SlideShare a Scribd company logo
Information Security – Everyone’s Responsibility
FAS IT Stakeholders Meeting | October 26, 2015
Higher Education is a target
“Universities are home to cutting-edge
research and emerging technology
patents; unfortunately, their networks are
large and porous.”
Reports/Fireeye2013 p13
High-Value data:
• Social Security numbers
• Credit card numbers
• Medical records
• Employee records
• Research
The scope:
14,724,405 records disclosed in
745 reported higher education
breaches since 2005.
Why?
• Up to $45 per credit card
number
• Up to $3 per Social Security
number
• Up to $50 per patient record
Peers:
• Stanford: 101,000 passwords
stolen
• MIT: Suffered DDoS and web
defacements in attack by
Anonymous
• University of Maryland:
309,000 SSNs stolen
Infrastructure:
At Ohio State: “They did find evidence that
the purpose of the unauthorized access was
to launch cyberattacks on online business
entities.”
So is Harvard
Harvard High-value Data
Social Security numbers: More than 2 million SSN’s
are stored at the University.
Credit card numbers: Over the past 12 months, 1.6M
credit card transactions were processed on behalf of 82
merchants at Harvard, representing approximately
$254M.
Employee records: Harvard maintains employee
records for more than 30,000 active faculty and staff.
Medical records
A single study at HMS included research on 1,360,908
Medicare claims records.
Research Data
• Commercial - Advanced Batteries
• Medical - Diabetes breakthroughs
• Defense - Flexible exo-skeleton
• Geo-Political - Ukrainian social media study
• High-Visibility - NFL concussion study
Attacks against Harvard’s network in
2014 were up 25% over 2013.
Malware activity detected in 2014
was up 50% from 2013.
LulzSec
Syrian
Electronic
Army
Reputational Attacks
Automated Attacks
FAS Endpoint Remediation Project
Overview Goals
By December 2015, over 4500 of the estimated 5500 endpoints in
the FAS, including all endpoints in priority departments and all
endpoints managed by HUIT, will be patched and those that are
laptops will be encrypted. We will leverage the awareness
campaign to attempt to reach the remaining, unmanaged systems.
Additionally FAS endpoints in priority departments will be regularly
scanned for Level 4 data.
• Ensure that software patching occurs automatically on FAS
endpoints.
• Ensure that Mac and Windows laptops in the FAS are encrypted.
• Ensure that computers in high risk departments are scanned for
Level 4 data automatically on a regular schedule.
• Establish best practice scanning measures/system evaluations.
Metrics
• 100% known FAS laptops encrypted (current
72%)
• 100% known FAS endpoints running Identity
Finder, AV software, and LANDesk/CASPER
(curr. 97%)
• 100% known FAS endpoints patched on
OS(current 75%)
• 100% endpoints in FAS high risk departments
scanned
2015 Project Timeline - Key Activities Mar Apr May Jun Jul Aug Sept Oct Nov Dec
I. Planning
a. Develop project overview and executive materials
b. Define HUIT and FAS teams and project
management
c. Present progress reports to Deans Smith and Kirwan
d. Quarterly goals review and course corrections
II. Patch – Encrypt – Scan
a. Complete inventory baseline for 21Priority
Departments
b. Set up tiered patching for 3 departments per month
c. Encrypt remaining laptops in 3 departments per
month
d. Emphasize user scanning though Identity Finder
e. Introduce system scanning for 3 departments per
month
FAS Endpoint Remediation Project
Security Activities for High Priority Units - 2015
1. Make sure all laptops are encrypted.
2. Make sure all users have up to date, software on their computers.
3. Schedule scan for Level 3 and Level 4 data. User then remediates.
4. Perform network backups of hard drives, on as many endpoints as reasonable.
FAS Endpoint Remediation Project
Priority Drive Factors
Endpoints and “High Risk” Units
Level 4 HRCI
Data
Health & Safety
Data
Level 3 Extra
Sensitive Data
Potential
Hacktivist Target
Patching - The Operating System (OS) is First and
Foremost, followed by the “Big 5”
We are aware that Central Apps require certain versions of Java and IE,
and will manage accordingly
FAS Endpoint Remediation Project
19 FAS High Risk Units and Control Parameters
8
Department Security
Contact/Partner
Partner Role Data Type Business Owner Remediation
Target Month(s)
Technology
Refresh Month/#
ISO Tech
Accessible
Education Office
Lindsay Northup-
Moore
Accommodations
Administrator
personal medical/4 Sheila Petruccelli Sept 0 Lisa
Adaptive
Technology Group
Tanya Washburn Adaptive
Technology
Specialist
personal medical/4 Curtis Wilcox Nov 4 in FY16 Lisa
Admissions/Financ
ial Aid
Rick van Rice Director, IT for
College
Admissions and
Fin Aid
non-directory,
SSN/3,4
Vaughn Waters Sept-Dec Kerwin, led by
Tracy
Animal Resources Steve Niemi Director health safety
systems/target
Ara Tahmassian Sept 1 Lisa
Athletics Gerrie Mahoney Senior Associate
Director
student/3 Gerrie Mahoney Nov-Dec Sept/56 Kerwin & Lisa
Bureau Study
Counsel
Yishiuan Chin Dept Administrator Student/3, 4 TBD
College Deans
Office
Joan Rouse Associate Dean Level 3+
sensitive/Ad Board
Joan Rouse Oct 0 Kerwin
College
Institutional
Research
Scott Spurlock Manager, Data
Resources
research/3+ Karen Pearce Nov 6 Lisa
Development
Office
Nancy Conroy Director,
Development
Operations
Alumni, donor,
development Level
3+
Julie Broad, Rich
Ohlsten
Nov-Dec 200 in the Spring Steve
Economics Dept. Peter Brown Systems Manager human subject,
NBER, IRS/4
Belynda Bady Sept-Oct Fall/17; Winter/1;
Spring/4
Kerwin
EdLabs Nakisha Ertha Coordinator II human subject/4
and 5
Roland Fryer Dec N/A Lisa
Freshman Deans
Office
Brandon Edwards Department
Administrator,
Proctor
FERPA block/3+ Zak Gingo Oct 0 Lisa
Finance Shannon
Ingraham
Department
Administrator
SSN, institutional/4 Gail Pisapio
GSAS Winnie Keung Director, IS SSN, institutional/4 Winnie Keung Sept? Fall/25; Winter/1;
Spring/2
Lisa
