-concept script Education – Partnership – Solutions
29
OFFICE OF BUDGET AND FINANCE Information Security Office Concerns about privacy? Users tell ISO about it phishing scams; we are not reading through user e-mails to find malicious ones Approval process including both ISO and OIT management Documentation will be kept each time the incident response script is used Education – Partnership – Solutions
30
OFFICE OF BUDGET AND FINANCE Information Security Office Feedback? Concerns? Education – Partnership – Solutions
31
OFFICE OF BUDGET AND FINANCE Information Security Office Web Application Scanning Update Presented by Dalton Brown Education – Partnership – Solutions
32
OFFICE OF BUDGET AND FINANCE Information Security Office Web Application Scanning Update We are still scanning applications as we always have! – Firewall Change Requests, Ad hoc requests, etc. Scanning has begun on the web cluster – We have broken things up into sections based on department, and can continue dividing as needed – We are reaching out to owners of the different areas to schedule scans – If you haven’t heard from us, but want to get a schedule in place, email infosecurity@utdallas.eduinfosecurity@utdallas.edu Education – Partnership – Solutions
33
OFFICE OF BUDGET AND FINANCE Information Security Office Identity Finder Presented by Dalton Brown Education – Partnership – Solutions
34
OFFICE OF BUDGET AND FINANCE Information Security Office Identity Finder Why do we need it? – Data loss has serious financial and reputational consequences for any institution – universities are no different $225 per record, $398 per medical record – Data needs to be properly protected – and local workstation hard drives are not the best solution – Better assists us in understanding where we need to concentrate our efforts So what exactly is Identity Finder? Education – Partnership – Solutions
35
OFFICE OF BUDGET AND FINANCE Information Security Office Identity Finder Identity Finder is a disk scanner – Uses signatures to detect SSNs, credit card information, and other signature matches – Matches are not a bad thing – helps people decide if they want to keep or destroy the data – Loss of records is costly, and more notifications within Identity Finder means more places to lose them – Data that matches signatures should be placed in secure central locations – such as network shares or box.com with proper permissions applied. Education – Partnership – Solutions
36
OFFICE OF BUDGET AND FINANCE Information Security Office Identity Finder Approach 2.0 – Lessons learned from past deployment and usage – Use Identity Finder selectively on high-risk machines – Analysts are going to work through reports on a department-by- department basis – Relationship with Encryption Status – Old Clients – We will update those – Advise best practices for device upkeep and data storage Education – Partnership – Solutions
37
OFFICE OF BUDGET AND FINANCE Information Security Office Identity Finder Project Info – Timeline Early summer – rebuild Identity Finder infrastructure using the latest versions Mid-to-late summer – begin initial departmental engagements starting with the highest risk areas – You do not have to do anything at this time – Let us know if you’d like us to help find confidential data in your department Education – Partnership – Solutions
38
OFFICE OF BUDGET AND FINANCE Information Security Office Education – Partnership – Solutions
39
OFFICE OF BUDGET AND FINANCE Information Security Office Education – Partnership – Solutions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.