Information Security in Higher Education Today Current Threats Higher Ed. Challenges Solutions and Best Practices Lewis Watkins,CISO lwatkins@utsystem.edu 1 The Good News and Bad News Some Facts from the U. S. Secret Service and Verizon 2010 Breach Report • 98% of exposed data came from servers. Make sure servers are professionally managed. • 85% of attacks were not complex. • 96% of breaches were avoidable using simple controls. Security requires operational excellence! • 61% were discovered by a third party. • 86% of breached organizations had evidence in their log files. Organizations have inadequate monitoring. 2 Current Threats The future is already here – it's just not very evenly distributed. William Gibson 3 Gartner 2006 Prediction 4 Today’s Threats! 1. Attacks come 24/7 from anywhere in the world. 2. Unprotected computers are 100% assured of being compromised. 3. Attacks are much more sophisticated than just a year ago, and the motives are much more sinister. 4. Most owners of compromised computers have no knowledge that they have a problem. 5. Primary attackers of concern: 1. 2. 3. Organized, professional crime organizations Nation States Quasi-political/terrorist organizations 5 Most Common Exposures within the UT System 1. Lost/Stolen Computers (that aren’t encrypted) 2. Paper Documents (old documents) 3. Business Partners (mistakes, contract violations, employees) 4. 5. 6. 7. Insecure Applications (Its not the network) Breached Electronic Files (Forgotten files) Employee Errors Employee Misconduct 6 “Oh Toto, I don’t think we are in Kansas anymore!” • • • • • • State of Virginia medical data held for ransom San Francisco network held hostage Slacker harms University of Utah by PHI exposure Stuxnet – worm targets Iran nuclear program “Here you Have” virus (zero day) UNC Professor fighting termination because of exposure of 100,000 patient records • Drive-by malware – mostly unseen • Bots, Bots, Bots – Attacking others 7 Higher Ed. Challenges 8 Five Challenges of Higher Education Security • The Complexity Problem: Universities are very complex. Information Security is complex. Security touches every operational aspect of the university. • The Scope Problem: Risks span the entire organization – and beyond. • The Quality Problem: Small errors can result in large security vulnerabilities that result in breaches. 9 The Location Problem We place data everywhere now…. USB Drives iPhone / Blackberry / Android / Smart Phones Netbooks / Laptops / Desktops/iPads Departmental Servers Central IT Servers Virtual Servers Consolidated Data Centers / Shared Services Outsourcers / Business Partners The “Cloud” Private Clouds / Public Clouds / Unsanctioned Clouds Other: Embedded Systems / Auto Systems (Nav & GPS) 10 Compliance Obligations Information Security Compliance includes these and other regulations, FERPA 1974 PCI-DSS HIPAA 2004 1996 TAC 202 1994 GLB HITECH 1999 Including…. - TX Bus. & Com. Code Ch. 521 - E-Discovery - Red Flag - Business Associate Agreements FISMA 2002 11 Worker Economic Stress Fewer Workers to perform needed tasks. Workers working under greater stress and fear. 12 Solutions and Best Practices 13 There are Solutions! 1. Make sure Data Owners are trained and engaged. 2. Take Inventory (as part of risk assessment process) Devices on your network Applications Data stores 3. Eliminate Unnecessary Data. 4. Make sure your security personnel have visibility into the environment. 5. Make sure your Information Security Officer has access to Executive management. 14 Cloud Computing Unmanaged cloud computing poses risk to University data. Well managed cloud computing holds promise of improved information security. 15 Implement and Track Best Practice Strategies 16 Questions? Lewis Watkins, CISSP Chief Information Security Officer lwatkins@utsystem.edu (512) 499-4540 17