19 FAS High Risk Units and Control Parameters
9
GSAS Winnie Keung Director, IS SSN, institutional/4 Winnie Keung Sept? Fall/25; Winter/1;
Spring/2
Lisa
Harvard Student
Agencies
Patrick Scott, Mark
Ting
President (?) and
IT Director
Variety of student,
SSNs, vendor, and
other info
Jim McKellar (GM)
Lorraine Facella
(CFO)
Dec. N/A Steve
Human Resources Adriana Gallegos Dept
Administrator,
Communications
Manager
SSN, institutional/4 Chris Ciotti
Physical
Resources
Rick Schubert Systems
Administrator
Health safety,
access systems/3
Steve Robichaud,
Craig Bradford
Sept Fall/36; Winter/2 Lisa
Psychology
Priority s/b given
to the Weisz,
Hooker, and Nock
Labs due to highly
restricted
research.
Mark Gerstel Director of
Administration
Human
subject/Level 4
Mark Gerstel Aug-Sept FY16/12 Kerwin
Registrar Caroline Harvey Enrollment
Services
Coordinator
non-directory,
SSN/4
Mike Burke Nov Winter/14;
Spring/2
Lisa
Research
Administration
Shannon Sewards Director, IRB human subject/3,4 Pat Fitzgerald
(RA) Denise
Moody (IRB)
Sept Fall/6; Spring/5 Kerwin
SCRB Genevieve
Saphier
Associate Director,
Policy and
Compliance
human subject/4 Karen Barkow Sept-Oct Fall/30; Winter/2;
Spring/4
Lisa
Yard House offices
(Office of Student
Life)
Carina Myteveli Director, Housing
and Res Life
FERPA block/3+ Zak Gingo Oct Fall/3; Spring/3 Lisa
Departments completing full Security in a Box program in 2015 and 2016.
Remediation work underway
Summary of Remediation Efforts Underway in 10 Units
10
High Risk Unit # People # of Endpoints
# Laptops to
be Encrypted
# Endpoints
to be
Installed with
IF
# People Agreeing to System Patching
# Endpoints to
be Installed with
Connected
Psychology 145 130 25 67 All 97
Economics 109 160 25 62
Some - break into at least two categories:
staff and then faculty
91
SCRB 98 154 10 10 Most (staff for sure) 72
GSAS 68 79 6 5 All 18
Accessible
Education Office
6 7 2 0 All 9
Animal
Resources
25 30 1 0
Go with two groupings - LANDesk
controlled and user managed
L
Physical
Resources
75 92 11 5 All 29
Admissions/Finan
cial Aid
67 109 2 5 All 20
Harvard Student
Agencies
4 4 0 4 All 4
Research Admin. 9 8 0 1 All 4
TOTALS: 606 773 82 159 344
Information Security Awareness
11
Click
wisely
Apply
updates
Use strong
passwords
Know
your data
You help keep Harvard secure.
Administrative Technology Services
FAS IT Stakeholders Meeting | October 26, 2015
1) Vision
13
1. Deliver applications and services
through greater maturity in ITIL, Agile,
Project Management, DevOps and
Cloud.
2. Organize ATS staff to align with the
needs of our partners/users and build a
skilled workforce by maximizing IT
Academy opportunities and building
communities of practice that focus on
continuous improvement of staff skills
and competencies.
3. Leverage oversight processes aligned
with the CIO Council Strategic Plan and
FAS and CA IT Plans to define roadmaps,
select projects and plan resources.
4. Create service delivery patterns for
purchased, developed and integrated
solutions.
Strategic Objectives Guiding Principles Key Performance Indicators
1. We support Agile and DevOps
principles.
2. We strive to become trusted partners
and build relationships through a
service mindset that emphasizes
accountability, collaboration and
empathy.
3. We are building an organization based
on the HUIT values that is a great place
to work.
4. Our work focuses on creating
repeatable, consistent and sustainable
best practices.
1. Mature adoption of ITIL, Agile, HUIT
PMO standards and DevOps processes,
and 75% of existing applications in the
Cloud.
2. Increased partner satisfaction for ATS
services and project delivery, more
rapid delivery of applications, and
decreased number of production
incidents and stabilization issues.
3. Oversight processes and tracking
systems in place to facilitate the
definition of roadmaps, project
selection and associated resource and
capacity management.
4. The existence of service delivery
patterns and complete ATS adoption of
those patterns for purchased,
developed and integrated solutions.
Rapidly and seamlessly deliver high quality administrative applications to faculty, students, staff and alumni that provide an excellent user
experience and further the mission of the University.
The Vision for Administrative Technology Services (ATS)
2) Project and Service Modes
ATS manages an application portfolio through decisions to invest, tolerate,
replace or retire applications. In doing so, ATS provides three key
deliverables:
1. Implementation of new software solutions (custom and vendor-based)
2. Enhancement and maintenance of existing applications
3. Applications support
The majority of work in ATS is focused on projects to support the evolving
strategic objectives of HUIT’s business partners. At the same time, ATS also
has a firm commitment to maintain and support a large and diverse application
portfolio, aligning our work with HUIT Support Services and the ongoing
operational needs of our business partners.
To this end, ATS operates in a hybrid model, regularly switching the manner
and context of its work between two modalities: project and service delivery.
Within each modality, ATS adopts the standards and best practices articulated
internally within HUIT and externally within the software development industry.
14
15
3) Impact of Embedded DevOps
# Impact
Enterprise
Applications
FAS, College &
Athletics
OPP Aurora
1 Embedded DevOps engineers M M M M
2
Common cloud services and
multi-tenancy
H H H H
3
Incorporation of Scaled Agile
Framework practices into the
establishment of infrastructure
H H M M
4
Embedded architects and the
establishment of standard
infrastructure patterns
H H H M
5
Defined integration
approaches for application
connectivity for the cloud
H H M M
6
QA automation and
deployment integration
H H M H
7
Automated, continuous
deployment and changes to
release management
H H H H
8
Defined and published
operational support models
M M M M
H = High / M = Medium / L = Low

