Download presentation
Presentation is loading. Please wait.
Published byMilton Watts Modified over 9 years ago
3
M ISSION : The mission of the information security office is to assist in building a security aware university culture through education and technical assistance to all university stakeholders and to promote the safe and secure use of information technology resources.
4
G OAL – C YBER R ESILIENT U NIVERSITY SIG – Information Risk Management ISO – Broad Operational Security COBIT - Governance STIX – Threat Intelligence NIST – Topical Standards Guidance
5
W HAT W E D O : Assist in the development of processes, procedures, and policies for the protection of confidential information, the protection of individuals privacy, and the protection of university information resources Assist in the identification and mitigation of information security risks Assist with defining security requirements Assist university units in achieving their compliance requirements based on applicable laws, regulations, and best practices Provide assistance to users and departments regarding information security issues and the resolution of information security issues Improve campus awareness of information security through communication, open dialogue, and training activities
6
E VOLUTION OF I NFORMATION S ECURITY IT Security Information Security IT Risk Management Information Risk Management 1990 - 19982015 - ????2005 - 20141999 - 2004
7
EDUCATIONAL INSTITUTIONS ARE AMONG THE MOST VULNERABLE BECAUSE THEY HOLD TREASURE TROVES OF PERSONAL INFORMATION - San Francisco Business Times -
8
F ORCES ON I NFORMATION S ECURITY
9
A WARENESS USL Program – Reboot Awareness & Training
10
I NFORMATION S ECURITY R ISK M ANAGEMENT P ROGRAM : Enterprise Risk Assessment Threat Assessment Unit Based Risk Assessment Individual Project/Proposal Risk Assessment Risk & Threat Mitigation Strategies Coordination with Internal Audit
11
Policies Procedures Guidelines & Standards M ASTER D ATA A CCESS P LAN : Master Data Access Plan
12
C YBER E VENT R ESPONSE : IT Cyber Event Response Plan The University IT Cyber Event Response Plan (i.e., IT-CERT Plan) includes the following tasks: Ι. Detection – Identification and Reporting ΙΙ. Containment ΙΙΙ. Eradication IV. Recovery V. Follow-up
13
E VENT C LASSIFICATIONS : Event (or Cyber Event) Potential Event Non-Event Response Event Incident Potential Breach Breach
14
T HE S ECURITY J OURNEY Ad Hoc Business Aligned Risk Based Intelligence Driven Threat Based Compliance Based Infrastructure Based
15
F INAL T HOUGHTS Many exciting things are happening We are always here to help We can’t do this alone, Information Security requires everyone Contact Information: Kevin Crouse: (309) 438-5533 ktcrous@ilstu.edu
16
Q UESTIONS ?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.