220 likes | 354 Views
Securing Valuable Information: Protect your data that matter most! Tim Grelling March 2013. Introduction. Who am I? Based in the Philadelphia area InfoSec consultant for over 12 years Have assisted clients across every vertical, with every major compliance and security concern.
E N D
Securing Valuable Information:Protect your data that matter most!Tim GrellingMarch 2013
Introduction • Who am I? • Based in the Philadelphia area • InfoSec consultant for over 12 years • Have assisted clients across every vertical, with every major compliance and security concern
Core BTS Overview Office Locations 12 offices , 7 states Global Implementation 12 countries Impact Experience Transformation madison, WI milwaukee, WI appleton, WI indianapolis, IN nashville, TN exton, PA reading, PA somerville, NJ washington, DC new york city, NY long island, NY albany, NY
Services Overview “Service Disciplines” PLAN BUILD DEPLOY OPERATE EXECUTE ENABLE ENVISION \ PRODUCT ARCHITECTURES COMMUNICATIONS DATACENTER CLOUD INFRASTRUCTURE VOICE VIRTUALIZATION PLATFORM UNIFIED MESSAGING UNIFIED STORAGE SOFTWARE MOBILITY & PRESENCE ARCHIVING & BACKUP SERVICES VIDEO CONFERENCING BUSINESS CONTINUITY SOCIAL TECHNOLOGIES NETWORKING
Customer Snapshot SLED & HIGHER EDUCATION HEALTHCARE ENTERTAINMENT • FINANCIAL
Overview • What “sensitive” data do schools have? • Schools present unique security challenges. • Typical issues encountered. • What can we do to reduce risk? • Staying secure on a school budget. …lots of content, moving quickly!
Before we begin • Please help me avoid this… let’s collaborate!
What are we protecting? • Schools differ with “how much” data they have, but they always have something • Employee data (SSN, DOB, etc.) • Student data (grades, DOB, etc.) • Internal operational data (processes, financials, etc.)
Why protect our data? • We often hear, “We’re not a bank!” • …with the implication that we don’t need an elevated level of security • …that’s right! • InfoSec risks abound for schools: • Insider threats (students, employees) • Outsider threats (parents, random attackers) • Environmental threats (blizzards, storms, power disruptions, etc.)
Breaches @School • While not as newsworthy as breaches in the financial sector, they occur
Cultural Challenges • The School District environment presents unique IT challenges… • Priority of student enrichment above all else • Used to justify poor security practices • In the race to stay “cutting edge” we may implement technologies without assessing risk • Smart boards, laptops, tablets, smartphones…
Cultural Challenges • The School District environment presents unique IT challenges… • Annual turnover of students, and related IT Accounts stresses our IT staff • Students sometimes retain email or some other access privileges post-graduation
Cultural Challenges • The School District environment presents unique IT challenges… • How do you secure a 6 year old? • “Enterprise” security controls, such as strong passwords, aren’t an option
Cultural Challenges • The School District environment presents unique IT challenges… • IT Staff are stretched thin • Often utilize “Technology Coordinators” to supplement at each location • IT spends substantial time “troubleshooting”
Common Issues • While the K12 environment presents unique challenges, baseline security controls are universal • Patch Management weaknesses • Configuration/hardening weaknesses • Third Party Management weaknesses • Policy / Procedures DNE • Key takeaway: organizations often struggle with strong process
Effective security programs can be tough • Build-in security from the ground up! • Cheaper in the long run • We become “better” at security • Security add-ons lead to: • Non-functional Band-Aids… you may pass an audit, or think you’ve avoided incidents, but won’t have effective security • Dollars wasted on ineffective solutions – we could have done ANYTHING else with those dollars
Back to the basics… • Certain themes crop up again and again: • Lack of security assessment • Lack of strong foundational security controls • Lack of understanding of sensitive data, and its location • Third party risks • These aren’t “easy,” but can be addressed
Utilize Free Tools/Resources • http://sectools.org/ - Top 125 free and commercial security tools • http://cisecurity.org/ - Security Baselines • http://www.sans.org/security-resources/ - Little bit of everything
Summary • The security battlefield is changing: • Laptops, smartphones, tablets enable our users and students but render some organizational controls useless • We need to be proactive with our controls - policy and process first, then education of end users, then implementation of widgets, if any • Understand your risk to make better business decisions
Thank You! • I am very thankful for your valuable time. Tim Grelling Tim.Grelling@corebts.com 484-875-3247