More Related Content

What's hot

14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentationkevin_donovan
 
It summit salesforce
It summit salesforceIt summit salesforce
It summit salesforce
kevin_donovan
 
I sites migration
I sites migrationI sites migration
I sites migration
kevin_donovan
 
Navigating saa s agreements
Navigating saa s agreementsNavigating saa s agreements
Navigating saa s agreements
kevin_donovan
 
14.06.05 TLT IT Summit
14.06.05 TLT IT Summit 14.06.05 TLT IT Summit
14.06.05 TLT IT Summit kevin_donovan
 
Slt fas fall startup 2014 combined final v2
Slt fas fall startup 2014 combined   final v2Slt fas fall startup 2014 combined   final v2
Slt fas fall startup 2014 combined final v2
kevin_donovan
 
Fas da 20141120
Fas da 20141120Fas da 20141120
Fas da 20141120
kevin_donovan
 
Huit fall startup 2014 review
Huit fall startup 2014 reviewHuit fall startup 2014 review
Huit fall startup 2014 review
kevin_donovan
 
Ea at connect the dots 10.2014
Ea at connect the dots 10.2014Ea at connect the dots 10.2014
Ea at connect the dots 10.2014
kevin_donovan
 
Standard i sites migration 2014.10.16
Standard i sites migration   2014.10.16Standard i sites migration   2014.10.16
Standard i sites migration 2014.10.16
kevin_donovan
 
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
kevin_donovan
 
Delivering university self service for it and business services v1
Delivering university self service for it and business services v1Delivering university self service for it and business services v1
Delivering university self service for it and business services v1
margaret_ronald
 
Making the Case for UX
Making the Case for UXMaking the Case for UX
Making the Case for UX
HUXgroup
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
National Center for Campus Public Safety
 
IT Academy at IT Summti
IT Academy at IT SummtiIT Academy at IT Summti
IT Academy at IT Summti
kevin_donovan
 
Huit 2015 march town hall
Huit 2015 march town hallHuit 2015 march town hall
Huit 2015 march town hall
kevin_donovan
 
