140 likes | 154 Views
Practical Tips. Enabling the College to meet its Goals. Risk Management What is your risk tolerance?. Know Your Assets Is your data classified and owned?. The Human Element People are a threat, t raining is key!. A New Cost Paradigm What Can You Purchase? What Can You Support?.
E N D
A New Cost ParadigmWhat Can You Purchase? What Can You Support?
Policy Drives BehaviorThe Information Security Policy (ISP) defines a set of activities that the institution is expected to implement, control and monitorThe Acceptable Use Policy (AUP) defines a set of behaviors that users of the institution’s IT Resources are expected to uphold
Key PositionsChief Information Security Officer (CISO)Cyber AnalystFirewall EngineerSpecialized Software AdministratorCompliance and Controls AdministratorData Owners/StewardsInternal Auditor
Architecture ComponentsFirewallsNetwork Segmentation (Separation of Environments)End Point Protection/Malware ScannersSecurity Incident and Event Management (SIEM)Vulnerability AssessmentNetwork Monitoring (NOC/SOC)eDiscoveryForensics ToolMulti-Factor AuthenticationSecure Remote AccessDatabase EncryptionIAMInbound Email FilteringData Loss PreventionRisk Management & Workflow
Industry OrganizationsEDUCAUSEREN-ISACNWACCOHSU Cyber Summit
A Shared ResponsibilityMaking information security an institutional priority is the responsibility of the Board of Directors Ensuring the appropriate use of IT Resources is the responsibility of the College AdministrationImplementing and maintaining defense in depth is the responsibility of ITBeing responsible stewards of data is everyone’s responsibility!
Make a plan! Make Information Security a part of your IT Strategy. Review Cyber Security insurance. Develop and publish Information Security and Acceptable Use policies. Identify all regulatory requirements with which the college must comply. Document Personally Identifiable Information (PII) and any other protected/sensitive data maintained by the college that is subject to compliance (both physical and digital). Identify all the ways in which data is accessed and do a full review of Access Controls. Develop a risk tolerance profile for the college for the different data categories. Document a “Defense in Depth” program that addresses the defined regulatory risks (this would include a project “road map” to address all areas of cyber defense). Once this program is in place perform internal control reviews, annual security audits, penetration tests and vulnerability assessments.