Download presentation
Presentation is loading. Please wait.
Published byAndrzej Sikora Modified over 5 years ago
1
JISC FRAMEWORKS FOR CYBERSECURITY Implementation at Havering College
2
About FE and HE College 407 FTE staff, 6,000 students
3000 workstations 2 main sites 1 construction centre
3
Why use the Jisc Framework?
Approved tender, fixed pricing Affordable in lower quantity (helped to get initial scans in place) Range of services Tendered & approved by Jisc Account manager & College keen to make use of Jisc subscription Permission to scan the Jisc network
4
Vulnerability scan Analyse current state Remove vulnerable products
Implement additional layers of protection Upgrade to latest secure versions Inform users and management
5
Results Scanned entire IP range for active systems
Found 1 serious vulnerability (immediately removed) Some minor fixes (SSL ciphers)
6
Follow up Ensure new services are included in scan
Joomla vulnerability found on a recent point release Otherwise only “low” entries Firewall on for scans (thoughts?)
7
Phishing simulation Initial test of user awareness
>40% clicked link UCISA training follow-up Cybersecurity SD sessions Things to consider… Blanket or targeted? Internal or external style mail? Train first or phish first?
8
Phishing simulation
9
Phishing simulation Highlights a need for more robust filtering Office 365 EOP no longer fit for purpose (?) but MS will happily sell you ATP… Accounts found on haveibeenpwned spam lists Volume of phishing rapidly rising Framework for security would be useful
10
CAD P.O.C. Analyse activity of Office 365 accounts
Alert on (potentially) breached accounts Compare cost and features against Azure AD Premium
11
CAD P.O.C. At present can only do this manually
Check daily for suspicious logins (country, time etc.)
12
Other services Best practice health checks
Palo Alto SLR interesting insights into top traffic sources DNS Sinkholing Blocking CnC traffic Threat Profile
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.