SlideShare a Scribd company logo
IT Security @ UNB
How UNB is using policy, practice and technology to enhance cyber security
What are we here to talk about?
uUNB’s titanic cyber security struggle

uUse threat intelligence for both tactical
and strategic decisions

uMoving away from playing a losing
game
My background
u Bachelor of Arts in Information and Communications
Studies (‘05)
u Former Canadian Army reservist (armoured vehicle driver
& gunner)
u Former reporter for the provincial newspaper
u Former web content strategist for UNB Communications
& Marketing
u Accidental IT Security professional and fortunate member
of an amazing team
u Master of Business Administration (‘15)
The Security Action Team (SAT)
uProvides IT security leadership
uFormulates, implements and
coordinates polices, plans and projects
uIncident Response
uAdvises IT security resourcing,
technologies, and community
education.
About UNB
u North America’s
oldest English public
university (Est. 1785)
u 11,000 students
u 2,000 FTE Faculty and
Staff
u Hybrid IT environment
(centralized and
decentralized)
In defence of “cybersecurity”
Officially, ISO/IEC 27032 addresses “Cybersecurity” or
“Cyberspace security”, defined as the “preservation of
confidentiality, integrity and availability of information in the
Cyberspace”. 
In turn “the Cyberspace” (complete with definite article) is
defined as “the complex environment resulting from the
interaction of people, software and services on the Internet
by means of technology devices and networks connected
to it, which does not exist in any physical form”.
What I think we do:
What clients think we do….
Why are universities a target?
u We we’re designed to be open (we’re
easy)
u We have a treasure trove of PII
u We have valuable intellectual property
u We have others valuable intellectual
property
u We are a route into more secure orgs
Our challenges
u We average between 83 and 55 attempts per second to
breach our network (massively automated threats)

u We have more than 2.2 million security events daily on our
network

u We have more than 500 offences weekly 

u We have as many as 120 compromised endpoints a month
(half of which are students)
u We are the ultimate BYOD environment
The cost of a breach
u $184 dollars on average per record in
education, based on figures from a 2014
Ponemon Institute Study
Threat Intelligence Sources
u QRadar Security Inteligence Event
Management (SIEM)
u Trend Micro Deep Discovery Malware
detection tool
u Kaspersky Anti-Virus Reporting System
u Government, industry contacts and listservs
u InfoSec News Sources and Social Media
Malware CNC CallBacks (30 days)
Affected Hosts
Threat Patterns
Remote Intrusion Attempts Source
Remote Intrusion Attempts
Destination
Security Offences
Moving
beyond
tactical
response
UNB’s move to IT Risk Management
Day-to-day IT Operations
IT Security Operations
Threat Analysis, Policy & Procedure Development
IT Risk Management
Maturity
Iterative improvement model
Risk
Management
ITOperations
Security
Operations
ThreatAnalysis

Policy&
Procedure
Development
The Security Building Blocks
Operations
 Service Desk

Security Action Team
Communications:
Risk Management, Quality Assurance and Standards Development
Service Desk
uHelp Desk escalates
threats to SAT
uAssists with user
education
uDesktop Group helps
harden end points and
triage compromises
Operations
uSystems and Network
monitoring, reporting
of threats, ensuring
patching and
reporting policy or
procedure
compliance issues.
Participates in
incident response.
Communications
u Assists with development and execution of
user awareness and culture change
campaigns. 

u Assists with developing and executing
incident communications
Security and Operations
u Operations: Trying to keep the lights on
u IT Security: ensuring compliance with protective measures
u Critical to avoid ineffective communications. Security and
Operations groups in IT have different goals and in some
cases cultures. Critical to ensure alignment with overall IT
Strategy
The cross-functional workflow
Client provides
username and
password in phishing
attempt
Help Desk or Level One
advises + assists client
with safe password reset
IT Security initiates
incident investigation
Operations staff
engaged to assist with
log review / access
checks
UNB Privacy Officer
engaged in event of a
potential data breach
Client advised of
investigation,
encouraged to take
awareness course
What fighter jets in the Korean War
can teach us about cybersecurity
A harsh truth:
uSimply buying the latest
and greatest big shiny
security technology will
not make your
organization safer
Security Strategy Pillars
Security Strategy
IT Security Policy

Data Governance
Security Architecture:

Tools, People, Process
Culture Change:

User Awareness +
Behaviour Change
Translating Cyber Security-ese to
Business-ese
Making the case
Where
cybersecurity
fits in Porter’s
Value Chain
The disconnect between threat
awareness and concern about threats
Do you believe your organization has an accurate
picture on the threats it faces on a daily basis?
61% 

weren’t sure or weren’t confident
How concerned are you about an
attack leading to a data breach?
65% 

very concerned
We need to change the
cybersecurity story.
Questions?

More Related Content

What's hot

Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
AlienVault
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
Ch01
Ch01Ch01
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Leonardo
 
Cyber security
Cyber securityCyber security
Cyber security
Luke Veltjens-Swan
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Computer security
Computer securityComputer security
Computer security
abdulrehman1673
 
Information Security
Information Security Information Security
Information Security
Dio Pratama
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
G.F. Windsor, Barrister & Solicitor
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
Deep Shankar Yadav
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
 
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Bijay Senihang
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
Arjeender Singh
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
SofoklisEfremidisAIT
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
Lancope, Inc.
 

