Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.

Slides:



Advertisements
Similar presentations
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Advertisements

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
HEISC Town Hall Webinar: Strategic Plan Host: Larry Conrad CIO, UNC-Chapel Hill & HEISC Co-Chair.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
EDUCAUSE Update CHECO Fall Meeting Catherine Yang,
1 MAIS Student Administration Advisory Group Meeting #31 October 4, 2006.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
LEARNING FOR THE 21st CENTURY
1 Effective Cybersecurity Practices for Higher Education Educause Southeast Regional Conference Seminar 1A June 6, 2005 Mary Dunker Virginia Tech Tammy.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
An Introduction to EDUCAUSE and the EDUCAUSE/Internet2 Security Task Force Steve Worona Director of Policy and Networking Programs EDUCAUSE CISSE Washington,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Rodney Petersen Security Task Force Coordinator EDUCAUSE
Handling Sensitive Data: Security, Privacy, and Other Considerations Rodney Petersen Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
1 Hyogo Framework for Action 2005 – 2015 “Building the resilience of nations and communities to disasters” ASEAN REGIONAL FORUM The 8 th.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Getting Started With Information Security An Overview Cedric Bennett EDUCAUSE Western Regional Conference March 3, 2004 Cedric Bennett © 2004.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Introduction to GeSCI Meeting with Ministry of Education in Bolivia 26 April 2006.
Seedco & Inclusion: Our Partnership for Delivery Expertise Welfare to Work Convention Manchester June 30 – July 1, 2011.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
UNC Deans Council The North Carolina K-12 Digital Learning Transition Glenn Kleiman Friday Institute for Educational Innovation NC State University College.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
EDUCAUSE/Internet2 Computer & Network Security Task Force Update Dan Updegrove VP for IT, University of Texas at Austin Task Force Co-chair Tempe,
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Realize the Power of Information IJIS Institute Briefing June 24, 2014.
Superior Infrastructure – Phase One Lenora Chapman & Michelle Stevenson Presenting.
Joint CIO Council and HR Deans & Directors Meeting
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
EDUCAUSE/Internet2 Computer & Network Security Task Force
Higher Education Information Security Council
Educause/Internet 2 Computer and Network Security Task Force
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
California Cybersecurity Integration Center (Cal-CSIC)
I have many checklists: how do I get started with cyber security?
The MITRE Corporation Team
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Corporate Forum Presented by
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Presentation transcript:

Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE

Higher Ed & Cybersecurity Through its core mission of teaching and learning, it is the main source of our future leaders, innovators, and technical workforce. Through research, it is the basic source of much of our new knowledge and subsequent technologies. As complex institutions, colleges and universities operate some of the world’s largest collections of computers and high-speed networks.

Aim of Cybersecurity Confidentiality - Computers, systems, and networks that contain information require protection from unauthorized use or disclosure. Integrity - Computers, systems, and networks that contain information must be protected from unauthorized, unanticipated, or unintentional modification. Availability - Computers, systems and networks must be available on a timely basis to meet mission requirements or to avoid substantial losses.

Strategic Goals of the Security Task Force The Security Task Force received a grant from National Science Foundation to identify and implement a coordinated strategy for computer and network security for higher education. The following strategic goals have been identified:  Education and Awareness  Standards, Policies, and Procedures  Security Architecture and Tools  Organization and Information Sharing

Awareness and Training Goal To increase the awareness of the associated risks of computer and network use and the corresponding responsibilities of higher education executives and end-users of technology (faculty, staff, and students), and to further the professional development of information technology staff. Programs  Outreach to Higher Ed Associations and Beyond  Annual Security Professionals Conference  Education & Awareness Working Group Initiatives  Leadership Book on Computer & Network Security for Higher Ed  National Cyber Security Awareness Month  Cybersecurity Awareness Resource CD  Executive Awareness, Student Awareness, & Training of IT Staff

Standards, Policies, & Procedures Goal To develop information technology standards, policies, and procedures that are appropriate, enforceable, and effective within the higher education community. Program  EDUCAUSE D.C. Office - Public Policy and Government Relations  Institute for Computer Policy and Law  Policies and Legal Issues Working Group  Risk Assessment Working Group Initiatives  Principles to Guide Efforts to Improve Computer and Network Security in Higher Education  “IT Security for Higher Education: A Legal Perspective”  Collection of Security Policies & Procedures  Information Security Governance Assessment Tool  CISWG Report: “Best Practices & Metrics for Information Security”

Security Architecture and Tools Goal To design, develop, and deploy infrastructures, systems, and services that incorporate security as a priority; and to employ technology to monitor resources and minimize adverse consequences of security incidents. Programs  Effective Practices & Solutions Working Group  Internet2 Security Initiatives – SALSA: Security at Line Speed  PKI, Middleware, and Identity Management Initiatives Initiatives  Effective IT Security Practices Guide  Whitepaper on Automating Network Policy Enforcement  Information Security Governance Assessment Tool  Center for Internet Security Benchmarks

Organization & Info Sharing Goal To create the capacity for a college or university to effectively deploy a comprehensive security architecture (people, process, and technology), and to leverage the collective wisdom and expertise of the higher education community. Programs  Security Discussion Group  Annual Security Professionals Conference  Research & Education Networking ISAC (REN-ISAC)  Cyber Security Forum for Higher Education  National Cyber Security Partnership  Partnership for Critical Infrastructure Security Initiatives  Supporting State/Regional Security Efforts  Incident Response/Handling

For more information EDUCAUSE/Internet2 Security Task Force Rodney Petersen