SlideShare a Scribd company logo
1 of 20
Cybersecurity and Research
Industry perspectives for
ASEE ERC annual meeting
13 March 2018
Arlington, VA
Christian Schreiber, CISM, PMP
Global Pursuit Specialist – FireEye
Introductions
2
©2018 FireEye | Private & Confidential
Professional background
20 years higher education experience
• CISO positions: The University of Arizona, University
of Wisconsin – Whitewater
• IT leadership: University of Wisconsin – Madison,
Central Michigan University
• Service provider leadership: Ellucian / SunGard
Higher Education
FireEye roles
• Global Pursuit Specialist with focus on higher
education
• Program Executive supporting the University of
California System
3
©2018 FireEye | Private & Confidential
4
To relentlessly protect our customers with innovative technology
and expertise learned on the front lines of cyber attacks.
FIREEYE MISSION
©2018 FireEye | Private & Confidential
FireEye built unique visibility across attack lifecycle
Adversary Intelligence
Deploying global researchers with
local knowledge
• 22 countries
• 30+ languages
• 150+ analysts & researchers
Machine Intelligence
Generating attack telemetry globally
• 15,000 network sensors
• Millions of endpoints and email mailboxes
• 56 countries
• Tens of millions malware analysis / hour
Victim Intelligence
Responding to the most significant
breaches
• 13+ years investigative expertise
• 200+ of the Fortune 500
• 26 countries with consultants
Campaign Intelligence
Witnessing attacks as they unfold
• 7 Security Operations Centers
• 99m+ events ingested
• 21m+ alerts validated by Intel
• 33,700+ incidents dispositioned
24% of R1 institutions
are FireEye
customers
5
©2018 FireEye | Private & Confidential
Experts frequently cited about cybersecurity trends
6
Understanding the threat
7
©2018 FireEye | Private & Confidential
Reasons attackers target universities
8
• Financial gain
•Attackers steal information that can be sold (such as personal information or financial information) or extort
victims for money (such as Ransomware)
Organized Crime
• Disruption and political statements
•Attackers spread political messages (such as defacing websites with political messages)Hacktivism
• Theft of intellectual property
•Attackers steal information for economic or political gain (such as research or politically sensitive information)Economic Espionage
• Exploit resources for further attacks
•Attackers use university technology to attack other organizations (such as compromising a server to carry out other
attacks or using email to launch spear phishing attacks)
Pass-through Attacks
• Disrupt operations
•Attackers aim to interrupt normal university business operations (such as launching a denial of service attack)Destructive Attacks
©2018 FireEye | Private & Confidential
Types of university data targeted by attackers
Sensitive Enterprise Data
• Credentials
• Employee data
• Student records
• Financial data
• Recruitment and
marketing data
Research with Potential
Economic Value
• Energy technology
• Biotechnology, medical,
and pharmaceuticals
• Engineering
• New materials, such as
semi-conductors
• Information technology
Politically or Commercially
Sensitive Information
• Climate modelling
• Economic data and
projections
• Live animal research
• Product development
data
• Information used for
expert testimony
9
* Adapted from: Universities UK. “Cyber security and universities: managing the risk.” November 2013.
©2018 FireEye | Private & Confidential
Some of the earliest publicly reported APT attacks leveraged university
computer networks
10
“To run their spying
campaign, the [Chinese]
attackers used a number of
compromised computer
systems registered to
universities in North
Carolina, Arizona, Wisconsin
and New Mexico…”
©2018 FireEye | Private & Confidential
Attackers consistently breach cyber defenses
11
* FireEye. “Maginot Revisited.” 2015.
2015 FireEye study analyzed
more than 1,600 organizations
•96% actively breached during 30-day test
period
•27% had evidence of advanced attacks
Study included more than 100
universities
•100% actively breached during test period
•37% had evidence of advanced attacks