14.05.08 cloud dev_ops_working_group_update
14.05.08 cloud dev_ops_working_group_update14.05.08 cloud dev_ops_working_group_update
14.05.08 cloud dev_ops_working_group_updatekevin_donovan
 
It summit 2016_combined
It summit 2016_combinedIt summit 2016_combined
It summit 2016_combined
kevin_donovan
 
Architecture group
Architecture groupArchitecture group
Architecture group
kevin_donovan
 
Tips for Driving Learning Success with Moodle LMS Reporting
Tips for Driving Learning Success with Moodle LMS ReportingTips for Driving Learning Success with Moodle LMS Reporting
Tips for Driving Learning Success with Moodle LMS Reporting
Lambda Solutions
 

What's hot (20)

14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation14.06.05 IT Summit IAM Presentation
14.06.05 IT Summit IAM Presentation
 
It summit salesforce
It summit salesforceIt summit salesforce
It summit salesforce
 
I sites migration
I sites migrationI sites migration
I sites migration
 
Navigating saa s agreements
Navigating saa s agreementsNavigating saa s agreements
Navigating saa s agreements
 
14.06.05 TLT IT Summit
14.06.05 TLT IT Summit 14.06.05 TLT IT Summit
14.06.05 TLT IT Summit
 
Slt fas fall startup 2014 combined final v2
Slt fas fall startup 2014 combined   final v2Slt fas fall startup 2014 combined   final v2
Slt fas fall startup 2014 combined final v2
 
Fas da 20141120
Fas da 20141120Fas da 20141120
Fas da 20141120
 
Huit fall startup 2014 review
Huit fall startup 2014 reviewHuit fall startup 2014 review
Huit fall startup 2014 review
 
Ea at connect the dots 10.2014
Ea at connect the dots 10.2014Ea at connect the dots 10.2014
Ea at connect the dots 10.2014
 
Standard i sites migration 2014.10.16
Standard i sites migration   2014.10.16Standard i sites migration   2014.10.16
Standard i sites migration 2014.10.16
 
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
eGoogle analytics-best-practices-abcd-harvard-presentation-9-10-14
 
Delivering university self service for it and business services v1
Delivering university self service for it and business services v1Delivering university self service for it and business services v1
Delivering university self service for it and business services v1
 
Making the Case for UX
Making the Case for UXMaking the Case for UX
Making the Case for UX
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
IT Academy at IT Summti
IT Academy at IT SummtiIT Academy at IT Summti
IT Academy at IT Summti
 
Huit 2015 march town hall
Huit 2015 march town hallHuit 2015 march town hall
Huit 2015 march town hall
 
14.05.08 cloud dev_ops_working_group_update
14.05.08 cloud dev_ops_working_group_update14.05.08 cloud dev_ops_working_group_update
14.05.08 cloud dev_ops_working_group_update
 
It summit 2016_combined
It summit 2016_combinedIt summit 2016_combined
It summit 2016_combined
 
Architecture group
Architecture groupArchitecture group
Architecture group
 
Tips for Driving Learning Success with Moodle LMS Reporting
Tips for Driving Learning Success with Moodle LMS ReportingTips for Driving Learning Success with Moodle LMS Reporting
Tips for Driving Learning Success with Moodle LMS Reporting
 

Viewers also liked

Stakeholder update 4 14 data center outage
Stakeholder update 4 14 data center outageStakeholder update 4 14 data center outage
Stakeholder update 4 14 data center outage
kevin_donovan
 
Portal apps (slt)
Portal apps (slt)Portal apps (slt)
Portal apps (slt)
kevin_donovan
 
Fas 101 short deck 10 16-15
Fas 101 short deck 10 16-15Fas 101 short deck 10 16-15
Fas 101 short deck 10 16-15
kevin_donovan
 
Hms crash planitsummit2016
Hms crash planitsummit2016Hms crash planitsummit2016
Hms crash planitsummit2016
kevin_donovan
 
It summit2015
It summit2015It summit2015
It summit2015
kevin_donovan
 
تاريخ الدولة المغربية
تاريخ الدولة المغربيةتاريخ الدولة المغربية
تاريخ الدولة المغربيةhouma
 
Noc and soc deck
Noc and soc deckNoc and soc deck
Noc and soc deck
kevin_donovan
 
Harvard phone it summit demo 06.02.16
Harvard phone it summit demo 06.02.16Harvard phone it summit demo 06.02.16
Harvard phone it summit demo 06.02.16
kevin_donovan
 

Viewers also liked (8)

Stakeholder update 4 14 data center outage
Stakeholder update 4 14 data center outageStakeholder update 4 14 data center outage
Stakeholder update 4 14 data center outage
 
Portal apps (slt)
Portal apps (slt)Portal apps (slt)
Portal apps (slt)
 
Fas 101 short deck 10 16-15
Fas 101 short deck 10 16-15Fas 101 short deck 10 16-15
Fas 101 short deck 10 16-15
 
