Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.

Slides:



Advertisements
Similar presentations
Planning Collaborative Spaces in Libraries
Advertisements

June 4, 2003 Sustainable Rangelands Roundtable. June 4, 2003 A Strategic Course for the Future Sustainable Rangelands Roundtable June 4, 2003.
AIAA Task Force on Earth Observations 2 October 2009 AIAA HQ Reston VA.
1 Mid-Term Review of The Illinois Commitment Assessment of Achievements, Challenges, and Stakeholder Opinions Illinois Board of Higher Education April.
A Health and Wellbeing Board for Leicestershire Cheryl Davenport Programme Director.
Collection-level description & the Information Landscape: users evaluate strategies for resource discovery Collection Description Focus Workshop 5 Cambridge,
Local Immigration Partnerships: Systems Planning to Help People.
Foundations of Excellence TM in the First College Year Laying a Foundation for First Year Assessment Nazareth College of Rochester, Marywood University.
THE LUBRECHT REPORT: A MID-WAY ASSESSMENT OF THE 10 -YEAR WILDERNESS STEWARDSHIP CHALLENGE Developed By: The Wilderness Advisory Group April 2010.
UCSC History. UCSC: A brief history 60s University Placement Committee A lot of field trips/interaction with employers.
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
© 2005, EDUCAUSE/Internet2 Computer and Network Security Task Force Information Security Governance: The Buck Stops Where? Mark Luker Vice President, EDUCAUSE.
1 US activities and strategy :NSF Ron Perrott. 2 TeraGrid An instrument that delivers high-end IT resources/services –a computational facility – over.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Southeast Regional Educause Conference, June 6, 2005 The Learning, Teaching and Innovative Technologies Center (LT&ITC): A Partnership to Support Faculty.
January 3-4th 2007University of Plymouth Academic Dissemination with a focus on HELP CETL Award Holders Mark Stone, HELP CETL Director Higher Education.
Korkeakoulujen arviointineuvosto — Rådet för utvärdering av högskolorna — The Finnish Higher Education Evaluation Council (FINHEEC) eLearning and Virtual.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Building and Strengthening Community Service Programs Webinar | August 2, 2012.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
David A. Brown Chief Information Security Officer State of Ohio
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
SUNY Assessment Update AIRPO Conference January 21, 2011.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Anna Drummond, UMV Chief Compliance Officer Robert F. Roach, NYU Chief Compliance Officer 2B. How’s Your Compliance Communication Service?
SAU #53 Serving the School Districts of Allenstown, Chichester, Deerfield, Epsom, and Pembroke Action Plan
© American Bar Association Effective Strategic Planning Henry F. White, Jr. Executive Director & Chief Operating Officer American Bar Association 10 th.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Maureen Noonan Bischof Eden Inoway-Ronnie Office of the Provost Higher Learning Commission of the North Central Association Annual Meeting April 22, 2007.
THE HR APPRENTICERICHMOND THE HR APPRENTICE RICHMOND Marvelous Membership Mavericks.
Do it pro bono. Strategic Scorecard Service Grant The Strategy Management Practice is presented by Wells Fargo. The design of the Strategic Scorecard Service.
Identifying and Assessing Learning Outcomes for Professional Development Programming Diane E. Waryas, Ph.D. Kim E. VanDerLinden, Ph.D.
Deakin Richard Tan Head, Information Technology Services Division DEAKIN UNIVERSITY 14 th October 2003.
Establishing an IT Process Improvement Program Carrie Regenstein-CSG- May 13, 2005 and Jeff Silber EDUCAUSE Midwest Reg. Conf.— March 23, 2005 Copyright.
1 Leyla Erk McCurdy The National Environmental Education & Training Foundation 1707 H Street NW, Suite 900 Washington DC
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
A National approach to Cyber security/CIIP: Raising awareness.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
1. Housekeeping Items June 8 th and 9 th put on calendar for 2 nd round of Iowa Core ***Shenandoah participants*** Module 6 training on March 24 th will.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
1 Free Help: State Support Team Technical Assistance Services 2012 MIS Conference February 15, 2012 Corey Chatis, State Support Team Jan Petro, CO Department.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Strategic Planning System Sacramento City College Strategic Planning System ….a comprehensive system designed to form a reliable, understood system for.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Talking With The Boss About Security Darlene Quackenbush, James Madison University Shirley Payne, University of Virginia EDUCAUSE Security Professionals.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Annual Planning Task Force (APTF) Recommendations NOVEMBER 18, 2014.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
NIH Change Management Program Change Management Program Overview March 8,
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
African Centre for Statistics United Nations Economic Commission for Africa Session 2 How to meeting countries needs: What has been done and way forward.
College Success Program John Cowles, Ph.D. Dean of Student Success and Retention Grand Rapids Community College Grand Rapids, Michigan.
January 23,  Balance state’s higher education long range plan and agency operations in the required strategic plan;  Involve agency staff in.
Building Community through Inclusive Excellence
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Structure The organizational structure is designed to accelerate a new workforce development and student success strategy: integrating makerspaces into.
EDUCAUSE/Internet2 Computer & Network Security Task Force
Dutchess Community College Middle States Self-Study 2015
State Coordinator Intervention
University Career Services Committee
Office of Secretary of Defense
Engaging Your Stakeholders and Making the Most of Your Team
Corporate Forum Presented by
Presentation transcript:

