Security Challenges and Solutions for Higher Education. May 2011

Similar documents
Anti-exploit tools: The next wave of enterprise security

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Secure Your Mobile Workplace

2012 Data Breach Investigations Report

Questions You Should be Asking NOW to Protect Your Business!

Securing mobile devices in the business environment

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Internet threats: steps to security for your small business

Don t Fall Victim to Cybercrime:

Critical Security Controls

Innovations in Network Security

IBM Security re-defines enterprise endpoint protection against advanced malware

AppGuard. Defeats Malware

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Cutting the Cost of Application Security

Netzwerkvirtualisierung? Aber mit Sicherheit!

Network Security Solution. Arktos Lam

Practical Steps To Securing Process Control Networks

Jort Kollerie SonicWALL

Can We Become Resilient to Cyber Attacks?

The SMB Cyber Security Survival Guide

Student Tech Security Training. ITS Security Office

IIABSC Spring Conference

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

The Cloud App Visibility Blindspot

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

External Supplier Control Requirements

Retail Information Security Challenges: Protecting Customers While Enabling New Technology and Improving the Bottom Line

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Modular Network Security. Tyler Carter, McAfee Network Security

Security Analytics for Smart Grid

Fighting Advanced Threats

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cyber Security. John Leek Chief Strategist

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Security Intelligence Services.

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

13 Ways Through A Firewall

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Network Security. Intertech Associates, Inc.

Advanced Threat Protection with Dell SecureWorks Security Services

The Key to Secure Online Financial Transactions

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

I N T E L L I G E N C E A S S E S S M E N T

IBM Security Strategy

How To Protect Your Online Banking From Fraud

Marble & MobileIron Mobile App Risk Mitigation

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

PCI White Paper Series. Compliance driven security

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

September 20, 2013 Senior IT Examiner Gene Lilienthal

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Executive Brief on Enterprise Next-Generation Firewalls

Use Bring-Your-Own-Device Programs Securely

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

13 Ways Through A Firewall What you don t know will hurt you

Versafe TotALL Online Fraud Protection

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Proactive security IT body armor against business attacks WHITE PAPER

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Maximizing Configuration Management IT Security Benefits with Puppet

Integrated Threat & Security Management.

Defending Against Data Beaches: Internal Controls for Cybersecurity

IT Security Risks & Trends

Information Security for the Rest of Us

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

A practical guide to IT security

Data Center security trends

EndUser Protection. Peter Skondro. Sophos

Presented by:!!dave Kennedy (RELIK)"!!!!!Ryan Macfarlane "

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

isheriff CLOUD SECURITY

IT Security Community

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Protecting the un-protectable Addressing Virtualisation Security Challenges

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Getting real about cyber threats: where are you headed?

Towards Threat Wisdom

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

The Protection Mission a constant endeavor

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

SECURITY CONSIDERATIONS FOR LAW FIRMS

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

The thriving malware industry: Cybercrime made easy

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

What keep the CIO up at Night Managing Security Nightmares

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

SANS Top 20 Critical Controls for Effective Cyber Defense

of firms with remote users say Web-borne attacks impacted company financials.

Transcription:

Security Challenges and Solutions for Higher Education May 2011

Discussion Topics Security Threats and Challenges Education Risks and Trends ACH and Wire Fraud Malware and Phishing Techniques Prevention Education The Dell Solution

Security Threats and Challenges Changing Threat Landscape Shift in hacking for fun to hacking for profit Dynamic User Base Student and faculty provided equipment Mobile devices (phone and tablet) Security Education Different cultural expectations (digital natives vs. tradition users) IT Complexity In source, out source, cloud, hybrid, geographic diversity

Risk Trends for Higher Education Eastern European & Asian banking trojans Privacy laws and regulations Social media User (unintentionally) initiated malware

ACH & Wire Fraud Hundreds of millions of dollars stolen Targets small and medium sized public entities Targets small banks and credit unions but large banks such as Bank of America and Comerica have been hit

What is ACH/Wire Fraud? The practice of using targeted malware to Steal banking credentials or Transfer funds out of the US via ACH and money mules Or wire transfers to foreign payers Estimated losses range from $200 to $500 million

Cybercrime Who are the targets? Small and medium businesses Experimental Metal Patco Public institutions School districts Daunesburg Central School District Public services Novato Sanitation Department

Malware How does it work? Botnets such as the ZeuS, backdoor.bot and SpyEye enter the victims computer through a variety of means Spear phishing Fake antimalware drive-by-downloads via compromised web sites

Phishing Impressions 2010

Phishing via Social Media LinkedIn users targeted by ZeuS-based fake connection requests Hard on the heels of the spate of Twitter attacks comes news that LinkedIn members are being targeted by carefully crafted fake connection requests that route users to the ZeuS datadownloading malware.

Fake Antimalware 4,391,982 found in 6 months Police in the United States and seven other countries seized computers and servers used to run a "scareware" scheme that has netted more than $72 million from victims tricked into buying fake anti-virus software

Bots are Easy to Use

Countermeasures

Protecting the Porous Perimeter Firewall Filter both ways Add Intrusion Detection Outsource 24x7 Monitoring Educate users about the dangers of phishing If compromised engage incident response immediately

Dell SecureWorks Value we provide customers

SecureWorks Three Pillars 1. Managed Security Services 24x7x365 monitoring, management, of customer s security devices 2. Security and Risk Consulting Security consulting services Counter Threat Unit Intelligence Services Managed Security Services 3. CTU Intelligence Subscription based security intelligence service Security and Risk Consulting Confidential

Managed Security Services Security Monitoring Managed IDS/IPS Firewall Management Web App Firewall Management Log Management SIM On-Demand Vulnerability Management Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 18 Dell Confidential

Counter Threat Unit Intelligence Services Threat & Vulnerability Feeds Attacker Database Feed Live Intelligence Briefings MS Update Analysis Malware Analysis Emerging Threat Bulletins Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 19 Dell Confidential

Security and Risk Consulting Testing & Assessments Compliance & Certification Incident Response & Forensics Program Development & Governance Architecture Design & Implementation Allows customers to focus Identity & Access Management Expert Residency Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 20 Dell Confidential

KACE End-Point Security Detect Assess Remediate Protect Device Discovery OVAL /SCAP Results Patch Deployment Secure Browsers Software Block Inventory OVAL /SACP Scanning Patch Detect Configuration Correction Configuration Enforcement KACE Virtual Disk

Thank You