The Costs of Preventing Breaches in Higher Ed Tammy Clark, CISO, Georgia State University.

Slides:



Advertisements
Similar presentations
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Advertisements

Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
David A. Brown Chief Information Security Officer State of Ohio
Making the Case for Security: An Application of the NIST Security Assessment Framework to GW January 17, 2003 David Swartz Chief Information Officer Guy.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Return On Security Investment Taz Daughtrey Becky Neary James Madison University EDUCAUSE Security Professionals Workshop May 18, 2004 Copyright Taz Daughtrey.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
General Awareness Training
Computer Crime and Information Technology Security
Information Security Update CTC 18 March 2015 Julianne Tolson.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Dell Connected Security Solutions Simplify & unify.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
NSF and IT Security George O. Strawn NSF CIO. Outline Confessions of a CIO Otoh NSF matters IT security progress at NSF IT security progress in the Community.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Designing Services for Security: Information Security Management throughout the Service Lifecycle Sarah Irwin & Craig Haynal 2015 Penn State Security Conference,
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Enterprise Cybersecurity Strategy
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Information Security tools for records managers Frank Rankin.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
Proactive Incident Response
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Cybersecurity - What’s Next? June 2017
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Educause/Internet 2 Computer and Network Security Task Force
Security Standard: “reasonable security”
I have many checklists: how do I get started with cyber security?
National Cyber Security
Cybersecurity Threat Assessment
Managing IT Risk in a digital Transformation AGE
Presentation transcript:

The Costs of Preventing Breaches in Higher Ed Tammy Clark, CISO, Georgia State University

Introducing… I was a very persistent Hacker Whacker—Doing battle with Hackers in the early years of our information security program. It was a thankless job, but someone had to do it…

Key Topics For Today’s Discussion  Today’s Threat Landscape  Breaches and Root Causes  What Seems to Be the Problem Here?!  What Drives Change in Higher Ed?  Can We Use Technology, Processes, and People Effectively to Assist with Breach Prevention?  The ‘Nitty-Gritty’ About Our Information Security Programs  Summary of Key Points  Join in On the Fun With Questions or Comments

Today’s Threat Landscape  What are the prevalent threats we’re seeing out there that affect our end users?  Lots of spear phishing  Infected websites  Social Engineering, Scams, Organized Crime  Our IT orgs are dealing with increasingly sophisticated malware, SSH attacks and OS/APP vulnerabilities. New exploits continue to be developed at a dizzying pace and our vendors can’t seem to keep up!

Breaches and Root Causes  Educational Security Incidents (ESI) reports that in 2008:  173 separate incidents were reported  24.5% increase over 2007  Primary Reasons:  Unauthorized Disclosure - 75  Theft - 40  Unauthorized Access/Penetration – 35  Additionally, Privacy Rights Clearinghouse reports that so far in 2009, 38 colleges have reported incidents out of 196 total incidents reported…  Of these, 17 were due to theft; 11 to unauthorized access/penetration, and 10 were the result of unauthorized disclosure

What Seems to Be the Problem Here!?  Lack of standardization/plans, policies and standards  Challenges in data classification and risk management  Incorrectly configured/secured devices, apps and Web sites  Inadequate perimeter protection  Lack of advanced intrusion detection & analysis skills  Inadequate endpoint protection  Lack of encryption  Open ended culture  Security ‘un-aware’ users—no ‘skin in the game’ or circumventing controls

What Drives Change in Higher Ed?  Let’s face it--data breaches (either our own or a neighboring institution)  Compliance: PCI, FERPA, HIPAA, GLBA, Red Flags, DMCA  Research grants that require minimum levels of security or compliance with FISMA or ISO 27001/2  Budget cuts  Audits  Emergency management  Risk management  University president’s/provost’s priorities

Can We Use Technology to Assist with Preventing Breaches?  Network intrusion prevention, intrusion detection, firewalls, AV and anti-spam gateways, et al)  Endpoint security tools and suites (AV, anti-spyware, anti- malware, host firewalls/IPS, NAC, etc)  Encryption  Vulnerability assessments  Governance, risk and compliance  Data loss prevention  Identity access management  Security information and event management  The list goes on…and on  Bottom Line---$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Is Process Development Important as Well?  YES! Why?  Myriad of compliance requirements  Standards (ISO, FISMA, COBIT, ITIL) and standardization (yes! in higher ed.)  Get rid of confidential data we don’t need or require!  Data classification and risk management  Audits/corrective & preventive measures  Physical & logical controls to integrate into IT/business processes  3 rd parties processing or storing our data  Contracts with customers on campus to manage their critical systems and data with central IT/Sec organizations

And What About the People?!  Authority (must) = Accountability (the golden rule)  Make IT system/data protection everyone’s job!  Responsible for compliance – in some cases, personal liability  Data cleanup parties including non-electronic formats  Security reviews and mandated controls for systems processing confidential data (require encryption, not running P2P apps, etc.)  Lots and lots of security awareness training!

