Trends in the IT Security Industry in a 2.0 World–What It Takes To Protect Your Environment
Brad Antoniewicz
The speaker will address topics such as what does the growth of cyberthreats mean for your environment, what do these threats look like, why do you need a layered protection strategy, and how to build a sustainable interlocked security infrastructure to counter today’s increasingly complex threats.
Blackhat / DefCon conference report
Quinn Shamblin
Quinn will be presenting highlights from Blackhat and Defcon 2013; two of the largest and most well attended security researcher and hacker conferences in the world. People from all backgrounds and all walks of life interested in Information and Computer Security converge on Las Vegas every year to share discoveries, hacks, trends, and other information crucial to information security planning during the upcoming year. Quinn will go over the big news items, concepts, trends and exploits released this year.
A Smaller Organization’s Way to Handle Personal Information Security
Patrick Klupa
In 2009, Patrick was asked to bring the Whitehead Institute into compliance with the Massachusetts data protection law (MA 201 CMR 17) that was coming into effect in 2010. Patrick will talk about how he organized a team called the Personal Information Protection Committee (PIPC) to bring Whitehead into compliance. He will then talk about how he transitioned the PIPC from a temporary working group into a permanent, supported, and credible team that continues to protect the personal information retained by the Whitehead Institute. He will also describe the lessons he learned and how they can be applied to other organizations.
SRM – A Framework to Unify IT Security, Facilitate Compliance and Manage Risk
Ken Leeser
In addition to trying to keep up with shifting regulatory requirements related to IT Security, colleges and universities are under increasing pressure to provide demonstrable evidence of good IT Security practices. While most organizations have established some level of IT Security management, many rely on ad-hoc systems (spreadsheets, stand-alone databases), have access to limited metrics and dashboards, and lack consistent reporting. A set of management tools are now gaining traction which promise to do for the IT Security management process what CRM did for the customer engagement process. We are calling these tools SRM – Security Resource Management. Similar to CRM, SRM is a software platform that enables IT staffs to more effectively implement, organize and manage cybersecurity and compliance efforts while at the same time providing real-time insight into risk profile and compliance status. SRM systems streamline business processes and reduce expenses by enabling more efficient management of security and compliance activity.
Come learn about the SRM process and platforms that help manage and track risks and compliance. SRM is a business technology that is used by information security teams and those who interact with or manage those teams. In short, it’s beneficial for any higher-ed organization that has non-public student, employee or university information to protect.
Why Does Visibility Matter?
Shawn Butler
An exploration into flow processing, security and network monitoring, correlations and analytics, deep packet inspection, and operational efficiencies.
Building a backchannel IDS logging system for off site using SNORT and Openvpn
Doug White
Isolated logging and backup can allow you to “push” backups and “pull” logs to prevent unwanted attackers from destroying evidence and outward facing DMZ devices. Traditionally, due to budget, it is often difficult to develop systems to support the idea. Dr. White will discuss remote “pull” logs and “push” backup ideas in a DMZ environment which uses open source products to allow for a more protected approach from off site for management of activity. This is useful for both localized and hub and spoke type environments. In particular, OpenVPN and Snort are discussed in the network diagram.
Using RPZ to Blackhole Bots
Charles Griffin
As networks fall prey to fast flux DNS and Bot infections – there is a new weapon in the security professionals arsenal – RPZ – Response Policy Zones. See how these attacks can be mitigated with another layer in the security onion.