Download presentation
Presentation is loading. Please wait.
Published byAnnabelle Jenkins Modified over 6 years ago
1
Information Technology Standards at the University of Illinois
Common Challenges and Solutions Shea Nangle, Security Standards and Compliance Officer Michael Corn, CPO/CSO
2
Presentation Outline A little context and history
Three Elements of a standards program Drill down during each Feel free to interrupt during any portion Encourage alternate solutions or overlooked challenges during discussion
3
Background and Context
4
Background Policy vs. Standards vs. Guidelines vs. Procedures
No campus understanding No tradition of central IT Governance Usual issues of distributed IT Well established role for the security office
5
Context Diverse environment Forced to be collaborative
6
Slow Progress Timeline PCI DSS
7
Three Legs of a Standards Program
Elements Governance Compliance Risks Controls Standards Policy Oversight Vetting/Socialization Accountability Technology Risk Acceptance Challenges Elements Governance Compliance
8
Controls| Standards | Risks
Elements
9
Elements of a Standards Program
Controls 13. All University-owned laptops must be configured and operate with Full Disk Encryption (FDE) software or hardware. Standards Laptop Standard Risks [GEN-001] Risk of data breach, release, or loss through the theft or loss of a laptop.
10
Controls ISO 27002 NIST
11
Standards Not organizing/writing in ISO 27k domains
Very low bar due to University culture Acceptability will increase over time
12
Risks Changing perspective (forest vs. trees)
Developing Risk Knowledgebase
13
Element Challenges I Palatability of controls Everyone’s an expert
Standards are platform-agnostic Exception process Everyone’s an expert Risk first? Standards first? Controls first?
14
Element Challenges II Quantification vs. Qualification of risk
Discussion of choice to do lightweight, qualitative risk analysis initially (examples) Move towards quantitative risk analysis as much as possible
15
Current Risk Analysis
16
Policy| Oversight | Vetting
Governance
17
Governance - Policy Policy
“The responsibility for Information Security includes the authority to assume leadership and responsibility to develop, implement, and monitor for compliance the policies, standards, and procedures necessary to achieve the objectives detailed within this policy.”
18
Governance – Oversight
Standards Advisory Board 2-3 faculty Service/admin representative 1 college CIO; 1 IT line staff Auditor + Security Office
19
Governance - Vetting Standards Focus Group Range of constituents
Visiting SMEs Monthly meetings Draft discussion Revision discussion Endorsement (as interim standards)
20
Governance Challenges
Policy != Standard Faculty and non-IT engagement
21
Accountability| Technology | Risk Acceptance
Compliance
22
Accountability Control Accountability
23
Compliance Technology
Ad hoc GPOs CIS benchmarks Scanners Centralized tools
24
Risk Acceptance Only a percentage of your environment can be measured
Extrapolate Map your “compliance topology” Compare with high risk zones Focus efforts with a higher ROI “Accept” what you can’t measure
25
Compliance Challenges
Defining accountability outside of central unit How do we measure compliance? Evaluate each control, average across standard Leverage any existing tools, even if weak
26
Compliance Challenges
How do we increase compliance? Sales & Marketing Audit Cyber-Insurance requirements Incident follow up Identify centralized management as strategic (e.g., endpoint management) Provide simple tools: GPOs, CIS benchmark, Scanners, Hardening scripts
27
Fear | Uncertainty | Doubt
Challenge Summary
28
Contact Shea Nangle nangle@illinois.edu Mike Corn mcorn@illinois.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.