Cyber Security in Higher Education September 25, 2019 Esteemed - - PowerPoint PPT Presentation

cyber security in higher education
SMART_READER_LITE
LIVE PREVIEW

Cyber Security in Higher Education September 25, 2019 Esteemed - - PowerPoint PPT Presentation

Cyber Security in Higher Education September 25, 2019 Esteemed Panel Cyber Security in Higher Education Tom DeChiaro Vice President, CIO Drexel University MODERATOR Ken Makoid Steve Roesing Regional Vice President Northeast Sales CEO


slide-1
SLIDE 1

September 25, 2019

Cyber Security in Higher Education

slide-2
SLIDE 2

Esteemed Panel … Cyber Security in Higher Education

2

9/252019

Tom DeChiaro Vice President, CIO Drexel University Ken Makoid Regional Vice President Northeast Sales FlexenIal Frank Yako CIO, Director of Strategic IniIaIves ASMGi Steve Roesing CEO ASMGi MODERATOR

slide-3
SLIDE 3

3

Agenda

9/25/2019

u Cyber Landscape in Higher Educa4on u Discussion Topic #1 – Strategy u Discussion Topic #2 – Assessments u Discussion Topic #3 – Solu4ons u Discussion Topic #4 – Data Center u Conclusion + Key Points u Ques4ons + Closing Remarks

slide-4
SLIDE 4

4

Cyber in Higher Education is Challenging because …

9/25/2019

slide-5
SLIDE 5

5

Cyber in Higher Education is Challenging because …

9/25/2019

slide-6
SLIDE 6

6

Cyber in Higher Education is Challenging because …

9/25/2019

slide-7
SLIDE 7

7

#1 STRATEGY

Does your Cyber Strategy align with your University’s Strategic Plan?

9/25/2019

slide-8
SLIDE 8

8

How do you prioritize your initiatives?

9/25/2019

Cyber Exper7se priori7zed Top 20

slide-9
SLIDE 9

9

How do you prioritize your initiatives?

9/25/2019

Historical Breach Data annotated with CIS Controls

slide-10
SLIDE 10

10

How do you prioritize your initiatives?

9/25/2019

SafeBreach ALack Simulator

slide-11
SLIDE 11

11

How do you prioritize your initiatives?

9/25/2019

Quan&fying Cyber Risk

u Leverage what you

have

u Bring security closer to

the business

u Create a common

language to discuss cyber risks

u Priori4za4on = Align

budgets with ini4a4ves that provide actual economic impact

slide-12
SLIDE 12

At the Center is CISO, CFO & CEO Synchronicity

→ Enhances CISO and CFO / CEO dialogue

and understanding

→ Financial measurement of balance sheet

impact

→ Financial accuracy and substantiation

  • f cyber budget requirements and application

→ Assimilation of cyber risk into enterprise

risk management (ERM)

→ Acceptance of CISO role as a strategic

function

12

Internal: External:

→ Enables CEO to present tangible assessment of

cyber risk to stakeholders

→ Enhances financing prospects → Strengthening of company’s position with External

constituents (e.g. regulators, etc.)

→ M&A and other growth strategy advantages → Enables superior risk solutions (insurance; capital

markets; security tech channel sales)

The Benefits of Quantification

9/25/2019

slide-13
SLIDE 13

13

#2 ASSESSMENTS

How many assessments do you do to meet your Compliance and Privacy requirements?

9/25/2019

slide-14
SLIDE 14

14

9/25/2019

Compliance

PCI-DSS HIPAA FERPA GLBA FISMA

Frameworks

NIST ISO/IEC 27001, 2 CIS

slide-15
SLIDE 15

15

9/25/2019

Common Controls Framework (CCF)

slide-16
SLIDE 16

16

#3 SOLUTIONS

What problems are you trying to solve?

9/25/2019

slide-17
SLIDE 17

17

A Holistic Approach to Cyber Security

Total Solu7on = 3 Pillars

9/25/2019

+ +

slide-18
SLIDE 18

18

Lots to choose from …

9/25/2019

slide-19
SLIDE 19

19

How do you prioritize your initiatives?

9/25/2019

Cyber Exper7se priori7zed Top 20

slide-20
SLIDE 20

20

How do you prioritize your initiatives?

9/25/2019

Historical Breach Data annotated with CIS Controls

slide-21
SLIDE 21

21

#4 DATA CENTER

Do you outsource your data center? How does your data center impact your Security?

9/25/2019

slide-22
SLIDE 22

22

9/25/2019

How many of your data centers look like this?

slide-23
SLIDE 23

Fully compliant solutions

SOC 1 dual-standard report Level 1 PCI DSS service provider for colocation and cloud Information Security Management System standard HITRUST CSF service provider for colocation and cloud Health Insurance Portability and Accountability Act Security Rule American Institute of Certified Public Accountants Trust Services Principles for security, and availability SOC 3 Trust Services Report

Our compliance expertise runs deep with over 50 compliance-focused engineers.

slide-24
SLIDE 24

Colocation capability highlights

Unique Density Footprint

  • Density up to 50kw per cabinet in newer faciliIes

Flexible Service OpIons

  • Inventory and terms to meet customer growth

Pricing Models To Match Customer Needs

  • Fixed and variable billing opIons

Support points:

  • 40 Datacenters
  • Wholesale and Retail

Colocation capability

  • 100% Power SLA
  • Team of Experts

Available for Design, Implementation and Maintenance Needs

Na4onwide presence and offerings for all customer types

slide-25
SLIDE 25

Flexential capabilities

We help organizations optimize their IT transformation journey while simultaneously balancing cost, scalability and security.

25

slide-26
SLIDE 26

26

Conclusion + Key Points

9/25/2019

u Don’t recreate the wheel u Map controls to complete one assessment that meets all

requirements

u Quan4fy Risks to establish priority u Orchestra4on + Automa4on will help meet growing demands u Leverage Cyber Insurance u Outsource to trusted partner when capacity or exper4se is

lacking

u There is strength in numbers! Let’s work together to help you

ALL succeed!

slide-27
SLIDE 27

QUESTIONS?

9/12/2019

slide-28
SLIDE 28

Upcoming Webinars and Events

Events

u September 25th 4PM - Cyber Security Issues in Higher Education 


panel discussion at the Union League of Philadelphia

u October 21-25 - Information Security Summit


at The Cleveland I-X Center

Webinars

u September 18 - Setting the Trap: Crafty Ways The Bad Guys Use Pretexting To Own Your Network


presented by KnowBe4

u October 3 - Securing Your Endpoints – Why Are Businesses Getting Hit With So Much Malware?


presented by ASMGi and Malwarebytes

u October 10 - Where Will You Compute Securely?


presented by ASMGi and Flexential

u October 17 - Do You Know Where Your Data Is And Who Is Accessing? 


presented by ASMGi and Heureka

slide-29
SLIDE 29

800 Superior Ave E, Ste 1050
 Cleveland, OH 44114
 
 Phone: 216.255.3040
 Fax: 216.274.9647
 
 Email: info@asmgi.com
 
 www.asmgi.com

Thank You!

29