25
Information Security Christian Hamer Chief Information Security Officer

Information security fasit-cait-20150129_v04

Embed Size (px)

Citation preview

Page 1: Information security fasit-cait-20150129_v04

Information Security

Christian Hamer

Chief Information Security Officer

Page 2: Information security fasit-cait-20150129_v04

Agenda

• Context

• The Threat

• The Risk

• Our Strategy

• Progress

• Program Approach

• Program Highlights

• Additional Activities

• Awareness Campaign

• Updated Policy

• What YOU Can Do

Page 3: Information security fasit-cait-20150129_v04

Context

• We cannot do security FOR the community

• We WILL NOT do security TO the community

• We must do security WITH the community

Page 4: Information security fasit-cait-20150129_v04

The Threat: Higher education is a target for advanced attackers and cyber criminals.

“Universities are home to cutting-edge research and emerging technology patents; unfortunately, their networks are large and porous.”

Reports/Fireeye2013 p13

High-Value data:• Social Security numbers • Credit card numbers• Medical records • Employee records• Research

The scope:14,724,405 records disclosed in 745 reported higher education breaches since 2005.

Why?• Up to $45 per credit card number• Up to $3 per Social Security

number• Up to $50 per patient recordInfrastructure:

At Ohio State: “They did find evidence that the purpose of the unauthorized access was to launch cyberattacks on online business entities.”

Page 5: Information security fasit-cait-20150129_v04

Our Risk: Harvard’s people, data, and reputation put us at greater risk.

Harvard High-value Data

• Social Security Numbers• Credit card numbers• Employee records• Medical records

Research Data

• Commercial• Medical• Defense• Geo-Political• High-Visibility

Attacks against Harvard’s network in October were up 17% over last year.

Malware activity detected in October was up 69% from last year.

LulzSec

Syrian Electronic Army

Reputational Attacks

Automated Attacks

Page 6: Information security fasit-cait-20150129_v04

Our Strategy

Awareof the risks and responsibilities

Protectedfrom today’s threats

Readyto identify and respond to a threat

Reduce incidents, minimize impact.

Page 7: Information security fasit-cait-20150129_v04

Progress

Aware Elevated governance structure including URMC and Information Security Council

Created a simplified data classification system consistent across administrative and research data

Reviewed information security policies and translated them into requirements and “how-to” guides

Protected Reviewed, consolidated, and updated security tools and services

Deployed anti-phishing software

Ready Created a central Information Security team for the University

Developed incident response protocols

Page 8: Information security fasit-cait-20150129_v04

Program Approach: We are using a program approach to accelerate

progress and focus resources and deliverables on the highest risk.

FY15 Program Workstreams

Aware

Identify RiskUnderstand the state of information security risks University-wide

Communicate across the UniversityDeliver clear, consistent, and complete information to the community

Protected

Improve ServicesProvide the right services efficiently and effectively

Ready

Improve ProcessesEnhance our ability to respond to an incident or the needs of the community.

Page 9: Information security fasit-cait-20150129_v04

Program Highlights

• Develop a consolidated risk report by school

• Develop and launch a University-wide awareness campaign

• Conduct compromise assessment

• Improve incident response readiness and process

Page 10: Information security fasit-cait-20150129_v04

Additional Activities

• Enhance awareness campaign

• Conduct benchmark exercise

• Develop enhanced vendor management strategy that includes information security

• Conduct cybersecurity table top exercise

• Meet with FAS faculty groups

Page 11: Information security fasit-cait-20150129_v04

Additional Activities

• Establish University oversight committee on information security

• Accelerate two-factor authentication

• Integrate leadership into awareness campaign activities

Page 12: Information security fasit-cait-20150129_v04

Awareness Campaign

• WHY do we need an awareness campaign?

• WHAT are we trying to do?

• HOW will we approach it?

Page 13: Information security fasit-cait-20150129_v04

Why Awareness?

Page 14: Information security fasit-cait-20150129_v04

Security is something done for me.

I’m not sure where I report an incident.

Getting hacked is inevitable, it’s a losing battle.

Current State

Page 15: Information security fasit-cait-20150129_v04

Security is something done for me.

I’m not sure where I report an incident.

Getting hacked is inevitable, it’s a losing battle.

Security is everyone's responsibility.

I know where to get help and information.

There are things I can do to keep myself and the University secure.

Goal — Shift attitudes and behaviors

Page 16: Information security fasit-cait-20150129_v04

"Security is everyone's responsibility.”

“I know where to go to get help and information.”

“There are things I can do to keep myself and the University secure.”

Security is something done for me.

I’m not sure where I report an incident.

Getting hacked is inevitable, it’s a losing battle.

Information Security Policy

Security services

Security best practices

What we need to communicate

Page 17: Information security fasit-cait-20150129_v04

Click Wisely Know Your Data

Apply

Updates

Use Strong

Passwords

• Phishing• Handling

attachments

• Getting patched• Staying patched• “End of life”

systems

• Handling HRCI• What are you storing?• Don’t need it? Delete it!• Follow the Policy

• Password managers• Unique passwords• Multi-factor

authentication

Key messages

Page 18: Information security fasit-cait-20150129_v04

Awareness Strategy

• Quiet phase

– Staff: build towards IT Summit

• Begin with IT staff

– Faculty/students: build towards Fall startup

• Public launch

– October: National Cyber Security Awareness Month

– High level University support and visibility

Page 19: Information security fasit-cait-20150129_v04

Updated Policy

• policy.security.harvard.edu

• Highlights:

– Data Classification Table

– High Level Policy

– Requirements: WHAT you need to do

• Broken up by type

– How-Tos: HOW to meet the requirements

• Only if you want/need guidance

Page 20: Information security fasit-cait-20150129_v04
Page 21: Information security fasit-cait-20150129_v04

What YOU Can Do

Security is not just a service we can provide

for you, it is the goal we work toward with you

Page 22: Information security fasit-cait-20150129_v04

Aware

• Know Your Data– Use the Data Classification Table

– If you don’t need it, delete it! (securely)

• Click Wisely– Don’t open attachments or click on links in emails

you didn’t expect or from people you don’t know

• Spread the word

Page 23: Information security fasit-cait-20150129_v04

Protected

• Use Strong Passwords

– Use two-factor authentication where you can

– Use a password manager

– More to come on both of these

• Apply Updates

– To your desktop(s)

– To servers

• Make sure your laptops are encrypted

Page 24: Information security fasit-cait-20150129_v04

Ready

• Report suspicious activity

• If your department handles high-risk data, talk to us about other things you can do

Page 25: Information security fasit-cait-20150129_v04

Questions?

Christian Hamer

[email protected]