Hms crash planitsummit2016
Hms crash planitsummit2016Hms crash planitsummit2016
Hms crash planitsummit2016
 
It summit2015
It summit2015It summit2015
It summit2015
 
تاريخ الدولة المغربية
تاريخ الدولة المغربيةتاريخ الدولة المغربية
تاريخ الدولة المغربية
 
Noc and soc deck
Noc and soc deckNoc and soc deck
Noc and soc deck
 
Harvard phone it summit demo 06.02.16
Harvard phone it summit demo 06.02.16Harvard phone it summit demo 06.02.16
Harvard phone it summit demo 06.02.16
 

Similar to Information security

RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
susanschei
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
Von Welch
 
Ba introduction
Ba introductionBa introduction
Ba introduction
Lee Schlenker
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
Resilient Systems
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
North Texas Chapter of the ISSA
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
ICPSR
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
IT Strategy Group
 
Ba introduction
Ba introductionBa introduction
Ba introduction
Lee Schlenker
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
Lumension
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
AIS Network
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!
Greg Parmer
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
Microsoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance UpdatesMicrosoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance Updates
David J Rosenthal
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree OzaEDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
Eduexcellence
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
Rd. R. Agung Trimanda
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
AIIM International
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
Globus
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
Florence Hudson
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
Joanne Luciano
 

Similar to Information security (20)

RUNNING HEAD CAREER PORTFOLIO .docx
RUNNING HEAD CAREER PORTFOLIO                                  .docxRUNNING HEAD CAREER PORTFOLIO                                  .docx
RUNNING HEAD CAREER PORTFOLIO .docx
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
Ba introduction
Ba introductionBa introduction
Ba introduction
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
RES_JMT
RES_JMTRES_JMT
RES_JMT
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Ba introduction
Ba introductionBa introduction
Ba introduction
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Private Data - Keep Out!
Private Data - Keep Out!Private Data - Keep Out!
Private Data - Keep Out!
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Microsoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance UpdatesMicrosoft Office 365 Security and Compliance Updates
Microsoft Office 365 Security and Compliance Updates
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree OzaEDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Jayshree Oza
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 

More from kevin_donovan

It summit data mgmt-2016.06.02-final
It summit data mgmt-2016.06.02-finalIt summit data mgmt-2016.06.02-final
It summit data mgmt-2016.06.02-final
kevin_donovan
 
2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard
kevin_donovan
 
It summit dataverse-bigdata-mercecrosas
It summit dataverse-bigdata-mercecrosasIt summit dataverse-bigdata-mercecrosas
It summit dataverse-bigdata-mercecrosas
kevin_donovan
 
It summit facilitate-researchcomputing-mercecrosas
It summit facilitate-researchcomputing-mercecrosasIt summit facilitate-researchcomputing-mercecrosas
It summit facilitate-researchcomputing-mercecrosas
kevin_donovan
 
Lightbox ham it_summit_final
Lightbox ham it_summit_finalLightbox ham it_summit_final
Lightbox ham it_summit_final
kevin_donovan
 
Harvard it summit 2016 - opencast in the cloud at harvard dce- live and on-d...
Harvard it summit 2016  - opencast in the cloud at harvard dce- live and on-d...Harvard it summit 2016  - opencast in the cloud at harvard dce- live and on-d...
Harvard it summit 2016 - opencast in the cloud at harvard dce- live and on-d...
kevin_donovan
 
Fa qs 2016-04-21
Fa qs 2016-04-21Fa qs 2016-04-21
Fa qs 2016-04-21
kevin_donovan
 
Tlt and friends it summit 2016
Tlt and friends it summit 2016Tlt and friends it summit 2016
Tlt and friends it summit 2016
kevin_donovan
 
2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard
kevin_donovan
 
Phish, flop, or fine
Phish, flop, or fine Phish, flop, or fine
Phish, flop, or fine
kevin_donovan
 
Waldo Summit 2016
Waldo Summit 2016Waldo Summit 2016
Waldo Summit 2016
kevin_donovan
 
Mobile firstpresentation huit
Mobile firstpresentation huitMobile firstpresentation huit
Mobile firstpresentation huit
kevin_donovan
 
Saving our social_media
Saving our social_mediaSaving our social_media
Saving our social_media
kevin_donovan
 
Urc it summit-2
Urc it summit-2Urc it summit-2
Urc it summit-2
kevin_donovan
 
Tlt success
Tlt successTlt success
Tlt success
kevin_donovan
 
Open housepix
Open housepixOpen housepix
Open housepix
kevin_donovan
 
Data center outage project update
Data center outage project updateData center outage project update
Data center outage project update
kevin_donovan
 
Harvard key weekly summary
Harvard key weekly  summaryHarvard key weekly  summary
Harvard key weekly summary
kevin_donovan
 
