Presentation is loading. Please wait.

Presentation is loading. Please wait.

MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING

Similar presentations


Presentation on theme: "MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING"— Presentation transcript:

1 MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
Technology Projects July 1, 2015 – December 31, 2015

2 Technology and Instructional Equipment Modernization

3 Technology and Instructional Equipment Modernization
Technology Advisory Committee (TAC) Recommended: 127 projects One hundred classroom computers ($117K) Podium upgrades ($31K) Wireless upgrade ($40K) One hundred thirty computers/printers/scanners for faculty/staff offices ($137K) Seven digital signage systems ($12K) Tree inventory system ($10K) Latex wide-format printer ($23K)

4 HP Latex 360 Printer

5 Six Student Success Factors

6 VOICE OVER INTERNET PROTOCAL (VOIP) TELEPHONE SYSTEM

7 VOIP Telephone Project - Completed
IP 485G phone 30 purchased IP 655 phone 8 purchased

8 Security

9 Why is Data Security Important?
To prevent data breaches To protect Personal Identifiable Information (PII) To maintain continuous operations To avoid expenses associated with compromises Maricopa County College District in Arizona computer hack tops $26M Breach in 2011 never addressed lead to 2013 hacking incident

10 AHC Data Security Measures
Physical Security and Environmental Controls Solid HVAC system Redundant electrical system Controlled access Clean room Redundant servers Secured cabinets

11 AHC Data Security Measures
Cyber Security Controls Redundant firewalls Partitioned network 802.1X port-based authentication Business grade antivirus Remote centers on secure connections Encrypted passwords SPAM filters

12 AHC Data Security Measures
IT Services Practices Servers patched once a month Regular data backups Minimize 3rd party database access 3rd party contracts reviewed for data security provisions Computer surplus service includes disk wipe Network and servers monitored

13 AHC Data Security Measures
User Security Controls Updated Board Policy 3720 Computer and Network Use Password policy enforced Separate system authorizations - Principle of least privilege (translates to giving people the lowest level of user rights that they can have and still do their jobs)

14 AHC Data Security Measures
Education in addition to tools Malware and strategies to mitigate their affect Adware Ransomware Trojans Spyware Phishing

15 CCC information Security Center The CCC Information Security Center is funded by a grant from the California Community Colleges Chancellor's Office

16 Why the State Funds the CCC Security Center
75% of California Community Colleges have no dedicated IT Security Staff. 60% have no Security Awareness Programs. 60% of Colleges ranked their Information security program as just starting out.

17 CCC Technology Center Identify misconfigurations
Vulnerability Scans of Web facing servers Identify misconfigurations Validate firewall rules Identify out of date and vulnerable software.

18 CCC Technology Center – Awareness Training
Firewalls IDS SSL Authentication Logging Antivirus Staff

19 CCC Technology Center Future Plans Policy Reviews
Inside Vulnerability Scan Architecture Review Risk Analysis Phishing Assessment

20 Cuesta College Data Breach
Human Resources analyst out on medical leave Remotely accessed private information (addresses, phone numbers and SSNs) and ed to private account without authorization Discovered two weeks later Raided home and found drugs Lacy Fowler arrested June 17, 2015

21 AHC Response to Cuesta Data Breach
Updated VPN/Remote User Agreement Reviewed list of all employees, contractors, and agents with remote access Removed access for all except those with current business needs Required a signed agreement to maintain access Employee account disabled when: An employee separates ITS director notified by cabinet member for special circumstances

22 Disaster Recovery Plan – Securing the data
All critical data is backed up Disk to disk copies are made daily from the Santa Maria (SM) data center to the LVC server room. Disk to tape backup is still used for a few of the older servers. A full backup to tape is made twice a year with the tapes transported to LVC for offsite storage.

23 Disaster Recovery Plan - Recovery
Rent or ‘borrow’ infrastructure Cuesta College or Santa Barbara City College Amazon Web Services (AWS) Microsoft Azure Rackspace Recover services needed for business continuity

24 Thank you


Download ppt "MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING"

Similar presentations


Ads by Google