This document discusses cybersecurity risks facing universities and research. It provides background on the speaker and their experience in higher education cybersecurity. It then discusses why attackers target universities, including for financial gain, intellectual property theft, and disruptive attacks. The document outlines the types of data targeted at universities and notes that availability and integrity of research data is important beyond just confidentiality. It discusses how cybersecurity expectations are solidifying across presidential administrations and impact areas beyond just research, like student financial aid. The document presents approaches for achieving compliance and notes responsibilities must be shared when using cloud services. It recommends universities take a holistic, campus-wide approach to compliance.
1. Cybersecurity and Research
Industry perspectives for
ASEE ERC annual meeting
13 March 2018
Arlington, VA
Christian Schreiber, CISM, PMP
Global Pursuit Specialist – FireEye
The data is our differentiator. FireEye iSIGHT Intelligence represents an unparalleled knowledge repository of adversarial intelligence tracking more than 1M attacker personas, machine intelligence from our globally deployed sensors, victim intelligence from our incident response experts responding to the most significant breaches across the globe and campaign intelligence with our currently 7 Advanced SOCs across the globe protecting hundreds of our Managed Defense customers 24x7x365.
We have more than a decade of data specifically modeled around cyber threats from our leading cyber experts. This knowledge repository is considered as complete as nation-state capabilities and is used to augment the most sophisticated and well-resourced government agencies.
Adversary Intelligence – FireEye has more than 150 intelligence analysts and researchers, located in 22 countries and speaking 30+ languages, monitoring many threat actors. We also collect between 600,000 and one million malware samples per day from more than 70 different sources to analyze. We currently track greater than one million attacker personas, and we identify approximately one million stolen payment cards per month on the “dark web.”