O365 program dashboard v7.5with pg2&3&4
O365 program dashboard v7.5with pg2&3&4O365 program dashboard v7.5with pg2&3&4
O365 program dashboard v7.5with pg2&3&4
kevin_donovan
 

More from kevin_donovan (19)

It summit data mgmt-2016.06.02-final
It summit data mgmt-2016.06.02-finalIt summit data mgmt-2016.06.02-final
It summit data mgmt-2016.06.02-final
 
2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard
 
It summit dataverse-bigdata-mercecrosas
It summit dataverse-bigdata-mercecrosasIt summit dataverse-bigdata-mercecrosas
It summit dataverse-bigdata-mercecrosas
 
It summit facilitate-researchcomputing-mercecrosas
It summit facilitate-researchcomputing-mercecrosasIt summit facilitate-researchcomputing-mercecrosas
It summit facilitate-researchcomputing-mercecrosas
 
Lightbox ham it_summit_final
Lightbox ham it_summit_finalLightbox ham it_summit_final
Lightbox ham it_summit_final
 
Harvard it summit 2016 - opencast in the cloud at harvard dce- live and on-d...
Harvard it summit 2016  - opencast in the cloud at harvard dce- live and on-d...Harvard it summit 2016  - opencast in the cloud at harvard dce- live and on-d...
Harvard it summit 2016 - opencast in the cloud at harvard dce- live and on-d...
 
Fa qs 2016-04-21
Fa qs 2016-04-21Fa qs 2016-04-21
Fa qs 2016-04-21
 
Tlt and friends it summit 2016
Tlt and friends it summit 2016Tlt and friends it summit 2016
Tlt and friends it summit 2016
 
2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard2016 it summit_accessibility_2016-05-24_standard
2016 it summit_accessibility_2016-05-24_standard
 
Phish, flop, or fine
Phish, flop, or fine Phish, flop, or fine
Phish, flop, or fine
 
Waldo Summit 2016
Waldo Summit 2016Waldo Summit 2016
Waldo Summit 2016
 
Mobile firstpresentation huit
Mobile firstpresentation huitMobile firstpresentation huit
Mobile firstpresentation huit
 
Saving our social_media
Saving our social_mediaSaving our social_media
Saving our social_media
 
Urc it summit-2
Urc it summit-2Urc it summit-2
Urc it summit-2
 
Tlt success
Tlt successTlt success
Tlt success
 
Open housepix
Open housepixOpen housepix
Open housepix
 
Data center outage project update
Data center outage project updateData center outage project update
Data center outage project update
 
Harvard key weekly summary
Harvard key weekly  summaryHarvard key weekly  summary
Harvard key weekly summary
 
O365 program dashboard v7.5with pg2&3&4
O365 program dashboard v7.5with pg2&3&4O365 program dashboard v7.5with pg2&3&4
O365 program dashboard v7.5with pg2&3&4
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Information security

