1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,

Slides:



Advertisements
Similar presentations
Culture Change: What IT Takes to Create a Quality Customer Service Environment Presented By: Anne Agee, Executive Director, Division of Instructional and.
Advertisements

No Money? Try Vision. Academic Issues and the Uses of Technology in Financially Tight Times Susanne Woods – SAC, 2002 Copyright Susanne Woods, This.
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Evaluating IT Professionals Through Values - Based Performance Appraisal Systems February 17, 2005 Presented by: Jenifer Jarriel and Mary Sloan.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Portfolio Assessment: Pleasure and Profit in Self-Evaluation Star A. Muir, Director Learning Support Services George Mason University MS 5E7, Fairfax,
Supporting and Hosting Web- Based Learning Systems Educause 2001 Charlene Douglas – Director Kathryn Gomm - Training Manager Sharon McCarrager – Accessibility.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
University of Notre Dame Office of Information Technologies March 26, Maintaining the Right Balance Using the Project Charter to Set IT Project Prioritization.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
INSTITUTE FOR DISTANCE AND DISTRIBUTED LEARNING Three Approaches to Distance Learning Support Services EDUCAUSE 2002 Copyright Bridget Moore and Mark Raby,
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Foundations of Excellence: Support Services for Online Learning Midwest Regional Conference, 2005 Chicago, Illinois Presenters: Diane Dates Casey Jan Engle.
Steve Neiheisel Industry Consultant Creating a Technology Forum for the Whole Campus Presented by Executive Services of Jenzabar (c) Copyright 2006 Jenzabar,
National Research Agenda to Support Transformation National Learning Infrastructure Initiative Focus Session June, 2003 Copyright Jillian Kinzie, 2003.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Return On Security Investment Taz Daughtrey Becky Neary James Madison University EDUCAUSE Security Professionals Workshop May 18, 2004 Copyright Taz Daughtrey.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Security Awareness: Taking the Medicine and Liking It Shirley C. Payne Director for Security Coordination University of Virginia EDUCAUSE Conference October.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Center for Instructional Technology James Madison University Strategies for Transitioning to the Age of Digital Media Sarah E. Cheverton James Madison.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
February 22, Southwest Educause Conference 1 Copyright Rebecca Frost Davis, This work is the intellectual property of the author. Permission.
ASK ME The ASK ME Program Putting Support at the Center: A New Model for Help Desk Staffing Presented By: Ann Genovese and Kathy Gillette George Mason.
Why the Alliance was Formed Rising rates of overweight and obesity; 50% of adults are not active enough for health benefits; Concern about dietary practices.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Higher Education and the New International Imperative David Ward President American Council on Education Global Challenges and Higher Education Duke University.
November 6, 2003 Leveraging Resources and Building Partnerships for Critical Infrastructure Protection John B. Noftsinger, Jr., Associate Vice President.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
Megan Adams, Swarthmore College Mark Colvson, Bryn Mawr College January 17, 2003 Collaborative Virtual Reference Services: The Tri-College Libraries’ Experience.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Addressing Our Long Tail Learners: Findings from the Speak Up National Research Project 13 th Annual CoSN K-12 School Networking Conference March 11, 2008.
March 21, 2006 NERCOMP 2006 Worcester, Massachusetts 1 Copyright Sunny Donenfeld, This work is the intellectual property of the author. Permission.
Learning and Engagement in Library Spaces Suzanne E. Thorin Ruth Lilly University Dean of University Libraries and Associate Vice President for Digital.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
EDUCAUSE Mid-Atlantic Regional 2006 Copyright Statement This work is the intellectual property of the authors. Permission is granted for this material.
A Cat-Herding Tale Forging a Single Course Management System for a Decentralized Institution Copyright Abdul Shibli, 2004.This work is the intellectual.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Top 10 Challenges of the Academic Technology Community Veronica Diaz, John Campbell, Dennis Trinkle Wednesday, October 24, :50 p.m. - 4:40 p.m.
Systemic Progress in Teaching and Learning Common Elements that Support Campus-Wide Innovation Copyright Andrea Nixon, A. Michael Berman, Christine Haile,
Vision to Reality: How Knowledge Sharing Promotes Efficiencies Through Process Improvement  History of the Knowledge Collaboration Centre (KCC)  The.
Plan It, But Will They Come?
Julian Hooker Assistant Managing Director Educause Southwest
Educause/Internet 2 Computer and Network Security Task Force
CIO Constituent Group Meeting
Decentralization in a Centralized IT Environment
myIS.neu.edu – presentation screen shots accompany:
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Presentation transcript:

1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison University Shirley Payne, University of Virginia 2003 EDUCAUSE Conference November 5 th, 2003 Copyright Wayne Donald, Cathy Hubbs, Darlene Quackenbush, Shirley Payne; This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Agenda The why and what of the alliance Present offerings Creation and strategies for success Benefits realized Q&A

3 The Why & What of the Alliance Wayne Donald Information Technology Security Officer Virginia Tech

4 Events Influencing Formation Cooperative efforts were already underway among four institutions Governor Mark Warner charged higher education to help meet cybersecurity goals Development of Higher Education CIO’s plan for supporting Virginia IT strategic plan JMU and GMU cybersecurity research centers’ charged to assist State in meeting security goals

5 V irginia A lliance for S ecure C omputing A nd N etworking

6 Purpose Strengthen security programs across Virginia higher education by integrating and making available field-proven tools, best practices, and people from VA SCAN partner institutions Establish links to security research, instruction, and federal/state government initiatives to enhance security opportunities

7 VA SCAN The alliance brings together Virginia higher education security practitioners, who develop and maintain security programs emulated by other institutions, and Researchers responsible for creating cybersecurity instruction and research programs nationally recognized for excellence

8 Current VA SCAN Partners Security Practitioners at George Mason University James Madison University University of Virginia Virginia Tech Security Researchers at Commonwealth Information Security Center (JMU) Center for Secure Information Systems (GMU) Critical Infrastructure Protection Project (GMU/JMU)

9 Status Endorsed by Higher Education CIO’s Group and University Presidents First products and services were made available March 2003 Assisted other State institutions in defining and organizing security programs Additional products and services under development with input from “user” institutions

10 Present Offerings Cathy Hubbs Information Technology Security Coordinator George Mason University

11 Present Offerings Available to Higher Education institutions in Virginia Consulting Ask the Expert service On–site engagements Periodic information sharing meetings and workshops

12 Present Offerings Information resources: Security instructional materials Moderated mail list for general security discussions VA-CIRT group for tracking new threats Compliance Checklist for State of VA Web-based toolkit of tools & best practices

13 Creation and Strategies for Success Shirley Payne Director for Security Coordination & Policy University of Virginia

14 Set-up Steps (May 2002 – February 2003) Developed concept paper Held monthly half-day planning sessions Developed formal charter Identified best practices and training materials Designed website Developed operating procedures Planned and executed communication and marketing efforts

15 Ongoing Efforts Monthly meetings to share information and plan new activities Website content enhancement Mail list activity Consulting & training engagements Promotion

16 Strategies for Success Support of Commonwealth of Virginia’s IT agency Support of partner institutions’ executives Long history of collaboration among partners Linkage of security research and practice in the field We’re filling a critical need

17 Strategies for Success Our principles: We teach and guide clients to develop and maintain strong security programs We base offerings on state and federal standards Offerings balance security risks with other organizational priorities. We promote security being integrated into everything an organization does. We use research to keep offerings on the cutting edge. Cooperation among Alliance members transcends competition.

18 Benefits Darlene Quackenbush Information Security Officer and Director of Information Technology Planning James Madison University

19 Benefits Saves time and improves quality during program development

20 Benefits Saves time and improves quality during program development Reduces security training costs

21 Benefits Saves time and improves quality during program development Reduces security training costs Helps avoid costs associated with security breaches

22 Benefits Saves time and improves quality during program development Reduces security training costs Helps avoid costs associated with security breaches Greater influence and economies of scale

23 Benefits Saves time and improves quality during program development Reduces security training costs Helps avoid costs associated with security breaches Greater influence and economies of scale BUILDING RELATIONSHIPS that let us fight back more effectively!

24 Governor’s Technology Award Winner September 22, 2003

25 Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Shirley Payne, University of Virginia Darlene Quackenbush, James Madison University