Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015.

Slides:



Advertisements
Similar presentations
Data Security Protocol
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
COMPLYING WITH PRIVACY AND SECURITY REGULATIONS Overview MHC Privacy and Security Committee Revised 1/17/11.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
Springfield Technical Community College Security Awareness Training.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
PERSONAL INFORMATION SWEEP Juliana Luna-Freire, Graduate Assistant David Reamer, Graduate Assistant Justin LeBreck, Applications Systems Analyst.
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Protecting Sensitive Information PA Turnpike Commission.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Family Financial Management Annie’s Project January 23, 2007 Coweta Oklahoma.
Electronic Records Management: What Management Needs to Know May 2009.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Florida Information Protection Act of 2014 (FIPA).
Protecting Personal Information at Fermilab. What You Will Learn F Why must we protect personal information? F What are the laboratory policies governing.
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
SPH Information Security Update September 10, 2010.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
When you request technical support Please remember to request it by ing or calling , Even if you .
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Protecting Your Assets By Preventing Identity Theft
Proactive Incident Response
Healthcare Cybersecurity: State of Industry
Gift Card Risk Mitigation – Presentation A
Florida Information Protection Act of 2014 (FIPA)
Responding to a Data Breach 360° of IT Compliance
Data Compromises: A Tax Practitioners “Nightmare”
Information Security Seminar
Florida Information Protection Act of 2014 (FIPA)
Red Flags Rule An Introduction County College of Morris
Security Hardening through Awareness August 2018
Presented by Elizabeth Kunkel Member Service Trainer
Cyber Security: What the Head & Board Need to Know
Company Name | Phone Number | Website | Address
Colorado “Protections For Consumer Data Privacy” Law
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Presentation transcript:

Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015

2 Shall We Play A Game?

3 Server IT Security Network Endpoint Data drives risk Application

4 Cost of Data Risk Financial: average cost of a data breach is $136 per record (2014 Cost of Cybercrime Study, Ponemon Institute) Trust and Prestige: donors, grant-funding agencies, general community Staff Time: when a breach occurs, paperwork, “special” meetings, process changes, IT work Ethics: University entrusted with oversight of records on behalf of students, faculty, and staff Think about your own personal data in the University and with other institutions.

5 What Is Confidential Data? Passwords, credentials, or PIN’s Social Security Number and Name Birth date + four digits of SSN and Name Credit Card Numbers Tax ID + Name Driver’s License, State ID, Passport Health Insurance Information Medical or Psychological Counseling Records Bank Acct or Debit Card + access code More…. Budget Spreadsheets (pre-2009) Photocopy of CDL or Passport Defensive Drivers Training Anyone? SSN’s for Student Assistant and Staff Payroll Travel Prep or Claims Invoices (Tax ID) Invoices or Vendor Records

6 Do I Have Confidential Data? Probably Every place where users store files, confidential data will be there: File Servers State Workstations Unmanaged Home Workstations Dropbox/Box.com USB Drives

7 Case Study: Financial Risk Six physical servers, one VMWare implementation Multiple services including: O file shares for academic departments (groups) and individuals (faculty and staff) O Multiple domain servers O License servers College of BSS reorganized over three years ago Hardware and services orphaned to some extent Services continued in use

8 Case Study: Financial Risk (cont’d) Individual SharesGroup/Departmental Shares 338 GB98 GB 677,000 files199,000 files 2,500 files with sensitive data1,000 files with sensitive data 173,850 record matches98,347 record matches 272,197 sensitive data records Scenario: assume ¾’s of the matches are false positives = 68,049 and assume that 50% are recurring users = 34,024 34,024 x $136 = $4,627,264

9 Detection and Remediation Analyze Assess Risk Mitigate Risk Migrate De- commission Determine ownership Determine currency of shares, active status Active or non- active Malware/Virus Scans PII Scan Forensics Discovery Clean, Investigate Malware (if any) PII Data Quarantine Purge Repatriate Review need for PII data Cleanse To Security Team With Organization

10 Remediation Considerations In decision-making around how to handle files with PII Data… O Quarantine provides reassurance to end users that data may still be available if they need it (they typically won’t) O Shutdown access to files or refresh changed data later O Process:  Create unaltered copy and remediation copy  Store unaltered copy on encrypted storage  Scan and quarantine “remediation copy”  Quarantined files are replaced with file placeholders  Migrate remediated files (if necessary)  Continued communication with users to review quarantined files  Set purge date for unaltered copy (original data)  Decommission hardware (if necessary)

11 User Involvement What happens when users move their own data? Never purge anything Review it tomorrow/too busy Create a stash in Dropbox or on local computer I need everything Risk: Users do not respond Stash data insecurely

12 Stop Confidential Data from Returning Business Process Change How is confidential data collected? Files? University Systems? Assess current use of confidential data – is it needed for a business requirement? Is there an alternative source? Which teams and which staff require use of confidential data? Remove existing confidential data Cease or limit continued use