  • 1. Information Security – Everyone’s Responsibility FAS IT Stakeholders Meeting | October 26, 2015
  • 2. Higher Education is a target “Universities are home to cutting-edge research and emerging technology patents; unfortunately, their networks are large and porous.” Reports/Fireeye2013 p13 High-Value data: • Social Security numbers • Credit card numbers • Medical records • Employee records • Research The scope: 14,724,405 records disclosed in 745 reported higher education breaches since 2005. Why? • Up to $45 per credit card number • Up to $3 per Social Security number • Up to $50 per patient record Peers: • Stanford: 101,000 passwords stolen • MIT: Suffered DDoS and web defacements in attack by Anonymous • University of Maryland: 309,000 SSNs stolen Infrastructure: At Ohio State: “They did find evidence that the purpose of the unauthorized access was to launch cyberattacks on online business entities.”
  • 3. So is Harvard Harvard High-value Data Social Security numbers: More than 2 million SSN’s are stored at the University. Credit card numbers: Over the past 12 months, 1.6M credit card transactions were processed on behalf of 82 merchants at Harvard, representing approximately $254M. Employee records: Harvard maintains employee records for more than 30,000 active faculty and staff. Medical records A single study at HMS included research on 1,360,908 Medicare claims records. Research Data • Commercial - Advanced Batteries • Medical - Diabetes breakthroughs • Defense - Flexible exo-skeleton • Geo-Political - Ukrainian social media study • High-Visibility - NFL concussion study Attacks against Harvard’s network in 2014 were up 25% over 2013. Malware activity detected in 2014 was up 50% from 2013. LulzSec Syrian Electronic Army Reputational Attacks Automated Attacks
  • 4. FAS Endpoint Remediation Project Overview Goals By December 2015, over 4500 of the estimated 5500 endpoints in the FAS, including all endpoints in priority departments and all endpoints managed by HUIT, will be patched and those that are laptops will be encrypted. We will leverage the awareness campaign to attempt to reach the remaining, unmanaged systems. Additionally FAS endpoints in priority departments will be regularly scanned for Level 4 data. • Ensure that software patching occurs automatically on FAS endpoints. • Ensure that Mac and Windows laptops in the FAS are encrypted. • Ensure that computers in high risk departments are scanned for Level 4 data automatically on a regular schedule. • Establish best practice scanning measures/system evaluations. Metrics • 100% known FAS laptops encrypted (current 72%) • 100% known FAS endpoints running Identity Finder, AV software, and LANDesk/CASPER (curr. 97%) • 100% known FAS endpoints patched on OS(current 75%) • 100% endpoints in FAS high risk departments scanned 2015 Project Timeline - Key Activities Mar Apr May Jun Jul Aug Sept Oct Nov Dec I. Planning a. Develop project overview and executive materials b. Define HUIT and FAS teams and project management c. Present progress reports to Deans Smith and Kirwan d. Quarterly goals review and course corrections II. Patch – Encrypt – Scan a. Complete inventory baseline for 21Priority Departments b. Set up tiered patching for 3 departments per month c. Encrypt remaining laptops in 3 departments per month d. Emphasize user scanning though Identity Finder e. Introduce system scanning for 3 departments per month
  • 5. FAS Endpoint Remediation Project Security Activities for High Priority Units - 2015 1. Make sure all laptops are encrypted. 2. Make sure all users have up to date, software on their computers. 3. Schedule scan for Level 3 and Level 4 data. User then remediates. 4. Perform network backups of hard drives, on as many endpoints as reasonable.
  • 6. FAS Endpoint Remediation Project Priority Drive Factors Endpoints and “High Risk” Units Level 4 HRCI Data Health & Safety Data Level 3 Extra Sensitive Data Potential Hacktivist Target
  • 7. Patching - The Operating System (OS) is First and Foremost, followed by the “Big 5” We are aware that Central Apps require certain versions of Java and IE, and will manage accordingly FAS Endpoint Remediation Project
  • 8. 19 FAS High Risk Units and Control Parameters 8 Department Security Contact/Partner Partner Role Data Type Business Owner Remediation Target Month(s) Technology Refresh Month/# ISO Tech Accessible Education Office Lindsay Northup- Moore Accommodations Administrator personal medical/4 Sheila Petruccelli Sept 0 Lisa Adaptive Technology Group Tanya Washburn Adaptive Technology Specialist personal medical/4 Curtis Wilcox Nov 4 in FY16 Lisa Admissions/Financ ial Aid Rick van Rice Director, IT for College Admissions and Fin Aid non-directory, SSN/3,4 Vaughn Waters Sept-Dec Kerwin, led by Tracy Animal Resources Steve Niemi Director health safety systems/target Ara Tahmassian Sept 1 Lisa Athletics Gerrie Mahoney Senior Associate Director student/3 Gerrie Mahoney Nov-Dec Sept/56 Kerwin & Lisa Bureau Study Counsel Yishiuan Chin Dept Administrator Student/3, 4 TBD College Deans Office Joan Rouse Associate Dean Level 3+ sensitive/Ad Board Joan Rouse Oct 0 Kerwin College Institutional Research Scott Spurlock Manager, Data Resources research/3+ Karen Pearce Nov 6 Lisa Development Office Nancy Conroy Director, Development Operations Alumni, donor, development Level 3+ Julie Broad, Rich Ohlsten Nov-Dec 200 in the Spring Steve Economics Dept. Peter Brown Systems Manager human subject, NBER, IRS/4 Belynda Bady Sept-Oct Fall/17; Winter/1; Spring/4 Kerwin EdLabs Nakisha Ertha Coordinator II human subject/4 and 5 Roland Fryer Dec N/A Lisa Freshman Deans Office Brandon Edwards Department Administrator, Proctor FERPA block/3+ Zak Gingo Oct 0 Lisa Finance Shannon Ingraham Department Administrator SSN, institutional/4 Gail Pisapio GSAS Winnie Keung Director, IS SSN, institutional/4 Winnie Keung Sept? Fall/25; Winter/1; Spring/2 Lisa