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD

Purpose To bring together representatives from schools and institutions of higher education (K-20) to create partnerships, strategies, and implementation plans to increase cyber security awareness among our constituencies.

Workshop Outcomes Conduct an Inventory of Related Work Programs and Products Identify Key Stakeholders and Interdependencies Provide Recommendations for Integrating Related Work Programs Provide Recommendations for New Initiatives

Schools & Higher Education Working Group Action Items Action Plan and Milestones Outline of Programs March 1 st 6 months (August) 12 months (January 2005) Beyond

Agenda Information Assurance Tools and the Learning Continuum Welcome and Introductions Inventory and Demonstration of Security Awareness Initiatives Security Awareness Strategy and Implementation Plan

EDUCAUSE/Internet2 Computer and Network Security Task Force Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security Task Force Coordinator

Strategic Goals The Security Task Force received a grant from National Science Foundation to identify and implement a coordinated strategy for computer and network security for higher education. The following strategic goals have been identified: Education and Awareness Standards, Policies, and Procedures Security Architecture and Tools Organization, Information Sharing, and Incident Response

Education and Awareness To increase the awareness of the associated risks of computer and network use and the corresponding responsibilities of higher education executives and end- users of technology (faculty, staff, and students), and to further the professional development of information technology staff.

Awareness Programs Only one-third of our institutions have a formal awareness program for students, faculty, or staff – ECAR Study (2003) The National Strategy recommends that institutions of higher education identify and adopt model user awareness programs and materials

Accomplishments – Web Site A Resource on Computer and Network Security for the Higher Education Community at Collection of "Education and Awareness Programs and Resources" at urces/awareness.asp

Accomplishments - Publications Leadership Book: Computer and Network Security in Higher Education Effective Security Practices Guide Articles in EDUCAUSE Review, EDUCAUSE Quarterly, & University Business Magazine White Paper on “IT Security in Higher Education: A Legal Perspective”

Accomplishments - Outreach Conference Presentations EDUCAUSE National, Regionals, and Other Events Internet2 Member Meetings Higher Education IT Alliance Higher Education Associations Annual EDUCAUSE/Internet2 Security Professionals Workshop Letter to Presidents from the American Council on Education

Message to Presidents (Feb 2003) Set the tone: ensure that all campus stakeholders know that you take Cybersecurity seriously. Insist on community-wide awareness and accountability. Establish responsibility for campus-wide Cybersecurity at the cabinet level. At a large university, this responsibility might be assigned to the Chief Information Officer. At a small college, this person may have responsibility for many areas, including the institutional computing environment. Ask for a periodic Cybersecurity risk assessment that identifies the most important risks to your institution. Manage these risks in the context of institutional planning and budgeting. Request updates to your Cybersecurity plans on a regular basis in response to the rapid evolution of the technologies, vulnerabilities, threats, and risks. David Ward President, American Council on Education

New Awareness Campaign

Recommendations Campus-wide security awareness campaigns Develop how to and best practices security guides Make training for sys admin in securing machines and devices a requirement Share training and educational materials across our campuses Develop security training and education courses for staff students and faculty NSF Workshop Results – Fall 2002

For more information: EDUCAUSE/Internet2 Computer and Network Security Task Force

Recommendations Key Deliverables with Timelines Metrics Lead Organizations Responsible Resource Requirements and Recommended/Committed Resource

Moving from Strategy to Action Why? National Strategy! What? Nat’l Strategy – Strategic Level What? Tactical How? Operational When? Timeframes and Metrics Who? Audience and Assignment

Elements of Implementation Plan Provide Recommendations for Integrating Related Work Programs Provide Recommendations for New Initiatives Identify Key Stakeholders and Interdependencies

Organizing Implementation Plan Brainstorm Evaluate Ideas Sort and Combine Similar Ideas Prioritize Ideas March 1 st 6 months (August) 12 months (January 2005) Beyond Resource Requirements Lead Organization(s) Responsible

Evaluation 1.What were the most significant outcomes of the workshop for you? 2.What aspects were least helpful? 3.Rate the quality and organization of the workshop (10 =excellent) Why did you mark it where you did? 4.My advice on next steps