Академический Документы
Профессиональный Документы
Культура Документы
How UNB is using policy, practice and technology to enhance cyber security
u Using
u Moving
My background
u
IT security leadership
coordinates
About UNB
u
11,000 students
Hybrid IT environment
(centralized and
decentralized)
In defence of cybersecurity
Officially, ISO/IEC 27032 addresses Cybersecurity or
Cyberspace security, defined as the preservation of
confidentiality, integrity and availability of information in
the Cyberspace.
In turn the Cyberspace (complete with definite article) is
defined as the complex environment resulting from the
interaction of people, software and services on the Internet
by means of technology devices and networks connected
to it, which does not exist in any physical form.
Our challenges
u
Event
Management (SIEM)
u Trend Micro Deep Discovery Malware
detection tool
u Kaspersky Anti-Virus Reporting System
u Government, industry contacts and
listservs
u InfoSec News Sources and Social Media
Affected Hosts
Threat Patterns
Security Offences
Moving
beyond
tactical
response
IT Risk Management
ty
i
r
tu
a
M
IT Security Operations
Day-to-day IT Operations
Threat Analysis
Policy &
Procedure
Development
IT Operations
Security
Operations
Operations
Service Desk
Communications:
Service Desk
u Help
Desk escalates
threats to SAT
u Assists with user
education
u Desktop Group helps
harden end points and
triage compromises
Operations
u Systems
and Network
monitoring, reporting
of threats, ensuring
patching and
reporting policy or
procedure
compliance issues.
Participates in
incident response.
Communications
u Assists
u Assists
IT Security initiates
incident investigation
Operations staff
engaged to assist with
log review / access
checks
Client advised of
investigation,
encouraged to take
awareness course
Act
OODA
Cycle
Decide
Orient
A harsh truth:
u Simply
u Strategy
+ Technology +
Process + People = Success
IT Security Policy
Data Governance
Security Architecture:
Tools, People, Process
Culture Change:
User Awareness +
Behaviour Change
Where
cybersecurity
fits in Porters
Value Chain
61%
65%
very concerned
Questions?