MSU IT Update. Rob McCurdy Chief Information Officer

Similar documents
Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

OneUConn IT Service Delivery Vision

Reviewing the 2017 Verizon DBIR

Office 365. It s Past, Present and Future at UW

PROJECT PROGRESS REPORT Information Technology Equipment. Chabot- Las Positas CCD October 27, Equipment Categories of Hardware and Software:

PT Unified Application Security Enforcement. ptsecurity.com

Understanding the Changing Cybersecurity Problem

ISACA West Florida Chapter - Cybersecurity Event

Windows Server The operating system

ACHIEVING FIFTH GENERATION CYBER SECURITY

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional

MICROSOFT APPLICATIONS

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

STRATEGIC PLAN

Some services provided by IST may fall into more than one category; in these circumstances IST usually refers to these services as hybrid.

May the (IBM) X-Force Be With You

Why is Office 365 the right choice?

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

UW TechConnect. OneDrive for Business (formerly known as SkyDrive Pro) Lync 2013 Exchange Online

Bozeman IT Council Agenda Thursday, September 17 President s Conference Room

It is requested that the Board approve the Northern Arizona University s Network Upgrade and Wireless Expansion Project.

1

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

2015 VORMETRIC INSIDER THREAT REPORT

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

WEB REDESIGN PROJECT. presented to President s Cabinet. presented by Eric Turner, Web and Portal Services Uyen Mai, Marketing and Communication

Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016

Bozeman IT Council Agenda 10:00 am Friday, May 29, 2015 President s Conference Room. Members

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Instructor: Eric Rettke Phone: (every few days)

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

An Overview of Mobile Security

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

The University of Queensland

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Information Technology University Budget Hearing. April 5, 2018

BUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card

TRAPS ADVANCED ENDPOINT PROTECTION

Top Five Ways to Protect Your Organization from Data Loss & Cyber Hackers

Enterprise Services & Unified Capabilities Development & Delivery

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

HP Fortify Software Security Center

E mail, Calendar, and Contacts Transition Project. Faculty Senate Executive Board Briefing

Higher Education Privacy Update

2014 Bond Technology Infrastructure Status Report. March 10, 2016

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Data Protection in Practice

Total Threat Protection. Whitepaper

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Cyber Fraud What can you do about it?

Pervasive Insight. Mission Critical Platform

Securing Today s Mobile Workforce

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Information Technology Services. Abdulrauf Gehani, Manager IT Client Services August 2, 2018

Procedure: Bring your own device

The Cost of Denial-of-Services Attacks

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner

Mobility and Support: Impact and Opportunity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Office 365 for businesses. Stay connected on the go

IBM Security Network Protection Solutions

Security Made Simple by Sophos

Get Smart about Backup & Recovery

A Data-Centric Approach to Endpoint Security

Information Security Controls Policy

NEN The Education Network

Network and Printing at Munich Business School

Secure Access for Microsoft Office 365 & SaaS Applications

Tim Heagarty, CISA CISSP - (859) Lexington, KY

Enterprise-ready Unified communications platform

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Part 1: Anatomy of an Insider Threat Attack

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Overcoming IT Challenges in the Education Segment Leveraging Cloud and On-Premise Resources for Maximum Impact

IT Town Hall Meeting

Reducing Cybersecurity Costs & Risk through Automation Technologies

IT SECURITY FOR NONPROFITS

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Lessons Learned from 4,000 Security Assessments. Sadik Al-Abdulla Security Practice Director, CDW

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

DRAFT. Your files need to get moved before December 2018.

Keep the Door Open for Users and Closed to Hackers

ACQUISITION OF MWR INFOSECURITY ACCELERATED REVENUE GROWTH F-Secure Q3 / 2018

ITSY Information Technology Security Course Syllabus Spring 2018

2017 THALES DATA THREAT REPORT

ADDENDUM B 02/23/2018. Due to an administrative oversite, the following questions were not included in Addendum A.

