290 likes | 398 Views
SIGUCCS Implementing an Information Privacy and Security Team April 1, 2009. Mike Leach, Project Manager Jenn Stewart, Technical Coordinator. Value of Presentation. Penn State environment Our experiences Project planning Planning for implementation Implementation Ongoing responsibilities.
E N D
SIGUCCSImplementing an Information Privacy and Security TeamApril 1, 2009 Mike Leach, Project Manager Jenn Stewart, Technical Coordinator
Value of Presentation • Penn State environment • Our experiences • Project planning • Planning for implementation • Implementation • Ongoing responsibilities
Penn State’s World • 24 campus locations across PA • Population • 83,000+ students • 23,000+ staff and faculty • Distributed network environment • Geographically distributed • Budget responsibility distributed
Justify the Need • Evolving threats • Increasing Federal and State statutes, business agreements • End-user awareness • Preserving institutional reputation • Practice does not match policy • Conduct gap analysis
Develop a Project Plan • Identify most critical areas • Include gap analysis results • Identify key players • Administration • Team overseeing project • Representatives from various areas • Working groups • Incident response team
Develop a Project Plan, cont’d 3. Include timeline 4. Awareness programs • Funding resources • Overall strategy for implementation
PSU Project Plan • Multi-phase project • Phase I: Payment Card Industry Data Security Standards (PCI DSS) • Phase II: Personally Identifiable Information (PII) • Centralized services • Extension of project • Life after IPAS
Pitching the Project Plan • Benchmark with other institutions • Support necessary from senior leadership • Show assessment results • How this fits in with overall security posture • Work with other institutional committees and groups • Approval – YES!
AUDIENCE Share your Experience Who has a designed team and security project already in place?
Raising Awareness • Necessary prior to implementation • Buy-in from Academic Leadership Council (ALC) • Offerings to institutional community • Classroom-style • Computer-based (online, offline) • Department or group meetings • Local/internal conferences • Campaign initiatives • Social networking utilities
Awareness Efforts • Specific audience (required), later open to all • Content • Current initiatives, in depth • Compromise stats (internal & external) • Expectations • Assuming responsibility • Future initiatives - brief outline • Resources (internal & external)
Serve as a Consultant • Identify your role • Provide consultation support • Maintain results • Gap analysis • Remediation efforts • Compliance progress
Cultural Shift • Forbidden words • Handling vocal individuals • Support versus authority role • Area liaisons to support initiative • Process change
Central Versus Distributed • Decision making • Examine infrastructure • Results from gap analysis • Feedback from awareness • Services, applications • Funding: department/unit versus centralized
Funding Strategies • Reflect on departmental versus central discussion • Prioritize needs • Offer multiple solutions • Reorganize current budget • Pull resources from other areas • Transparency
Review of Policies and Procedures • Internal versus institution-wide • Data classification scheme • Consider Federal and State legislation, business agreements • Current • Pending
AUDIENCE Share your Experience What are some of the security challenges your institution is facing?
Compliance Assessments • Raise awareness • One week advance notice • Examine “said” security measures • Provide timeline for remediation • Involve senior leadership when necessary • Prepare for ramifications
Notification Incident Response • Identify team • Map out a process • Pilot test regularly • Prepare for public exposure • Discuss reporting obligations
Compromise Fallout • Data loss impact • Institution • Individual (ramifications) • Handling the media • Learn from other institution exposures • Use success stories
Protect YOUR customers and YOUR institution Pizza anyone? • http://www.aclu.org/pizza/
Rinse, Lather and Repeat • Develop a strategy • Involve key players • Raise awareness and educate • Increase security measures (stay ahead, mitigate risk) • Assess regularly (mitigate exposure) • Budget for security measures annually • Revise vocabulary
Resources Educational • NIST: http://www.nist.gov/index.html • SANS: http://www.sans.org/ • Privacy Rights Clearinghouse: privacyrights.org • Directory of Data Breaches: dbloss.org Collaboration • IPAS: www.ipas.psu.edu • EDUCAUSE: http://www.educause.edu/ • http://www.aclu.org/pizza/
Open Dialog Penn State University Information Privacy and Security (IPAS) Mike Leach, mjl9@psu.edu Jenn Stewart, jas72@psu.edu ipas@psu.edu | 814-867-1340 | www.ipas.psu.edu