18
Lauren May Information Security Institute, 1 of 18 Towards Protecting Critical Infrastructure Lauren May, Tim Lane The Role of Information Security Management in Australian Universities

Towards Protecting Critical Infrastructure

Embed Size (px)

DESCRIPTION

Towards Protecting Critical Infrastructure. The Role of Information Security Management in Australian Universities. Lauren May, Tim Lane. Outline. Goals IS Threats/Issues in the Tertiary Sector The Need for a Systemic Approach The Survey Practitioner’s Management Model The Trial - PowerPoint PPT Presentation

Citation preview

Page 1: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT1 of 18

Towards Protecting Critical Infrastructure

Lauren May, Tim Lane

The Role of Information Security Management in Australian Universities

Page 2: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT2 of 18

Outline

• Goals

• IS Threats/Issues in the Tertiary Sector

• The Need for a Systemic Approach

• The Survey

• Practitioner’s Management Model

• The Trial

• Conclusion

Page 3: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT3 of 18

Goal of this research

To improve the culture of compliance towards information security in the Australian university sector.

Page 4: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT4 of 18

IS Threats in the Tertiary Sector

Universities:

• host a large number of diverse systems

• IT exploration and research

• reflect community standards

Page 5: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT5 of 18

Issues in Tertiary Environment

• Challenge of cultures and technologies–academia needs

–corporate and business requirements

–transient and explorative student base

Page 6: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT6 of 18

• Balance of requirements–conflicts of priorities

–coordinated security approach

–acceptance in environment

IS Issues in Tertiary Environment

Page 7: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT7 of 18

The Need for a Systemic Approach to Managing Security

• existing approaches - standards–no single point of understanding

• analysis of factors and issues

• need systemic approach to ISM which will progress appropriate good practice

Page 8: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT8 of 18

The Survey ...

• Participants: all 38 Australian universities – 100% response

– current status of ISM ?– key issues surrounding ISM ?– how to improve ISM ?

Page 9: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT9 of 18

... The Survey – key findings

• existing approaches• awareness, understanding• structured coordinated model• management support• resources

Page 10: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT10 of 18

Security Practitioner’s Management Model

Page 11: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT11 of 18

Security Practitioner’s Management Model

Page 12: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT12 of 18

Security Practitioner’s Management Model

Page 13: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT13 of 18

Security Practitioner’s Management Model

Page 14: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT14 of 18

Security Practitioner’s Management Model

Page 15: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT15 of 18

Security Practitioner’s Management Model

Page 16: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT16 of 18

Security Practitioner’s Management Model

Page 17: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT17 of 18

In trial at Southern Cross University

• IS practitioner

• senior management

• IT staff

• non-IT staff (end users)

Page 18: Towards Protecting Critical Infrastructure

Lauren May Information Security Institute, QUT18 of 18

Conclusion

• IS - an important role in universities

• comprehensive survey supports concepts

• model focuses on how to transparently progress security knowledge to implementation

• in trial at Southern Cross University

• future research – benchmarking, measurement