29
September 25, 2019 Cyber Security in Higher Education

Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

September 25, 2019

Cyber Security in Higher Education

Page 2: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

Esteemed Panel … Cyber Security in Higher Education

29/252019

TomDeChiaroVicePresident,CIODrexelUniversity

KenMakoidRegionalVicePresidentNortheastSalesFlexenIal

FrankYakoCIO,DirectorofStrategicIniIaIvesASMGi

SteveRoesingCEOASMGi

MODERATOR

Page 3: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

3

Agenda

9/25/2019

u CyberLandscapeinHigherEduca4onu DiscussionTopic#1–Strategyu DiscussionTopic#2–Assessmentsu DiscussionTopic#3–Solu4onsu DiscussionTopic#4–DataCenteru Conclusion+KeyPointsu Ques4ons+ClosingRemarks

Page 4: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

4

Cyber in Higher Education is Challenging because …

9/25/2019

Page 5: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

5

Cyber in Higher Education is Challenging because …

9/25/2019

Page 6: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

6

Cyber in Higher Education is Challenging because …

9/25/2019

Page 7: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

7

#1STRATEGY

Does your Cyber Strategy align with your University’s Strategic Plan?

9/25/2019

Page 8: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

8

How do you prioritize your initiatives?

9/25/2019

CyberExper7sepriori7zedTop20

Page 9: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

9

How do you prioritize your initiatives?

9/25/2019

HistoricalBreachDataannotatedwithCISControls

Page 10: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

10

How do you prioritize your initiatives?

9/25/2019

SafeBreachALack

Simulator

Page 11: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

11

How do you prioritize your initiatives?

9/25/2019

Quan&fyingCyberRisku Leveragewhatyouhave

u Bringsecurityclosertothebusiness

u Createacommonlanguagetodiscusscyberrisks

u Priori4za4on=Alignbudgetswithini4a4vesthatprovideactualeconomicimpact

Page 12: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

At the Center is CISO, CFO & CEO Synchronicity

→ Enhances CISO and CFO / CEO dialogue and understanding → Financial measurement of balance sheet impact → Financial accuracy and substantiation of cyber budget requirements and application → Assimilation of cyber risk into enterprise risk management (ERM) → Acceptance of CISO role as a strategic function

12

Internal: External:

→ Enables CEO to present tangible assessment of cyber risk to stakeholders → Enhances financing prospects → Strengthening of company’s position with External constituents (e.g. regulators, etc.) → M&A and other growth strategy advantages → Enables superior risk solutions (insurance; capital markets; security tech channel sales)

The Benefits of Quantification

9/25/2019

Page 13: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

13

#2ASSESSMENTS

How many assessments do you do to meet your Compliance and Privacy requirements?

9/25/2019

Page 14: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

149/25/2019

Compliance

PCI-DSSHIPAAFERPAGLBAFISMA

Frameworks

NISTISO/IEC27001,2CIS

Page 15: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

159/25/2019

Common Controls Framework (CCF)

Page 16: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

16

#3SOLUTIONS

What problems are you trying to solve?

9/25/2019

Page 17: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

17

A Holistic Approach to Cyber Security

TotalSolu7on=3Pillars

9/25/2019

+ +

Page 18: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

18

Lots to choose from …

9/25/2019

Page 19: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

19

How do you prioritize your initiatives?

9/25/2019

CyberExper7sepriori7zedTop20

Page 20: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

20

How do you prioritize your initiatives?

9/25/2019

HistoricalBreachDataannotatedwithCISControls

Page 21: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

21

#4DATA CENTER

Do you outsource your data center? How does your data center impact your Security?

9/25/2019

Page 22: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

229/25/2019

How many of your data centers look like this?

Page 23: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

Fully compliant solutions

SOC 1 dual-standard report

Level 1 PCI DSS service provider for

colocation and cloud

Information Security Management System

standard

HITRUST CSF service provider for colocation and

cloud

Health Insurance Portability and

Accountability Act Security Rule

American Institute of Certified Public Accountants Trust

Services Principles for security, and availability

SOC 3 Trust Services Report

Our compliance expertise runs deep with over 50 compliance-focused engineers.

Page 24: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

Colocation capability highlights

UniqueDensityFootprint•  Densityupto50kwpercabinetinnewerfaciliIes

FlexibleServiceOpIons•  Inventoryandtermstomeetcustomergrowth

PricingModelsToMatchCustomerNeeds•  FixedandvariablebillingopIons

Support points: •  40 Datacenters •  Wholesale and Retail

Colocation capability •  100% Power SLA •  Team of Experts

Available for Design, Implementation and Maintenance Needs

Na4onwidepresenceandofferingsforallcustomertypes

Page 25: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

Flexential capabilitiesWe help organizations optimize their IT transformation journey while simultaneously balancing cost, scalability and security.

25

Page 26: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

26

Conclusion + Key Points

9/25/2019

u Don’trecreatethewheelu Mapcontrolstocompleteoneassessmentthatmeetsallrequirements

u Quan4fyRiskstoestablishpriorityu Orchestra4on+Automa4onwillhelpmeetgrowingdemandsu LeverageCyberInsuranceu Outsourcetotrustedpartnerwhencapacityorexper4seislacking

u Thereisstrengthinnumbers!Let’sworktogethertohelpyouALLsucceed!

Page 27: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

QUESTIONS?

9/12/2019

Page 28: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

Upcoming Webinars and Events

Eventsu  September 25th 4PM - Cyber Security Issues in Higher Education

panel discussion at the Union League of Philadelphia

u  October 21-25 - Information Security Summit at The Cleveland I-X Center

Webinarsu  September 18 - Setting the Trap: Crafty Ways The Bad Guys Use Pretexting To Own Your Network

presented by KnowBe4

u  October 3 - Securing Your Endpoints – Why Are Businesses Getting Hit With So Much Malware?presented by ASMGi and Malwarebytes

u  October 10 - Where Will You Compute Securely?presented by ASMGi and Flexential

u  October 17 - Do You Know Where Your Data Is And Who Is Accessing? presented by ASMGi and Heureka

Page 29: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast

800 Superior Ave E, Ste 1050 Cleveland, OH 44114 Phone: 216.255.3040 Fax: 216.274.9647 Email: [email protected]

Thank You!

29