name of presentation company name. october cybersecurity month future trends in education and...
Post on 20-Dec-2015
214 views
TRANSCRIPT
![Page 1: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/1.jpg)
Name of presentationCompany name
![Page 2: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/2.jpg)
October Cybersecurity Month
• Future Trends in Education and Technology
• Purdue Security Issues/Priorities
![Page 3: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/3.jpg)
• Scott Ksander• Richard Katz video: The school of Athens or
Mr. Fords Factory• Gerry McCartney • Educause student video winners for 2007
![Page 4: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/4.jpg)
Gerry McCartney• McCartney has served as the university's top information
technology administrator since July 2006.• From 1993 until 2004, McCartney served as associate dean
and chief information officer at the University of Pennsylvania's Wharton School.
• Education Background:• PhD Sociology and Anthropology from Purdue in 1996 • Received diplomas in advanced programming and systems
analysis from Trinity College in Dublin, Ireland, in 1982 and 1984, respectively.
• He received his bachelor's and master's degrees in 1981 and 1982 from NUI Maynooth in Ireland.
![Page 5: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/5.jpg)
Educause Student Videos
• Identity Theft for Criminals• Out in the Open• Short Film
![Page 6: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/6.jpg)
![Page 7: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/7.jpg)
![Page 8: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/8.jpg)
![Page 9: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/9.jpg)
![Page 10: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/10.jpg)
![Page 11: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/11.jpg)
![Page 12: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/12.jpg)
![Page 13: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/13.jpg)
Stages of Security• Blissfully ignorant (20%)• Awareness (30%)• Corrective Action (40%)• Operational Excellence (10%)
![Page 14: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/14.jpg)
The Cost of Security
•Blissfully ignorant (<3% of IT budget)•Awareness (4-6%)•Corrective Action (7-8%)•Operational Excellence (3-4%)
Real progress on IT security will REDUCE IT security spending requirements!
![Page 15: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/15.jpg)
• Defend the BorderAbsolute path blocking (port blocking) Content-based path blocking (intrusion prevention)
• Defend Critical Regions AbsoluteConditionalContent-based
• Machine-level Protection Operating System patchingApplication Program patchingContent change monitoring (tripwire) Anti-VirusAnti-Spyware/Anti-Adware/Anti-Malware
Purdue Security Priorities
![Page 16: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/16.jpg)
• Authorized Personnel Only Establish and maintain central credentialNetwork access credential control Application access credential control
Purdue Security Priorities
![Page 17: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/17.jpg)
• Policy/Procedures/Guidelines University level Boundaries for unit level operations Interpretation and ConsultationEnforcement/Compliance
• Incident ResponseResponse ExemplaryInvestigation/Forensics Identify Remediation Post-incident reporting Post-incident evaluation
Purdue Security Priorities
![Page 18: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/18.jpg)
• Awareness and Education StudentsStaffFacultyOperational Units
• Risk Identification and Remediation Facilitated Risk Assessments Self-conducted risk analysis tools
Purdue Security Priorities
![Page 19: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/19.jpg)
• Defend the data In transit At rest
• Monitoring/Logging/Review NetworkMachine-level Application
Purdue Security Priorities
![Page 20: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/20.jpg)
• Application of New Technologies Defense technologiesProtection technologiesCredential technologies
Purdue Security Priorities
![Page 21: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/21.jpg)
Stay Informed
![Page 22: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/22.jpg)
It Has Been a Great “Ride”• Pablo Malavenda – use, abuse, and risks of
social networking• Chris Burgess, CISCO Chief Scientist –
culture of security needed within organizations
• George Heron, McAfee Chief Scientist – need to educate and empower users through awareness and security tools
![Page 23: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/23.jpg)
![Page 24: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/24.jpg)
Questions Before Elvis Leaves The Building?
![Page 25: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/25.jpg)
• Questions??
• As always, be careful out there.
![Page 26: Name of presentation Company name. October Cybersecurity Month Future Trends in Education and Technology Purdue Security Issues/Priorities](https://reader030.vdocuments.us/reader030/viewer/2022032704/56649d4b5503460f94a28779/html5/thumbnails/26.jpg)
Credits:• Thanks to David Fry, John Holladay, and all the
guys downstairs taping the program!!
• Thanks to Gary, upstairs managing the sound, video, whatever we ask of him
• ITNS staff who support and encourage each other: special thanks to Joanna Grama
• Gifts from Microsoft, Dell, PEFCU, Dewpoint, Symantec, CERIAS, Awards Unlimited and Scott Ksander