Вы находитесь на странице: 1из 41

Security @ UNB

How UNB is using policy, practice and technology to enhance cyber security

What are we here to talk about?


u UNBs

titanic cyber security struggle

u Using

threat intelligence for both tactical


and strategic decisions

u Moving

away from playing a losing


game of cyber security whack-a-mole

My background
u

Bachelor of Arts in Information and Communications Studies


(05). Master of Business Administration (15)

Former Canadian Army reservist (armoured vehicle driver &


gunner)

Former reporter for the provincial newspaper

Former web content strategist for UNB Communications &


Marketing

Accidental IT Security professional and fortunate member of


an amazing team

The Security Action Team (SAT)


u Provides

IT security leadership

u Formulates, implements and

coordinates

polices, plans and projects


u Incident Response
u Advises

IT security resourcing, technologies,


and community education.

About UNB
u

North Americas oldest


English public
university (Est. 1785)

11,000 students

2,000 FTE Faculty and


Staff

Hybrid IT environment
(centralized and
decentralized)

In defence of cybersecurity
Officially, ISO/IEC 27032 addresses Cybersecurity or
Cyberspace security, defined as the preservation of
confidentiality, integrity and availability of information in
the Cyberspace.
In turn the Cyberspace (complete with definite article) is
defined as the complex environment resulting from the
interaction of people, software and services on the Internet
by means of technology devices and networks connected
to it, which does not exist in any physical form.

What I think we do:

What clients think we do.

Why are universities a target?


u We

were designed to be open (were


easy)
u We have a treasure trove of PII
u We have valuable intellectual property
u We have others valuable intellectual
property
u We are a route into more secure orgs

Our challenges
u

We average between 83 and 55 attempts per second


to breach our network (massively automated threats)

We have more than 2.2 million security events daily on


our network

We have more than 500 offences weekly

We have as many as 120 compromised endpoints a


month (half of which are students)

We are the ultimate BYOD environment

The cost of a breach


u $184

dollars on average per record in


education, based on figures from a 2014
Ponemon Institute Study

Threat Intelligence Sources


u QRadar Security Inteligence

Event

Management (SIEM)
u Trend Micro Deep Discovery Malware
detection tool
u Kaspersky Anti-Virus Reporting System
u Government, industry contacts and
listservs
u InfoSec News Sources and Social Media

Malware CNC CallBacks (30 days)

Affected Hosts

Threat Patterns

Remote Intrusion Attempts Source

Remote Intrusion Attempts


Destination

Security Offences

Moving
beyond
tactical
response

UNBs move to IT Risk Management

IT Risk Management

ty
i
r
tu
a
M

Threat Analysis, Policy & Procedure Development

IT Security Operations

Day-to-day IT Operations

Iterative improvement model


Risk
Management

Threat Analysis
Policy &
Procedure
Development

IT Operations

Security
Operations

The Security Building Blocks


Risk Management, Quality Assurance and Standards Development

Operations

Service Desk

Security Action Team

Communications:

Service Desk
u Help

Desk escalates
threats to SAT
u Assists with user
education
u Desktop Group helps
harden end points and
triage compromises

Operations
u Systems

and Network
monitoring, reporting
of threats, ensuring
patching and
reporting policy or
procedure
compliance issues.
Participates in
incident response.

Communications
u Assists

with development and execution of


user awareness and culture change
campaigns.

u Assists

with developing and executing


incident communications

Security and Operations


u

Operations: Trying to keep the lights on

IT Security: ensuring compliance with protective measures

Critical to avoid ineffective communications. Security and


Operations groups in IT have different goals and in some
cases cultures. Critical to ensure alignment with overall IT
Strategy

The cross-functional workflow


Client provides
username and
password in phishing
attempt

Help Desk or Level One


advises + assists client
with safe password
reset

IT Security initiates
incident investigation

Operations staff
engaged to assist with
log review / access
checks

UNB Privacy Officer


engaged in event of a
potential data breach

Client advised of
investigation,
encouraged to take
awareness course

What fighter jets in the Korean War


can teach us about cybersecurity

The OODA Loop


Observe

Act

OODA
Cycle

Decide

Orient

A harsh truth:
u Simply

buying the latest


and greatest big shiny
security technology will not
make your organization
safer

u Strategy

+ Technology +
Process + People = Success

Security Strategy Pillars


Security Strategy

IT Security Policy
Data Governance

Security Architecture:
Tools, People, Process

Culture Change:
User Awareness +
Behaviour Change

Translating Cyber Security-ese to


Business-ese

Making the case

Where
cybersecurity
fits in Porters
Value Chain

The disconnect between threat


awareness and concern about
threats

Do you believe your organization


has an accurate picture on the
threats it faces on a daily basis?

61%

werent sure or werent confident

Anonymous, non-scientific poll conducted during a webinar I delivered in April 2015.

How concerned are you about an


attack leading to a data breach?

Anonymous, non-scientific poll conducted during a webinar I delivered in April 2015. N = 40

65%

very concerned

Anonymous, non-scientific poll conducted during a webinar I delivered in April 2015. N = 34

We need to change the


cybersecurity story.

Questions?

Вам также может понравиться