Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph...

27
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical University

Transcript of Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph...

Page 1: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Information Security

Zero to 60 in 10 Years

Howard Muffler, Information Security Officer

Joseph Progar, Information Security Analyst

Embry-Riddle Aeronautical University

Page 2: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

BUSINESS IMPERATIVES

Page 3: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Business Imperatives

• Create a “Web Presence”– Convey information– Market to current and prospective

customers

• Expand research capabilities• Explore new markets – local to global

– Reach a wider audience– Defend against competitors

• Enhance student life

Page 4: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Business Imperatives

• Develop online classes and classrooms

• Transition IT from service provider to business driver

• Security imperatives growing as well:– Pay more attention to information

protection!– Recognize the Internet as a dangerous

place

Page 5: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Business Imperatives

• Internet = Requisite business tool– Anytime Anywhere– Empower constituents

• More Self-Services• More communication and collaboration

– Continue to innovate – expand markets further

– Think like an entrepreneur – act like a business

Page 6: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Business Imperatives

• Security is a bigger concern than ever– Don’t end up “In the News”

(involuntarily)– Understand risks; mitigate

vulnerabilities– Formalize security responsibility and

functions– Ensure legal and regulatory compliance

Page 7: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Business Imperatives

• Continue expansion in global markets

• Deliver product anytime and anywhere

• Expand brand recognition• Concentrate on niche competencies

Page 8: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Business Imperatives

• Security will continue to be critical– Imbed awareness into organization

culture– Provide security which doesn’t conflict

with education, productivity, & job responsibilities

– Preserve constituent privacy– Ensure continued legal and regulatory

compliance

Page 9: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

ATTACKS

Page 10: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Attackers and their Motives

Attacker• Researchers• TeenagersMotivation• Proof of Concept• Fame / Infamy

Page 11: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Common Attacks

• Viruses• Worms• Trojans• DOS• Web defacement• Scanning• Sniffing

Page 12: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Attackers and their Motives

Attacker• Well educated individuals• Organized crimeMotivation• Money• Power

Page 13: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Common Attacks

• Viruses, Worms, Trojans– Root Kits– Bot Nets– Key loggers

• DDOS• Phishing

Page 14: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Attackers and their Motives

Attacker• Well educated criminals• Ideologies and BusinessesMotives• Money• Politics

Page 15: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Common attacks

• Viruses, Worms, Trojans– Bot Nets– Blended threats

• Encryption– Holding data hostage

Page 16: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

NETWORK

Page 17: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Network

Router

Firewall

Internet

Campus

Page 18: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Network

Firewall

Firewall

Firewall

Internet

Campus

Databases

APP

Web

Wireless

Web Servers

Applications

Router w/netflow IPS

Page 19: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: NetworkDefense in Depth

Page 20: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Network

Request Access

Evaluate

Process

Deny

Allow

Remediate

Page 21: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

ERAU SECURITY RESPONSE

Page 22: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Security Response• Moving away from Laissez Faire (B.I.)• Early safeguards mostly afterthoughts• Focused on virus protection and basic

network security (perimeter protection)• Equipment misuse > info protection• SPAM threat not yet fully appreciated• Y2K = Resource hog

Page 23: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Past: Security Response

• Higher Ed = Prime hacker target (why?)• “Selling” security to upper management• Growing appreciation of “Insider” threat• Virus concerns = “Trio of Trouble” Plus• Stronger efforts re: Regulatory

compliance

Page 24: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Present: Security Response

• Formalization of security responsibilities

• Creation of formal polices and procedures

• Creation/expansion of education and awareness programs

• IT leadership in incident response• First formal Risk Assessment study

Page 25: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Future: Security Response

• Continue to view security holistically• Expand policies and procedures (ISO)• Address new “compliance hammers”• Formalize incident response – Not just

IT• Repeat Risk Analysis regularly• Implement security measures which

don’t just target specific vulnerabilities (adaptive, heuristic)

Page 26: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Five Steps to an Effective Information Security Program

1. Get Upper Management Support2. Start Small3. Adopt a Multilayered Approach4. Keep Security Flexible5. Improve Continuously

Page 27: Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.

Thank You!

Q & A