What's hot (20)

Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Ch01
Ch01Ch01
Ch01
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
Cyber security
Cyber securityCyber security
Cyber security
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Computer security
Computer securityComputer security
Computer security
 
Information Security
Information Security Information Security
Information Security
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Trustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simpleTrustifier tux™ makes effective security simple
Trustifier tux™ makes effective security simple
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
 
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)Wake-Up Call (Current IT Security Scenario of Nepal-2014)
Wake-Up Call (Current IT Security Scenario of Nepal-2014)
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 

Similar to Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB

Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
cyberprosocial
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
Matthew Rosenquist
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdf
Altius IT
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Tammy Clark
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
malik298381
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
The Whole World News
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Rimurutempest594985
 
Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024
CollegeEssay.Org
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information
David Santiago
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
Infosectrain3
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Morakinyo Animasaun
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
Securelogy
 
Main Menu
Main MenuMain Menu
Main Menu
Securelogy
 

Similar to Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB (20)

Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024Cyber Security - CollegeEssay.org - 2024
Cyber Security - CollegeEssay.org - 2024
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB

  • 1. IT Security @ UNB How UNB is using policy, practice and technology to enhance cyber security
  • 2. What are we here to talk about? uUNB’s titanic cyber security struggle
 uUse threat intelligence for both tactical and strategic decisions
 uMoving away from playing a losing game
  • 3. My background u Bachelor of Arts in Information and Communications Studies (‘05) u Former Canadian Army reservist (armoured vehicle driver & gunner) u Former reporter for the provincial newspaper u Former web content strategist for UNB Communications & Marketing u Accidental IT Security professional and fortunate member of an amazing team u Master of Business Administration (‘15)
  • 4. The Security Action Team (SAT) uProvides IT security leadership uFormulates, implements and coordinates polices, plans and projects uIncident Response uAdvises IT security resourcing, technologies, and community education.
  • 5. About UNB u North America’s oldest English public university (Est. 1785) u 11,000 students u 2,000 FTE Faculty and Staff u Hybrid IT environment (centralized and decentralized)
  • 6. In defence of “cybersecurity” Officially, ISO/IEC 27032 addresses “Cybersecurity” or “Cyberspace security”, defined as the “preservation of confidentiality, integrity and availability of information in the Cyberspace”.  In turn “the Cyberspace” (complete with definite article) is defined as “the complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form”.
  • 7.
  • 8. What I think we do:
  • 9. What clients think we do….
  • 10. Why are universities a target? u We we’re designed to be open (we’re easy) u We have a treasure trove of PII u We have valuable intellectual property u We have others valuable intellectual property u We are a route into more secure orgs
  • 11. Our challenges u We average between 83 and 55 attempts per second to breach our network (massively automated threats)
 u We have more than 2.2 million security events daily on our network
 u We have more than 500 offences weekly 
 u We have as many as 120 compromised endpoints a month (half of which are students) u We are the ultimate BYOD environment
  • 12. The cost of a breach u $184 dollars on average per record in education, based on figures from a 2014 Ponemon Institute Study
  • 13. Threat Intelligence Sources u QRadar Security Inteligence Event Management (SIEM) u Trend Micro Deep Discovery Malware detection tool u Kaspersky Anti-Virus Reporting System u Government, industry contacts and listservs u InfoSec News Sources and Social Media
  • 21. UNB’s move to IT Risk Management Day-to-day IT Operations IT Security Operations Threat Analysis, Policy & Procedure Development IT Risk Management Maturity
  • 23. The Security Building Blocks Operations
 Service Desk
 Security Action Team Communications: Risk Management, Quality Assurance and Standards Development
  • 24. Service Desk uHelp Desk escalates threats to SAT uAssists with user education uDesktop Group helps harden end points and triage compromises
  • 25. Operations uSystems and Network monitoring, reporting of threats, ensuring patching and reporting policy or procedure compliance issues. Participates in incident response.
  • 26. Communications u Assists with development and execution of user awareness and culture change campaigns. 
 u Assists with developing and executing incident communications
  • 27. Security and Operations u Operations: Trying to keep the lights on u IT Security: ensuring compliance with protective measures u Critical to avoid ineffective communications. Security and Operations groups in IT have different goals and in some cases cultures. Critical to ensure alignment with overall IT Strategy
  • 28. The cross-functional workflow Client provides username and password in phishing attempt Help Desk or Level One advises + assists client with safe password reset IT Security initiates incident investigation Operations staff engaged to assist with log review / access checks UNB Privacy Officer engaged in event of a potential data breach Client advised of investigation, encouraged to take awareness course
  • 29. What fighter jets in the Korean War can teach us about cybersecurity
  • 30. A harsh truth: uSimply buying the latest and greatest big shiny security technology will not make your organization safer
  • 31. Security Strategy Pillars Security Strategy IT Security Policy
 Data Governance Security Architecture:
 Tools, People, Process Culture Change:
 User Awareness + Behaviour Change
  • 33. Making the case Where cybersecurity fits in Porter’s Value Chain
  • 34. The disconnect between threat awareness and concern about threats
  • 35. Do you believe your organization has an accurate picture on the threats it faces on a daily basis?
  • 36. 61% 
 weren’t sure or weren’t confident
  • 37. How concerned are you about an attack leading to a data breach?
  • 39. We need to change the cybersecurity story.