Higher Ed Information Security Programs—The ‘Nitty-Gritty’  Reactive  Proactive  Predictive

Reactive  People – Depend on ‘security unaware’ end users and (often) a cheerleader ISO!  Process – Too busy chasing the threats and incidents!  Technology – Protecting either the outside perimeter or workstations/servers (AV, firewalls)  $$$ Investment in breach prevention - Low  Aftermath of a potential breach – High impact  Information security program maturity index – 1 or 2 on the CMMI  Largest impacts to information security programs in reactive mode - Lots of unfunded mandates, inadequate resources and funding, threat of penalties/lawsuits due to noncompliance and lack of due diligence, difficulty detecting and responding to security incidents, increased reputational risk, high risk of widespread malware outbreaks and data breaches

Proactive  People – Emphasis on securing adequate resources  Process – Huge investment in process development and awareness training  Technology – Implement defense in depth architecture  $$$ Investment in breach prevention – Very high  Aftermath of a potential breach – Medium impact  Information security program maturity index – 3 or 4 on the CMMI  Largest impacts to information security programs in proactive stage/mode – Heavy infrastructure costs; resource intensive activities; paradigm shifts towards incorporating standards and regulatory guidance; increased standardization, risk management, and attention to building out a fully functional information security program; heavy reliance by the IT org. on the information security dept. staff to protect institutional data/IT resources

Predictive  People – Emphasis on integrating information security throughout the IT org and university  Process – Continuing investment; increased emphasis on security awareness education and training  Technology –Emphasis on optimizing technology investment  $$$ investment in breach prevention –Spread and streamline costs as IS integrates throughout the IT org and campus  Aftermath of a potential breach – Low impact  Information security program maturity index – 4 or 5 on the CMMI  Largest impacts to information security programs in predictive stage/mode – no information security silos, information security is integrated into every facet of the institution, data protection is everyone’s responsibility, authority=accountability, dedicated staff focus on core IS duties

Case State Univ  : Reactive Mode  : Proactive Mode  2010: Moving into Predictive Mode

State Univ  The early years—reactive mode  One dedicated information security staff member— CISO  Tiny budget for information security--$40k first year to buy tools, equipment, training  75% of CISO time – incident response  Widespread malware outbreaks occurred 3-4 times  Primary tech solutions—IDS at perimeter; AV/firewalls on desktops & servers  Very little process development

State Univ  Ramping up the information security program— moving into proactive mode  Additional staff members to specialize in various areas of infosec (technical, people and process)  Large budget increase to accommodate program initiatives (over $200k per year)  Over 75% CISO time spent on policy/process development and security awareness training  25% staff time on incident response  No widespread malware outbreaks  Tech solutions emphasized defense in depth  Security incident reductions of over 98%  Huge emphasis on governance, risk and compliance  Achieved ISO certification for 2 areas of univ.

State Univ  Shifting gears into predictive mode  Significant re-org. of IT/security resulted in security ops & engineering moving into IT org. and CISO, and one dedicated staff member maintaining the Infosec Office at GSU  Authority=Accountability, as system owners and data stewards are accountable for security  Information security budget pieces devoted to solutions/engineering and operations moved to those particular IT groups  Security architecture is being ramped up to incorporate integrated vendor solutions that offer predictive capabilities, as well as heavy automation to facilitate ops (infancy stage)  Over 85% CISO time spent on policy/process development and security awareness training  25% staff time on incident investigations; 75% risk mgt., sec. reviews, vuln. assessments, forensics

Summary of Key Points  Threats continue to heavily target end users  Human errors account for over 70% of data breaches that occur  Information security staffs should not be held accountable for protecting institutional assets and data  Information security needs to be integrated throughout our IT organizations and campuses  In order to mature and ensure continuous improvement, information security programs must be adequately funded and ramped up in terms of people, process and technology  Effective policies, processes, guidelines and security training/education must be emphasized and funded in terms of $$ and resources  Building a solid community of ‘security aware’ users represents both our greatest challenge and our best defense against data breaches!

Questions?  Contact Tammy Clark at Copyright Tammy L. Clark, Oct This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.