Lock It Down! Securing Your Museum In a Hacker’s World
Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams Friday, November 10th, 2017#MCN2017-F7
#MCN2017-F7 Lock It Down! Securing Your Museum In a Hackers World - - PowerPoint PPT Presentation
#MCN2017-F7 Lock It Down! Securing Your Museum In a Hackers World Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams Friday, November 10th, 2017 Panelists Mara Kurlandsky Adam Gegg Angie Judge James Vitale Jeff
Lock It Down! Securing Your Museum In a Hacker’s World
Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams Friday, November 10th, 2017#MCN2017-F7
Panelists
MCN 2017 02 Mara Kurlandsky Project Coordinator for Digital Engagement National Museum of Women in the Arts @mkurlandsky Adam Gegg Director of Information TechnologyAgenda
MCN 2017 03A question not of if, but when
MCN 2017 04IF
why is executive sponsorship for investment in security such a hard sell?
#MCN2017-F7When the worst happens...
Securing Your Museum in a Hacker’s World Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams MCN 2017 05Risks and consequences
MCN 2017 012Loss of reputation Cost of ransom Loss of data Loss of time Cost of repair
#MCN2017-F7Lessons learned
MCN 2017 013 What can we do to keep our museums safe?Institutional technology trends impacting security
MCN 2017 014 Mobile, BYOD and IoT Guest WiFi Telecommuting Cloud andHow to respond to security vulnerabilities
MCN 2017 015 Infrastructure Software Users #MCN2017-F7Responding to museum security: infrastructure
Securing Your Museum in a Hacker’s World Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams MCN 2017 016Infrastructure
MCN 2017 017What needs to be done?
‒ Physical ‒ Wireless ‒ Wired
What is needed to do this?
‒ Documented ‒ Followed ‒ Audited
‒ Firewall, switches, etc...
#MCN2017-F7Infrastructure
MCN 2017 018‒ Work closely with security department to ensure staff and guests aren’t where they shouldn’t be: ▪ Visible ID Badges ▪ Secured Entry ▪ Monitored Access Logs ▪ Locking Offices ▪ Securing computers in public spaces
#MCN2017-F7Infrastructure
MCN 2017 019‒ Access Policies & Virtual Local Area Network (VLAN) Configuration ‒ Guest WiFi ‒ Corporate / Internal WiFi ▪ MAC Address filtering ▪ Domain Authentication
#MCN2017-F7Infrastructure
MCN 2017 020‒ Ethernet Ports / Port Security ▪ Mac Address ‒ Access Policies & VLAN Configuration ‒ Network Authentication and User Management ▪ Active Directory ▪ Processes to ensure only active staff have active accounts ‒ Firewall & Security Appliances
Cisco 5585-X Adaptive Security Appliance: Firewall, VPN, and Intrusion Prevention System #MCN2017-F7‒ Backup Policy ▪ RPO - Recovery Point Objective ▪ RTO - Recovery Time Objective ▪ DR/BC - Disaster Recovery / Business Continuity ‒ Backup Appliances ‒ Offsite / Onsite Options (Cloud considerations) ▪ AWS, Iron Mountain, etc...
Infrastructure
MCN 2017 021 #MCN2017-F7Infrastructure
MCN 2017 022‒ Firewall (Network Intrusion) ‒ Data Backups (Ransomware Protection) ‒ Endpoint Protection ▪ “0-day” virus attacks ▪ Known virus attacks ▪ Email/Chat/Browser Clients ▪ File Attachments / Downloads / Quarantining Infected Files
#MCN2017-F7Q&A
INFRASTRUCTURE MCN 2017 023Responding to museum security: software
Securing Your Museum in a Hacker’s World Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams MCN 2017 024Software
MCN 2017 025‒ Threat Avoidance & DNS ‒ Monitoring & Alerts
‒ Antivirus / Endpoint Protection, Anti-Malware ‒ Application Whitelisting
Protecting Your Network: Threat Avoidance & DNS
MCN 2017 026Domain Name System (DNS) is at the foundation of the internet All modern malware relies on DNS to function Cisco Umbrella (OpenDNS) - Network Protection as a service
Threat Avoidance v. Content Filtering Stop threats before they reach your edge. Best single security investment. ($18/u/y)
#MCN2017-F7Protecting Your Network: Domain Name System
MCN 2017 027 #MCN2017-F7Protecting Your Network: Monitoring & Alerts
MCN 2017 028 Configure alerts so that you can focus on what matters and not spend all day reading logfiles. Active resource monitoring lets you spot performance problems before they affect productionFree: Spiceworks Enterprise: Solarwinds, Microsoft System Center Operations Manager (SCOM)
At SLAM we use SC0M for performance and security monitoring of our servers. SCOM integrates with Operations Manager in Azure to aggregate performance, health and security status on our servers and workstations and VMware and Network resources. #MCN2017-F7Protecting Your Desktop: Anti-virus/Anti-malware
MCN 2017 029Traditional v Next-Gen Antivirus
“A traditional AV solution is limited to detecting only the malware it knows. If the threat is not known, not analyzed and not recorded in the DAT file, or if the DAT file is not updated, or if the attack doesn’t use malware in the first place, the protection offered is nonexistent for that class of threats.” -SANS.ORG Traditional:Protecting Your Desktop: Application Whitelisting
MCN 2017 030 Prevents programs from running unless they are specifically permitted by policy. This includes packaged apps, Executables, Installer Scripts and DLLsRemote access
MCN 2017 031Three common methods of remote access -
Remote Desktop via Web VPN Client LogMeIn #MCN2017-F7Remote access
MCN 2017 032Remote Access methods compared
Technology: Remote Desktop via web LogMeIn VPN StrengthsQ&A
SOFTWARE MCN 2017 033Responding to museum security: users
Securing Your Museum in a Hacker’s World Mara Kurlandsky, Adam Gegg, Angie Judge, James Vitale, Jeff Williams MCN 2017 034Keeping Users Secure
MCN 2017 035Keeping Users Secure
MCN 2017 036‒ Enable extra layers of security
‒ Install and test location-finding software ‒ Install anti-virus software ‒ Regularly check for firmware and security updates
#MCN2017-F7Keeping Users Secure
MCN 2017 037‒ Anti-virus Solutions
‒ Anti-malware Solutions ‒ Effective ‒ Regularly check for firmware and security updates
#MCN2017-F7Keeping Users Secure
MCN 2017 038‒ Mindfulness around unfamiliar links ‒ Be a conscientious web browser ‒ Posting security-sensitive data on Social Media ‒ Social Media Authentication vs. Password Vault Solutions ‒ User Awareness Training: “If you see something, say something” ‒ Executive buy-in on user training
#MCN2017-F7Keeping Users Secure
MCN 2017 039‒ Locking your PC ‒ Locking down your laptop (cable locks, keep out-of-site, etc.) ‒ Eliminate writing down passwords ‒ Printing secure documents and removing them from the workplace ‒ “Clear desk” policy ‒ External Storage Device policy (thumb drives, etc.)
#MCN2017-F7Keeping Users Secure
MCN 2017 040‒ Off-board / On-boarding ‒ Changes in Roles/Responsibilities ‒ Fraudulent Internal Security Threats ‒ Security Trainings and Threat Communications ▪ Frequency, Content and Format ▪ Target Audiences ▪ Certification, Test Drills, Compliance
#MCN2017-F7Q&A
USERS MCN 2017 041Takeaways
MCN 2017 042Thank you
MCN 2017 043