  • 9. 19 FAS High Risk Units and Control Parameters 9 GSAS Winnie Keung Director, IS SSN, institutional/4 Winnie Keung Sept? Fall/25; Winter/1; Spring/2 Lisa Harvard Student Agencies Patrick Scott, Mark Ting President (?) and IT Director Variety of student, SSNs, vendor, and other info Jim McKellar (GM) Lorraine Facella (CFO) Dec. N/A Steve Human Resources Adriana Gallegos Dept Administrator, Communications Manager SSN, institutional/4 Chris Ciotti Physical Resources Rick Schubert Systems Administrator Health safety, access systems/3 Steve Robichaud, Craig Bradford Sept Fall/36; Winter/2 Lisa Psychology Priority s/b given to the Weisz, Hooker, and Nock Labs due to highly restricted research. Mark Gerstel Director of Administration Human subject/Level 4 Mark Gerstel Aug-Sept FY16/12 Kerwin Registrar Caroline Harvey Enrollment Services Coordinator non-directory, SSN/4 Mike Burke Nov Winter/14; Spring/2 Lisa Research Administration Shannon Sewards Director, IRB human subject/3,4 Pat Fitzgerald (RA) Denise Moody (IRB) Sept Fall/6; Spring/5 Kerwin SCRB Genevieve Saphier Associate Director, Policy and Compliance human subject/4 Karen Barkow Sept-Oct Fall/30; Winter/2; Spring/4 Lisa Yard House offices (Office of Student Life) Carina Myteveli Director, Housing and Res Life FERPA block/3+ Zak Gingo Oct Fall/3; Spring/3 Lisa Departments completing full Security in a Box program in 2015 and 2016. Remediation work underway
  • 10. Summary of Remediation Efforts Underway in 10 Units 10 High Risk Unit # People # of Endpoints # Laptops to be Encrypted # Endpoints to be Installed with IF # People Agreeing to System Patching # Endpoints to be Installed with Connected Psychology 145 130 25 67 All 97 Economics 109 160 25 62 Some - break into at least two categories: staff and then faculty 91 SCRB 98 154 10 10 Most (staff for sure) 72 GSAS 68 79 6 5 All 18 Accessible Education Office 6 7 2 0 All 9 Animal Resources 25 30 1 0 Go with two groupings - LANDesk controlled and user managed L Physical Resources 75 92 11 5 All 29 Admissions/Finan cial Aid 67 109 2 5 All 20 Harvard Student Agencies 4 4 0 4 All 4 Research Admin. 9 8 0 1 All 4 TOTALS: 606 773 82 159 344
  • 11. Information Security Awareness 11 Click wisely Apply updates Use strong passwords Know your data You help keep Harvard secure.
  • 12. Administrative Technology Services FAS IT Stakeholders Meeting | October 26, 2015
  • 13. 1) Vision 13 1. Deliver applications and services through greater maturity in ITIL, Agile, Project Management, DevOps and Cloud. 2. Organize ATS staff to align with the needs of our partners/users and build a skilled workforce by maximizing IT Academy opportunities and building communities of practice that focus on continuous improvement of staff skills and competencies. 3. Leverage oversight processes aligned with the CIO Council Strategic Plan and FAS and CA IT Plans to define roadmaps, select projects and plan resources. 4. Create service delivery patterns for purchased, developed and integrated solutions. Strategic Objectives Guiding Principles Key Performance Indicators 1. We support Agile and DevOps principles. 2. We strive to become trusted partners and build relationships through a service mindset that emphasizes accountability, collaboration and empathy. 3. We are building an organization based on the HUIT values that is a great place to work. 4. Our work focuses on creating repeatable, consistent and sustainable best practices. 1. Mature adoption of ITIL, Agile, HUIT PMO standards and DevOps processes, and 75% of existing applications in the Cloud. 2. Increased partner satisfaction for ATS services and project delivery, more rapid delivery of applications, and decreased number of production incidents and stabilization issues. 3. Oversight processes and tracking systems in place to facilitate the definition of roadmaps, project selection and associated resource and capacity management. 4. The existence of service delivery patterns and complete ATS adoption of those patterns for purchased, developed and integrated solutions. Rapidly and seamlessly deliver high quality administrative applications to faculty, students, staff and alumni that provide an excellent user experience and further the mission of the University. The Vision for Administrative Technology Services (ATS)
  • 14. 2) Project and Service Modes ATS manages an application portfolio through decisions to invest, tolerate, replace or retire applications. In doing so, ATS provides three key deliverables: 1. Implementation of new software solutions (custom and vendor-based) 2. Enhancement and maintenance of existing applications 3. Applications support The majority of work in ATS is focused on projects to support the evolving strategic objectives of HUIT’s business partners. At the same time, ATS also has a firm commitment to maintain and support a large and diverse application portfolio, aligning our work with HUIT Support Services and the ongoing operational needs of our business partners. To this end, ATS operates in a hybrid model, regularly switching the manner and context of its work between two modalities: project and service delivery. Within each modality, ATS adopts the standards and best practices articulated internally within HUIT and externally within the software development industry. 14
  • 15. 15 3) Impact of Embedded DevOps # Impact Enterprise Applications FAS, College & Athletics OPP Aurora 1 Embedded DevOps engineers M M M M 2 Common cloud services and multi-tenancy H H H H 3 Incorporation of Scaled Agile Framework practices into the establishment of infrastructure H H M M 4 Embedded architects and the establishment of standard infrastructure patterns H H H M 5 Defined integration approaches for application connectivity for the cloud H H M M 6 QA automation and deployment integration H H M H 7 Automated, continuous deployment and changes to release management H H H H 8 Defined and published operational support models M M M M H = High / M = Medium / L = Low