griffith and the 2014 g20
play

Griffith and the 2014 G20 IT Security response to the 2014 G20 - PowerPoint PPT Presentation

Griffith and the 2014 G20 IT Security response to the 2014 G20 Summit Greg Vickers Senior Project Manager INS About Griffith Closely involved in G20 Summit in Brisbane 5 campuses, South Bank campus within a kilometer of the G20


  1. Griffith and the 2014 G20 IT Security response to the 2014 G20 Summit Greg Vickers Senior Project Manager INS

  2. About Griffith  Closely involved in G20 Summit in Brisbane  5 campuses, South Bank campus within a kilometer of the G20 Summit location ● Some G20 events held at South Bank campus  ~46,000 students (2014)  ~10,000 staff (2014)  lots of endpoints  10Gb Internet connection INS

  3. G20 and Development Conference INS

  4. Target INS

  5. Risks  Risks identified to public and student facing systems  Breach, defacement, data loss, etc  Front page of a newspaper or website  Insider threat INS

  6. Mitigations  Managed Security Service (Symantec)  Cloud-based Application Firewall (Akamai)  Hosted DDoS protection (Akamai)  Existing Unified Threat Management system  24/7 attention paid to all new and existing mitigation processes during, before and after Summit INS

  7. Implementation - MSS  Fairly easy to implement  Low potential impact on staff/students from required changes  Point-and-click user interface  Good graphic views into our data  Six month engagement INS

  8. Implementation - Hosted DDoS  Fairly easy to implement  Low potential impact on staff/students from required changes  Point-and-click user interface  Four month engagement INS

  9. Implementation - Application Firewall  High difficulty to implement  High potential impact on staff/students from required changes  Point-and-click user interface  Four month engagement INS

  10. Implementation - Application Firewall  Pace of project brought scope changes  19 web sites, three months (unheard of)  Blackboard  CMS/Intranet  ERP system  SSO, Exams/Timetabling ● DNS Registrar changes  Akamai and Griffith DNS connected at the hip (risk of Akamai DNS failure) INS

  11. Implementation - Application Firewall INS

  12. Implementation - Application Firewall  Testing: ● Alternate DNS entry created to point at production ● Web service/site owner engaged to test functionality on their production site/data ● Internal IT Security specialists worked with owners and vendor technicians on configuration INS

  13. Implementation - Application Firewall  Potential Very High impact on staff or student services  Brought some speed increases to static content  Web team investigations found delivery delays in Griffith homepage  Protected against Internet-based attacks  Decommissioning easy (too easy!) INS

  14. Implementation - UTM  Fairly easy to implement, had much attention from networking staff  Some potential impact on staff/students from required changes, but managed closely  Familiar user interface  Ongoing (existing) engagement INS

  15. Obligatory graph  Raised profile of Griffith in the international bad guy community INS

  16. Success!  No web sites defaced  No successful attacks detected  No mass malware outbreak  No newspapers or web site for the wrong reason INS

  17. FIN Thank you! Questions? INS

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend