EDUCAUSE Computer and Network Security Task Force Rodney J. Petersen Director, Policy and Planning Office of Information Technology University of Maryland.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Cyber Security and the Global Business Environment Jeremy Schaar:)
David A. Brown Chief Information Security Officer State of Ohio
` OEDIT Presentations December 8, Collaborative innovation is key for job creation and economic growth “Given the complexity of the problems and.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
DHS, National Cyber Security Division Overview
InfraGard Update SSA John V. Gillies SA Matthew E. Morin.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
EDUCAUSE Systems Security Task Force - April 11, 2001 Educause Task Force on System Security Gordon Wishon Georgia Institute of Technology Networking 2001.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
The Executive Branch.  Powers of the Executive Branch are stated in Article II of the Constitution  Commander in Chief  Head of cabinet and executive.
Tradition CIA FBI. Commissions US Commission on National Security in the 21 st Century (USCNS) Hart- Rudman Commission (see Phase 1 Report, p. 7) US Commission.
A First Course in Information Security
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
Workshop: Public Employment Services  Organized by:  Inter-American Network for Labor Administration (RIAL)  Panama City  December 10 and 11, 2008.
NSTC Smart Grid Subcommittee Overview and Goals for Ongoing Federal/State Collaboration By George Arnold, NIST & Jessica Zufolo, RUS NARUC Annual Convention,
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Unscrambling the Department of Homeland Security Presented to: Alliance South Arthur L. Brown
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Information Sharing Challenges, Trends and Opportunities
A National approach to Cyber security/CIIP: Raising awareness.
“History is a set of lies agreed upon.” Napoleon Bonaparte.
Baltimore County BRAC and Federal Initiatives CSSC – May 12, 2011.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Joint Committee of the Higher Education and Entertainment Communities John C. Vaughn Executive Vice President Association of American Universities November.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
US Department of Labor Employment and Training Administration (ETA) Partnering for Effective Business Engagement Heather Graham Director of Special Initiatives.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Mark Luker, Vice President, EDUCAUSE EDUCAUSE Cyberinfrastructure.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
EDUCAUSE/Internet2 Computer & Network Security Task Force Update Dan Updegrove VP for IT, University of Texas at Austin Task Force Co-chair Tempe,
You will NEED 6 different colored pencils AND a glue stick for your notes You may get them now You will NEED 6 different colored pencils AND a glue stick.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Law Firm Data Security: What In-house Counsel Need to Know
EDUCAUSE/Internet2 Computer & Network Security Task Force
New Industry Initiatives in CyberSecurity
Educause/Internet 2 Computer and Network Security Task Force
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Academic Challenges Concerning Standardization
California Cybersecurity Integration Center (Cal-CSIC)
U. S. Department of Homeland Security. Office for Civil Rights
Cybersecurity Involves systems and practices to prevent and mitigate cyber attacks and cyber crimes aimed at global, national, organizational, or personal.
Promoting Global Cybersecurity
Office of Inspector General
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

EDUCAUSE Computer and Network Security Task Force Rodney J. Petersen Director, Policy and Planning Office of Information Technology University of Maryland

Service Provider Security According to Gartner, service providers must implement a solid set of security services to safeguard applications and data across the following areas: Network Platform Applications Operations End Services

Headlines FBI Advises Windows XP Users On Measures to Block Hackers AOL confirms security hold in AOL Instant Messenger (AIM) GroupWise users grapple with security bug Wireless security riddled with flaws Washtech.com Web Site Hacked

U.S. unprepared for IT warfare Top computer security experts told a congressional committee in October that the U.S. isn’t producing the talent or the funding needed to confront the information warfare threats the country now faces.

Lieberman IT security fund Senator Joseph Lieberman, chairman of the Senate Governmental Affairs Committee, has called for the creation of a $1 billion IT fund that would enhance homeland and information security while providing a much-needed boost to the sagging economy.

Billions needed for IT security At least $10 billion in federal funding is needed to ensure adequate homeland cyberdefenses, according to the president of the Information Technology Association of America (ITAA), an industry group that represents more than 500 IT companies around the country.

IT Spending On Security 53 percent of IT managers said they expect to devote a higher proportion of their total IT budgets to security compared with spending in percent of companies said they expect their 2002 IT budgets to decline or stay the same as their 2001 budgets

Consumers Security Concerns More than 70 percent of Americans are at least “somewhat concerned” about Internet and computer security in the wake of the Sept. 11 attacks Roughly 74 percent of Americans are worried that the information they give out online could be stolen or misused “Keeping the Faith: Government, Information Security and Homeland Cyber Defense” - Survey of the Information Technology Association of America

Future of Law and Technology What sorts of Internet privacy measures, those to enhance and those to diminish or prevent privacy and anonymity, will be acceptable in the wake of September 11 terrorist attacks, and what will fly under the radar using prevention of terrorism as an excuse? - Jessica Litman, Professor, Wayne State University Law School Congress will pass legislation to encourage companies to share cyber-security data with the government, by exempting such data from disclosure under the Freedom of Information Act and by providing antitrust protection for companies that collaborate on cyber-security matters. - Ivan Fong, Senior Counsel, General Electric

Discussion Question What types of information security challenges does your organization face?

Justice Dept. To Hire More Computer Crime Attorneys The U.S. Justice Department has begun soliciting hundreds of resumes from attorneys skilled in computer crime and intellectual property law in an effort to keep pace with a growing caseload of cybercrime prosecutions.

“We can and must do better” “If we don’t do this, people simply won’t be willing – or able – to take advantage of all the other great work we do. Trustworthy Computing is the highest priority for all the work we are doing. When we face a choice between adding features and resolving security issues, we need to choose security.” Bill Gates, Microsoft Corporation

Cyberspace Security Czar Richard Clark, Special Advisor to the President for Cyberspace Security Expected to be included in efforts coordinated by the Office of Homeland Security Chairman of a yet-to-be-appointed government-industry board on critical infrastructure systems

NIST New IT Security Effort The Department of Commerce’s National Institute of Standards and Technology (NIST) awarded $5 million total in funding in October for nine research grants that will enhance security for critical infrastructures such as electrical grids and air traffic control systems.

NIPC and IT Security The interagency National Infrastructure Protection Center (NIPC) at FBI Headquarters serves as a national critical infrastructure entity for threat assessment, warning, vulnerability, and criminal and national security investigation, and response. See

NIPC Infragard Initiative Special agents are working with community-based computer security professionals to determine how to better protect critical information systems in the public and private sectors. Computer Crimes Task Force

USA PATRIOT Act Electronic Surveillance, primarily to prevent terrorist acts Computer Trespassers Electronic Crimes Task Force to be coordinated by the U.S. Secret Service State Computer Crime Initiatives

Critical Infrastructure Assurance Office Development of a National Strategy to Secure Cyberspace Issues: Home Users Enterprises Sectors National Global

Cyber-Security Preparedness Act Senator John Edwards introduced legislation last week to promote stonger password protections and high-tech tools to block computer “worms.” The Act, which would cost about $350 million over five years, would apply at first to federal agencies, then expand to include government contractors.

Gartner Research Note In the post-September 11 world, academic institutions will have to combine better security infrastructure with a more rigorous “social contract” that attaches responsibilities to user rights.

Discussion Question What steps have you taken to address computer and network security challenges at your institution?

EDUCAUSE Computer and Network Security Task Force To work with noted security experts and partner associations including Internet2 to identify short- term actions and long-term projects to address systems security problems in higher education. It will support activities such as, a technical toolkit to help Chief Information Officers get ahead of the security curve and a policy toolkit to help campuses properly address the associated legal and ethical issues.

Task Force Leadership Dan Updegrove, co-chair Vice President for Information Technology University of Texas at Austin Gordon Wishon, co-chair Chief Information Officer University of Notre Dame

Committee on Detection, Prevention and Response Co-Chairs: Steve Hansen, Computer Security Officer Stanford University Jack Suess, Chief Information Officer University of Maryland, Baltimore County

Committee on Policy and Legal Issues Co-Chairs: Mark Bruhn, University IT Policy Officer Indiana University Rodney Petersen, Director, IT Policy & Planning University of Maryland

Committee on Education and Awareness Co-Chairs: Michelle Norin, Director for IT Outreach University of Arizona Gordon Wishon, Chief Information Officer University of Notre Dame

Committee on Emerging Technologies Co-Chairs Clifford Collins, Chair I2 Security Working Group OARnet Ken Klingenstein Director, Middleware Initiative, Internet2 Chief Technology, University of Colorado

Funding Proposal Proposal for Identifying and Implementing a Coordinated Strategy for Computer and Network Security for Higher Education

Identify Problem and Develop Preliminary Plans Phase One (months 1-3) Convene Meeting of Computer & Network Security Experts Convene Meeting of Research, Security, and Policy Experts Commission Papers, Reports, and Case Studies

Develop Plan and Implementation Strategy Phase Two (month 4) Convene Summit on Computer & Network Security in Higher Education Convene Meeting of Task Force on Computer and Network Security

Implement Plan and Strategies Phase Three (months 5-16) Pursue Implementation Strategies Convene Quarterly Meetings of Task Force on Computer and Network Security Commission Additional Papers, Reports, and Case Studies Outreach: Publications and Presentations

Evaluate Plan and Prepare for Next Steps Phase Four (months 17-18) Convene Second Meeting of Computer & Network Security Experts Convene Second Summit on Computer & Network Security

Discussion Question How can the EDUCAUSE Computer and Network Security Task Force help you and your institution improve IT security?

Task Force Priorities Refine Organizational Structure Revitalize Volunteer Network Submit Grant Proposal Participate In Government Initiatives Coordinate Higher Education Activities Outreach and Education

For more information: Visit or Contact Rodney Petersen Phone: