Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom...
Transcript of Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom...
![Page 1: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/1.jpg)
September 25, 2019
Cyber Security in Higher Education
![Page 2: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/2.jpg)
Esteemed Panel … Cyber Security in Higher Education
29/252019
TomDeChiaroVicePresident,CIODrexelUniversity
KenMakoidRegionalVicePresidentNortheastSalesFlexenIal
FrankYakoCIO,DirectorofStrategicIniIaIvesASMGi
SteveRoesingCEOASMGi
MODERATOR
![Page 3: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/3.jpg)
3
Agenda
9/25/2019
u CyberLandscapeinHigherEduca4onu DiscussionTopic#1–Strategyu DiscussionTopic#2–Assessmentsu DiscussionTopic#3–Solu4onsu DiscussionTopic#4–DataCenteru Conclusion+KeyPointsu Ques4ons+ClosingRemarks
![Page 4: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/4.jpg)
4
Cyber in Higher Education is Challenging because …
9/25/2019
![Page 5: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/5.jpg)
5
Cyber in Higher Education is Challenging because …
9/25/2019
![Page 6: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/6.jpg)
6
Cyber in Higher Education is Challenging because …
9/25/2019
![Page 7: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/7.jpg)
7
#1STRATEGY
Does your Cyber Strategy align with your University’s Strategic Plan?
9/25/2019
![Page 8: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/8.jpg)
8
How do you prioritize your initiatives?
9/25/2019
CyberExper7sepriori7zedTop20
![Page 9: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/9.jpg)
9
How do you prioritize your initiatives?
9/25/2019
HistoricalBreachDataannotatedwithCISControls
![Page 10: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/10.jpg)
10
How do you prioritize your initiatives?
9/25/2019
SafeBreachALack
Simulator
![Page 11: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/11.jpg)
11
How do you prioritize your initiatives?
9/25/2019
Quan&fyingCyberRisku Leveragewhatyouhave
u Bringsecurityclosertothebusiness
u Createacommonlanguagetodiscusscyberrisks
u Priori4za4on=Alignbudgetswithini4a4vesthatprovideactualeconomicimpact
![Page 12: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/12.jpg)
At the Center is CISO, CFO & CEO Synchronicity
→ Enhances CISO and CFO / CEO dialogue and understanding → Financial measurement of balance sheet impact → Financial accuracy and substantiation of cyber budget requirements and application → Assimilation of cyber risk into enterprise risk management (ERM) → Acceptance of CISO role as a strategic function
12
Internal: External:
→ Enables CEO to present tangible assessment of cyber risk to stakeholders → Enhances financing prospects → Strengthening of company’s position with External constituents (e.g. regulators, etc.) → M&A and other growth strategy advantages → Enables superior risk solutions (insurance; capital markets; security tech channel sales)
The Benefits of Quantification
9/25/2019
![Page 13: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/13.jpg)
13
#2ASSESSMENTS
How many assessments do you do to meet your Compliance and Privacy requirements?
9/25/2019
![Page 14: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/14.jpg)
149/25/2019
Compliance
PCI-DSSHIPAAFERPAGLBAFISMA
Frameworks
NISTISO/IEC27001,2CIS
![Page 15: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/15.jpg)
159/25/2019
Common Controls Framework (CCF)
![Page 16: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/16.jpg)
16
#3SOLUTIONS
What problems are you trying to solve?
9/25/2019
![Page 17: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/17.jpg)
17
A Holistic Approach to Cyber Security
TotalSolu7on=3Pillars
9/25/2019
+ +
![Page 18: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/18.jpg)
18
Lots to choose from …
9/25/2019
![Page 19: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/19.jpg)
19
How do you prioritize your initiatives?
9/25/2019
CyberExper7sepriori7zedTop20
![Page 20: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/20.jpg)
20
How do you prioritize your initiatives?
9/25/2019
HistoricalBreachDataannotatedwithCISControls
![Page 21: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/21.jpg)
21
#4DATA CENTER
Do you outsource your data center? How does your data center impact your Security?
9/25/2019
![Page 22: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/22.jpg)
229/25/2019
How many of your data centers look like this?
![Page 23: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/23.jpg)
Fully compliant solutions
SOC 1 dual-standard report
Level 1 PCI DSS service provider for
colocation and cloud
Information Security Management System
standard
HITRUST CSF service provider for colocation and
cloud
Health Insurance Portability and
Accountability Act Security Rule
American Institute of Certified Public Accountants Trust
Services Principles for security, and availability
SOC 3 Trust Services Report
Our compliance expertise runs deep with over 50 compliance-focused engineers.
![Page 24: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/24.jpg)
Colocation capability highlights
UniqueDensityFootprint• Densityupto50kwpercabinetinnewerfaciliIes
FlexibleServiceOpIons• Inventoryandtermstomeetcustomergrowth
PricingModelsToMatchCustomerNeeds• FixedandvariablebillingopIons
Support points: • 40 Datacenters • Wholesale and Retail
Colocation capability • 100% Power SLA • Team of Experts
Available for Design, Implementation and Maintenance Needs
Na4onwidepresenceandofferingsforallcustomertypes
![Page 25: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/25.jpg)
Flexential capabilitiesWe help organizations optimize their IT transformation journey while simultaneously balancing cost, scalability and security.
25
![Page 26: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/26.jpg)
26
Conclusion + Key Points
9/25/2019
u Don’trecreatethewheelu Mapcontrolstocompleteoneassessmentthatmeetsallrequirements
u Quan4fyRiskstoestablishpriorityu Orchestra4on+Automa4onwillhelpmeetgrowingdemandsu LeverageCyberInsuranceu Outsourcetotrustedpartnerwhencapacityorexper4seislacking
u Thereisstrengthinnumbers!Let’sworktogethertohelpyouALLsucceed!
![Page 27: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/27.jpg)
QUESTIONS?
9/12/2019
![Page 28: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/28.jpg)
Upcoming Webinars and Events
Eventsu September 25th 4PM - Cyber Security Issues in Higher Education
panel discussion at the Union League of Philadelphia
u October 21-25 - Information Security Summit at The Cleveland I-X Center
Webinarsu September 18 - Setting the Trap: Crafty Ways The Bad Guys Use Pretexting To Own Your Network
presented by KnowBe4
u October 3 - Securing Your Endpoints – Why Are Businesses Getting Hit With So Much Malware?presented by ASMGi and Malwarebytes
u October 10 - Where Will You Compute Securely?presented by ASMGi and Flexential
u October 17 - Do You Know Where Your Data Is And Who Is Accessing? presented by ASMGi and Heureka
![Page 29: Cyber Security in Higher Education€¦ · Cyber Security in Higher Education 9/252019 2 Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast](https://reader036.fdocuments.in/reader036/viewer/2022062506/5f0205757e708231d4022fa0/html5/thumbnails/29.jpg)
800 Superior Ave E, Ste 1050 Cleveland, OH 44114 Phone: 216.255.3040 Fax: 216.274.9647 Email: [email protected]
Thank You!
29