Getting Started with Cybersecurity

Similar documents
NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Cyber security tips and self-assessment for business

Education Network Security

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

University of Pittsburgh Security Assessment Questionnaire (v1.7)

CYBERSECURITY RISK LOWERING CHECKLIST

Cybersecurity Checklist Business Action Items

Ransomware A case study of the impact, recovery and remediation events

7.16 INFORMATION TECHNOLOGY SECURITY

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Security Audit What Why

Defensible Security DefSec 101

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

What It Takes to be a CISO in 2017

Altius IT Policy Collection

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

The Data Breach: How to Stay Defensible Before, During & After the Incident

How Breaches Really Happen

HIPAA 2017 Compliancy Group, LLC

50+ Incident Response Preparedness Checklist Items.

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

2017 Annual Meeting of Members and Board of Directors Meeting

Maher Duessel Not for Profit Training July Agenda

ADIENT VENDOR SECURITY STANDARD

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

The Cyber War on Small Business

Heavy Vehicle Cyber Security Bulletin

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Understanding IT Audit and Risk Management

Cyber Insurance: What is your bank doing to manage risk? presented by

Keys to a more secure data environment

Cybersecurity Overview

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

Protecting Your Gear, Your Work & Cal Poly

Defense in Depth Security in the Enterprise

Cyber Security Stress Test SUMMARY REPORT

ACM Retreat - Today s Topics:

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Data Privacy Breach Policy and Procedure

Morningstar ByAllAccounts Service Security & Privacy Overview

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Personal Physical Security

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Cyber Criminal Methods & Prevention Techniques. By

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Survey: Maritime Cyber Security Survey

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Juniper Vendor Security Requirements

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Security Issues and Best Practices for Water Facilities

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014

COPE-ing with Cyber Risk Exposures

Recommendations for Implementing an Information Security Framework for Life Science Organizations

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

ANATOMY OF AN ATTACK!

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

Security Awareness Training Courses

CCISO Blueprint v1. EC-Council

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Illinois Cyber Navigator Program

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Best Practices for PCI DSS Version 3.2 Network Security Compliance

How Cyber-Criminals Steal and Profit from your Data

Backup, Disaster Recovery: Defining & Managing Your Risk. Dave Kinsey - 5/9/17

Cyber Risks in the Boardroom Conference

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

Breaches and Remediation

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

Cybersecurity in Higher Ed

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Background FAST FACTS

Advanced Endpoint Protection

Easy IT Audit Engagements

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

One Hospital s Cybersecurity Journey

Physician Office Name Ambulatory EHR Security Risk Analysis

A General Review of Key Security Strategies

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

PCI Compliance. What is it? Who uses it? Why is it important?

Cybersecurity for Health Care Providers

Transcription:

2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents in K12 schools Successful phishing attacks Hacks + Unauthorized Data Breaches/ Disclosures Incidents growing exponentially: Right now, we are on pace in 2017 to see more than double the number of K-12 cyber incidents experienced in 2016. 2016 2017 The percent of cyber incidents involving K-12 schools due to the actions of school staff and/or students of those schools, sometimes resulting in criminal charges. page 1 SOURCE for above statistics: edtechstrategies.com/map

What Should SCHOOLS Do? Put reasonable protections in place, realize nothing is 100% breach proof. Where should districts start to get the biggest improvement in security? Patch software and operating systems, and be ready to abandon software when it becomes obsolete TRAIN, TRAIN, TRAIN! Make sure everyone knows security awareness is their job and who to talk to if they make a mistake Build a sustainable, long-range plan for security. Besides consistent training, create a rotation of other areas of security like technical hardware refreshes, application reviews/updates, assessing which vendors may have VPN access to your network, etc. Educate district staff about social engineering Utilize resources like Department of Homeland Security (DHS) and MultiState-I Information Sharing and Analysis Center (MS-ISAC). They provide free monitoring and will help remediate in some cases; they have a host of resources and tools Checklist for YOUR school. To get started, make sure your school has: Patched software systems and abondoned obsolete software Trained everyone so they know security awareness is part of their jobs Educate district stagg about social engineering Built a sustainable, long-range plan for security Utlized resources that provide free monitoring for your school page 2

TECHNOLOGY Preparedness Put technology appliances in place: Firewall DMZ: a demilitarized zone or subnetwork that contains and exposes the district s external services to the Internet Make sure all your operating systems are up to date Put security processes in place: Traffic inspection Backups: Invest in hyperconvergence and robust disaster recovery systems Effective and up-to-date anti-virus Automated patching and maintenance Have a vendor or 3d party partner audit district security Role-based permissions (defined based on network access role based permissions) Least amount of access possible to do their job appropriate access level Password change schedule In case of network interruption, have a prioritized list of essential systems that need to be restored or started up again in order to keep your district afloat. Implement change management to ensure that you know what is approved for change and what is not Conduct tabletop exercises page 3

PEOPLE Preparedness Minimize the staff s ability to be compromised Training Security awareness (every month) > Social engineering > Phishing: General and spear phishing > Who to tell when something goes wrong ( oops i clicked the link! ) Password management > Balance usability and security > Consider implementing 2-factor authentication Practice: Have department drills around specific security incidences Consider outsourcing some security tasks if capacity is an issue BREACH Preparedness Have a conversation with your insurer before you have an event to understand your responsibilities > Purchase a policy that also includes forensic work > Consider hiring a firm on retainer so they can provide immediate assistance when needed Consider having a breach coach - a breach coach works with the insurance carrier to triage the event and help districts navigate the process, including notification requirements Work with your communications department for messages to your staff/community Prepare document templates ahead of time Know where your data is and what is protected class data, i.e., PII, Special Ed status, medical status page 4

INCIDENT DETECTION + RESPONSE Have a baseline of what a normal day looks like to compare with current operation Have the tools at your disposal to troubleshoot the incident > IT management software and monitoring tools > Good SNMP reporting system > Have reports ready to go (e.g. is the switch down or exceeding threshold, are ports exceeding their throughput threshold, are non-standard ports being contacted, etc.) > Consider a Security Incident Event Management system ASSET MANAGEMENT Know your assets and devices Know where your data is for recovery purposes PUBLIC RELATIONS Have communications plans established in advanced > Don t use alarming words or phrases > Build response templates for common incidences Together, we can help keep our schools safer! page 5