Impact on research processes
12
©2018 FireEye | Private & Confidential
Cybersecurity not just about keeping data secret
13
Information
Security
Confidentiality
IntegrityAvailability
Most people associate cybersecurity
with CONFIDENTIALITY
•Prevent attackers from stealing personal
information, intellectual property, etc.
AVAILABILITY and INTEGRITY of
research data are also important
•Prevent attackers from destroying years of
research making it unrecoverable
•Prevent attackers from modifying data to
produce inaccurate research results
©2018 FireEye | Private & Confidential
Cybersecurity expectations beginning to solidify
14
George W Bush
• Designation and Sharing of Controlled Unclassified
Information (CUI) (07 May 2008)
Barack Obama
• Executive Order 13556 – Controlled Unclassified
Information (04 Nov 2010)
• Executive Order 13636 – Improving Critical Infrastructure
Cybersecurity (12 Feb 2013)
•Donald J Trump
• Presidential Executive Order on Strengthening the
Cybersecurity of Federal Networks and Critical
Infrastructure (11 May 2017)
Core concepts for due diligence consistent across three administrations
©2018 FireEye | Private & Confidential
Institutional impact not limited to research
15
“[Reminding] institutions of their legal
obligations to protect student information used
in the administration of the Title IV Federal
student financial aid programs.”
•“We also advise institutions that… NIST SP
800-171 identifies recommended requirements
for ensuring the appropriate long-term security
of certain Federal information in the
possession of institutions.”
US Department of Education notices GEN-15-18 and GEN-16-12
Addressing the requirements
16
©2018 FireEye | Private & Confidential
Many approaches for achieving compliance
Delegate to individual
researchers
Shared services at institution
level
Collaborative shared services
across institutions
Commercial hosting &
compliance services
•PRO: Low initial institutional investment
•CON: Duplicated costs across many programs
•CON: Responsibility rests with individuals who are not experts in IT,
cybersecurity, compliance
•CON: Limited institutional visibility into risk exposure
•PRO: Economies of scale for core infrastructure, personnel, and compliance
processes
•PRO: Strengthens institutional visibility into risk exposure
•CON: Individual researchers may lose some flexibility in order to work within
broader infrastructure and processes
•PRO: Additional economies of scale
•CON: Individual researchers and institutions may lose flexibility
•CAVEAT: Understand institution roles and responsibilities for shared
governance, compliance, and cybersecurity processes
•PRO: Allows some risk transference to third party
•PRO/CON: May be higher or lower cost, depending on vendor
•CAVEAT: Understand institution and vendor roles and responsibilities for
compliance and cybersecurity processes
17
©2018 FireEye | Private & Confidential
Responsibilities when adopting cloud services
18
Hosting your research in the cloud does not remove compliance responsibility
"Security and Compliance is a shared
responsibility between AWS and the
customer…
Customers should carefully consider the
services they choose as their
responsibilities vary depending on the
services used, the integration of those
services into their IT environment, and
applicable laws and regulations.”
* Amazon AWS. “Shared Responsibility Model.” Available online at https://aws.amazon.com/compliance/shared-responsibility-model/
©2018 FireEye | Private & Confidential
Institutions should take holistic approach to compliance
19
Don’t delegate to individual teams
•Replicating compliance across every group is not cost effective, so
approach the process more strategically
Research-focused groups should not have to tackle this
issue alone
•DOE letters regarding protection of financial aid data extends scope to
administrative systems
Build a consistent campus-wide program
•Build a program that addresses all potentially regulated data in a
consistent manner
•Include (at a minimum) faculty, Research, CIO, CISO, Privacy, Risk
Management, Audit, Insurance, and Legal
Thank you!
20

