8
1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer

1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer

Embed Size (px)

Citation preview

  • Slide 1
  • 1 Information Technology Security Services at The University of Michigan Paul Howell Chief Information Technology Security Officer
  • Slide 2
  • 2 ITSS Overview Service offerings Security council Initial activities Questions
  • Slide 3
  • 3 ITSS Offerings Reactive ServicesProactive ServicesSecurity Quality Management Services Alerts and Warnings Incident Handling Incident Handling Incident analysis Incident response on site Incident response support Incident response coordinationIncident analysisIncident response on siteIncident response supportIncident response coordination Vulnerability Handling Vulnerability Handling Vulnerability analysis Vulnerability response Vulnerability response coordinationVulnerability analysisVulnerability response coordination Artifact Handling Artifact Handling Artifact analysis Artifact response Artifact response coordinationArtifact analysisArtifact response coordination Announcements Technology Watch Security Audits or Assessments Configuration and Maintenance of Security Tools, Applications, and Infrastructures Development of Security Tools Intrusion Detection Services Security-Related Information Dissemination Risk Analysis Security Consulting Awareness Building Education/Training Product Evaluation or Certification
  • Slide 4
  • 4 Security Council Cross University membership consisting of a few Deans, business owners, UMHS, and several faculty. Makes policy recommendations to Provost, CFO, and EVP for Medial Affairs. Dialog & sane decisions around risk management. Provides general direction for ITSS.
  • Slide 5
  • 5 Initial Activities Planning for Staff sharing / training (discussed later) Incident response Security assessments Hiring for several security positions. Join FIRST. Prompt reporting of all computer security incidents.
  • Slide 6
  • 6 Initial Activities cont. Establish an Incident Response Oversight Team. Vulnerability scans of all wired & Wi-Fi campus networks. ITSS Web site. Dark IP space for identifying scanning and other activity.
  • Slide 7
  • 7 Initial Activities cont. NetFlow collection / processing at all UM- Internet interconnects. Document and maintain network contacts for all wired & Wi-Fi networks. Tools and procedures to locate a Wi-Fi computer / AP.
  • Slide 8
  • 8 Staff Sharing Program Goals Scale security skills within the existing workforce Medium level of competency Training done over a 4 to 6 month period, consisting of a combination of self-paced, lecture & lab, and on-the-job Pre-testing and post-testing measure progress New security job title and compensation, fraction determined by local needs Periodic rotation through ITSS for 4 to 6 months at half-time for on-going skills updating