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

Provide Your Customers with a New Compute Experience

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Transcription:

MSU IT Update Rob McCurdy Chief Information Officer https://tech.msu.edu CIO@msu.edu @McCurdy_Rob

MSU IT Mission and Vision MISSION Implement and maintain practical information technology solutions that provide the platform for MSU to excel in research, education, and outreach. VISION Exemplify visionary leadership and deliver effective technology solutions to enable MSU students, faculty and staff to positively impact vital global issues. 2

Agenda Spartan 365 Update Information Security Update Data Center Update 3

What is Spartan 365? A suite of familiar Microsoft Office tools configured for the MSU community User-friendly features Integrated environment Use on the go across multiple devices Modernized, Robust, and Secure 4

5

Spartan Mail A contemporary email and calendaring solution Available for both Mac and PC on desktop, laptop, and mobile devices Intuitive web interface Features MSU Mail Protection Over 115,000 Students, Faculty, Staff, Alumni, and Retirees Are Using Spartan Mail 6

Spartan Drive Spartan Drive A simple way to store, sync and share your files Secure file storage Share within MSU or outside of MSU Upgraded to 5TB of cloud storage accessible from anywhere Over 2 Million Files and Rapidly Growing 7

Spartan Skype Spartan Skype A secure chatting, conferencing, and screen sharing tool Available for faculty, researchers, and staff Presence information (Free/Busy) Secure file transfers Use it across multiple devices Quick And Easy Way To Connect 8

How to Get Spartan 365 TOOL OneDrive Skype Spartan Mail ACCESS Fully available. Go to spartan365.msu.edu and sign in. Fully available. For individuals and departments, send email request to ithelp@msu.edu to get on the implementation list. For More Information, Search Spartan 365 on msu.edu 9

Questions? More Information: https://tech.msu.edu Help: ITHelp@MSU.edu or call us (517) 432-6200 10

Agenda Spartan 365 Update Information Security Update Data Center Update 11

Education has a patching problem Vulnerability Response Industry Percent Patched within 90 days Information 97.5% Manufacturing 92% Healthcare 85% Accommodation 66% Retail 62% Public 33% Finance 33% Education 18% 12

This Year s Trends Who is attacking? 75% of breaches are performed by outsiders 51% of breaches performed by organized crime 18% of breaches performed by state-sponsored groups How do they do it? 99.9% of breaches leverage vulnerabilities over a year old + 81% of breaches leveraged stolen/weak passwords 66% of malware infections were from malicious attachments Why do it? 95% financially motivated* *2016 Verizon DBIR + 2015 Verizon DBIR 13

MSU s Threats, per Industry Top Threats, Per Industry (past two years) Industry Primary Threat Accommodation Point of Sale Intrusions Administrative Privilege Misuse Educational Entertainment Finance Healthcare Information Manufacturing Public Retail Utilities Cyber Espionage Point of Sale Intrusions Web Application Vulnerabilities Stolen Assets Web Application Vulnerabilities Cyber Espionage Miscellaneous Errors Point of Sale Intrusions Cyber Espionage 14

Questions? More Information: https://tech.msu.edu Help: ITHelp@MSU.edu or call us (517) 432-6200 15

Agenda Spartan 365 Update Information Security Update Data Center Update 16

Data Center Objectives Support the delivery of our mission of education, research and outreach, and activities inherent in the operation of a major teaching and research institution. Provide sufficient capacity to host all distributed IT currently housed in units across campus and other locations. Develop a centralized data center to support the academic, research, administrative and high performance computing needs of the University. Address today s and tomorrow s compute capacity, quality, reliability, redundancy and security needs. 17

Post Build Consolidate and Optimize Consolidate 70+ Data rooms One enterprise class data center Optimize Moving to a consolidated data center capacity model supports the ability to: Increase security. Redistribute unit technology resources to higher value activities. Repurpose the larger data centers and rooms across campus. Move to more efficient and cost-effective technologies (example: virtualization). Generate central savings through energy efficiency. Campus Virtualization Ratio Virtualized Servers 35% Physical Servers 65% Virtualized 77% Improve to Physical 23% 18

Schedule Date Milestone / Migration Wave Mid-November Wave 0.5 (network gear & test servers) Wave 1 (DNS, load balancer, some on-premise email) Substantial completion of build December Wave 2 January, 2018 Wave 3 February OSIRIS installation April-July Target for icer cluster and lab equipment installation September Open migration waves from all academic units* March, 2019 Decommission ADC * We can start discussions in January to do joint planning 19

Questions? More Information: https://tech.msu.edu Help: ITHelp@MSU.edu or call us (517) 432-6200 20

Thank you! Rob McCurdy Chief Information Officer https://tech.msu.edu CIO@msu.edu @McCurdy_Rob 21

22