More Related Content

What's hot

ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPTdannyboi17
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentationVaibhav R
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson CapitolTechU
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintShiva Bissessar
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)James Neo
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorPaul O'Connor
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
PhD Projects in Information Security Research Assistance
PhD Projects in Information Security Research AssistancePhD Projects in Information Security Research Assistance
PhD Projects in Information Security Research AssistancePhD Services
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserStephanie Baruk
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityTonex
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 

What's hot (20)

ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPT
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
PhD Projects in Information Security Research Assistance
PhD Projects in Information Security Research AssistancePhD Projects in Information Security Research Assistance
PhD Projects in Information Security Research Assistance
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
Srini
SriniSrini
Srini
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - Teaser
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 

Similar to Cybersecurity and Academic Research

Bagesh_Data Privacy and Security.pdf
Bagesh_Data Privacy and Security.pdfBagesh_Data Privacy and Security.pdf
Bagesh_Data Privacy and Security.pdfAyushSingh224545
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataIBM Security
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsRd. R. Agung Trimanda
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 

Similar to Cybersecurity and Academic Research (20)

Bagesh_Data Privacy and Security.pdf
Bagesh_Data Privacy and Security.pdfBagesh_Data Privacy and Security.pdf
Bagesh_Data Privacy and Security.pdf
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Cybersecurity and Academic Research

  • 1. Cybersecurity and Research Industry perspectives for ASEE ERC annual meeting 13 March 2018 Arlington, VA Christian Schreiber, CISM, PMP Global Pursuit Specialist – FireEye
  • 3. ©2018 FireEye | Private & Confidential Professional background 20 years higher education experience • CISO positions: The University of Arizona, University of Wisconsin – Whitewater • IT leadership: University of Wisconsin – Madison, Central Michigan University • Service provider leadership: Ellucian / SunGard Higher Education FireEye roles • Global Pursuit Specialist with focus on higher education • Program Executive supporting the University of California System 3
  • 4. ©2018 FireEye | Private & Confidential 4 To relentlessly protect our customers with innovative technology and expertise learned on the front lines of cyber attacks. FIREEYE MISSION
  • 5. ©2018 FireEye | Private & Confidential FireEye built unique visibility across attack lifecycle Adversary Intelligence Deploying global researchers with local knowledge • 22 countries • 30+ languages • 150+ analysts & researchers Machine Intelligence Generating attack telemetry globally • 15,000 network sensors • Millions of endpoints and email mailboxes • 56 countries • Tens of millions malware analysis / hour Victim Intelligence Responding to the most significant breaches • 13+ years investigative expertise • 200+ of the Fortune 500 • 26 countries with consultants Campaign Intelligence Witnessing attacks as they unfold • 7 Security Operations Centers • 99m+ events ingested • 21m+ alerts validated by Intel • 33,700+ incidents dispositioned 24% of R1 institutions are FireEye customers 5
  • 6. ©2018 FireEye | Private & Confidential Experts frequently cited about cybersecurity trends 6
  • 8. ©2018 FireEye | Private & Confidential Reasons attackers target universities 8 • Financial gain •Attackers steal information that can be sold (such as personal information or financial information) or extort victims for money (such as Ransomware) Organized Crime • Disruption and political statements •Attackers spread political messages (such as defacing websites with political messages)Hacktivism • Theft of intellectual property •Attackers steal information for economic or political gain (such as research or politically sensitive information)Economic Espionage • Exploit resources for further attacks •Attackers use university technology to attack other organizations (such as compromising a server to carry out other attacks or using email to launch spear phishing attacks) Pass-through Attacks • Disrupt operations •Attackers aim to interrupt normal university business operations (such as launching a denial of service attack)Destructive Attacks
  • 9. ©2018 FireEye | Private & Confidential Types of university data targeted by attackers Sensitive Enterprise Data • Credentials • Employee data • Student records • Financial data • Recruitment and marketing data Research with Potential Economic Value • Energy technology • Biotechnology, medical, and pharmaceuticals • Engineering • New materials, such as semi-conductors • Information technology Politically or Commercially Sensitive Information • Climate modelling • Economic data and projections • Live animal research • Product development data • Information used for expert testimony 9 * Adapted from: Universities UK. “Cyber security and universities: managing the risk.” November 2013.
  • 10. ©2018 FireEye | Private & Confidential Some of the earliest publicly reported APT attacks leveraged university computer networks 10 “To run their spying campaign, the [Chinese] attackers used a number of compromised computer systems registered to universities in North Carolina, Arizona, Wisconsin and New Mexico…”
  • 11. ©2018 FireEye | Private & Confidential Attackers consistently breach cyber defenses 11 * FireEye. “Maginot Revisited.” 2015. 2015 FireEye study analyzed more than 1,600 organizations •96% actively breached during 30-day test period •27% had evidence of advanced attacks Study included more than 100 universities •100% actively breached during test period •37% had evidence of advanced attacks
  • 12. Impact on research processes 12
  • 13. ©2018 FireEye | Private & Confidential Cybersecurity not just about keeping data secret 13 Information Security Confidentiality IntegrityAvailability Most people associate cybersecurity with CONFIDENTIALITY •Prevent attackers from stealing personal information, intellectual property, etc. AVAILABILITY and INTEGRITY of research data are also important •Prevent attackers from destroying years of research making it unrecoverable •Prevent attackers from modifying data to produce inaccurate research results
  • 14. ©2018 FireEye | Private & Confidential Cybersecurity expectations beginning to solidify 14 George W Bush • Designation and Sharing of Controlled Unclassified Information (CUI) (07 May 2008) Barack Obama • Executive Order 13556 – Controlled Unclassified Information (04 Nov 2010) • Executive Order 13636 – Improving Critical Infrastructure Cybersecurity (12 Feb 2013) •Donald J Trump • Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (11 May 2017) Core concepts for due diligence consistent across three administrations
  • 15. ©2018 FireEye | Private & Confidential Institutional impact not limited to research 15 “[Reminding] institutions of their legal obligations to protect student information used in the administration of the Title IV Federal student financial aid programs.” •“We also advise institutions that… NIST SP 800-171 identifies recommended requirements for ensuring the appropriate long-term security of certain Federal information in the possession of institutions.” US Department of Education notices GEN-15-18 and GEN-16-12
  • 17. ©2018 FireEye | Private & Confidential Many approaches for achieving compliance Delegate to individual researchers Shared services at institution level Collaborative shared services across institutions Commercial hosting & compliance services •PRO: Low initial institutional investment •CON: Duplicated costs across many programs •CON: Responsibility rests with individuals who are not experts in IT, cybersecurity, compliance •CON: Limited institutional visibility into risk exposure •PRO: Economies of scale for core infrastructure, personnel, and compliance processes •PRO: Strengthens institutional visibility into risk exposure •CON: Individual researchers may lose some flexibility in order to work within broader infrastructure and processes •PRO: Additional economies of scale •CON: Individual researchers and institutions may lose flexibility •CAVEAT: Understand institution roles and responsibilities for shared governance, compliance, and cybersecurity processes •PRO: Allows some risk transference to third party •PRO/CON: May be higher or lower cost, depending on vendor •CAVEAT: Understand institution and vendor roles and responsibilities for compliance and cybersecurity processes 17
  • 18. ©2018 FireEye | Private & Confidential Responsibilities when adopting cloud services 18 Hosting your research in the cloud does not remove compliance responsibility "Security and Compliance is a shared responsibility between AWS and the customer… Customers should carefully consider the services they choose as their responsibilities vary depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations.” * Amazon AWS. “Shared Responsibility Model.” Available online at https://aws.amazon.com/compliance/shared-responsibility-model/
  • 19. ©2018 FireEye | Private & Confidential Institutions should take holistic approach to compliance 19 Don’t delegate to individual teams •Replicating compliance across every group is not cost effective, so approach the process more strategically Research-focused groups should not have to tackle this issue alone •DOE letters regarding protection of financial aid data extends scope to administrative systems Build a consistent campus-wide program •Build a program that addresses all potentially regulated data in a consistent manner •Include (at a minimum) faculty, Research, CIO, CISO, Privacy, Risk Management, Audit, Insurance, and Legal

Editor's Notes

  1. The data is our differentiator. FireEye iSIGHT Intelligence represents an unparalleled knowledge repository of adversarial intelligence tracking more than 1M attacker personas, machine intelligence from our globally deployed sensors, victim intelligence from our incident response experts responding to the most significant breaches across the globe and campaign intelligence with our currently 7 Advanced SOCs across the globe protecting hundreds of our Managed Defense customers 24x7x365. We have more than a decade of data specifically modeled around cyber threats from our leading cyber experts. This knowledge repository is considered as complete as nation-state capabilities and is used to augment the most sophisticated and well-resourced government agencies. Adversary Intelligence – FireEye has more than 150 intelligence analysts and researchers, located in 22 countries and speaking 30+ languages, monitoring many threat actors. We also collect between 600,000 and one million malware samples per day from more than 70 different sources to analyze. We currently track greater than one million attacker personas, and we identify approximately one million stolen payment cards per month on the “dark web.”