SlideShare a Scribd company logo
Securing the “Wild Wild West”:
Unified Security Management for Colleges and Universities
Justin P. Webb
Information Security Officer
GCIH, GPEN, GWEB, GCFA
Marquette University
Sandy Hawke, CISSP
VP of Product Marketing
AlienVault@alienvault
#AlienIntel
Agenda
Introductions
Common IT Security Challenges for Higher Education
Overview of Marquette University’s approach
Security strategy –> Unified Security Management
Key Use Cases for USM
Benefits & Results
Architecture / Deployment Discussion
Summary
2
Introductions
3
Sandy Hawke, CISSP
VP, Product Marketing
AlienVault
@sandybeachSF
Justin’s Photo
Justin Webb
Information Security Officer
Marquette University
Common IT Security Challenges for Universities
Decentralized networks without centralized control or
visibility
Lean IT teams whose members wear lots of hats,
security is just one piece of the puzzle
Herds of digital natives as end-users
(“the click generation”)
Compliance pressures (PCI, HIPAA,
FERPA, etc.)
4
POLLING QUESTION #1
What’s your biggest IT Security challenge?
5
Marquette University
Founded in 1881
Wisconsin’s largest private university
11,800 students, 11 schools & colleges
Hundreds of servers, thousands of student & lab
computers = terabytes of log data across 10G network
IT organization operates as the campus ISP
IT staff = 60
IT security staff = ~3 (1 FTE, 2 PTE)
At-a-glance
6
IT Security Challenges at Marquette
Lack of security visibility
Hard to detect and remediate threats
Hard to analyze data from disparate sources, log
rotation causes gaps in coverage
Manual and time-intensive review of
terabytes of log data
Not scalable, not responsive
enough
7
Marquette’s IT Security Monitoring Program
Security Monitoring Solution
Looked to open source/OSSIM at first
Key Use Cases
Log Management: Cisco ACS, Cisco PIX, Cisco ASA,
Tripwire
Detecting DMCA Policy Violations: NAT’ed IP address
translation issues
Incident Response: Customized built-in snort rules;
Tripwire plug-in
Compliance Reporting: PCI, HIPAA, FERPA
8
Unified Security Management: Benefits & Results
Benefits:
Centralized visibility
Easily customizable
Easier incident
response /
investigations
Results:
Rapid deployment - less
than 2 weeks
80% YoY reduction in DMCA
violations
15-25% cost reduction
(through time-saving)
9
AV-USM: Dramatic Reduction in DMCA Violations
10
AV-USM
implementation
Solution Architecture / Deployment
11
• Three-tier architecture (recently
added the Logger)
• 2-week deployment
• Built-in security tools (OSSEC,
OpenVAS, Nagios)
• Consistent high quality tech support
• Future plans
• Suricata, more correlation
POLLING QUESTION #2
What’s your experience with open source security tools?
12
Key Take-aways
Open source security tools may be right for teams who
are trying to show need for more investment
Consolidation and automation can help small security
teams do more with less
Configurability allows for novel uses without significant
development time
Scalability allows any educational institution to tailor
system to the size of enterprise
13
Resources
OSSIM Download and Community
http://communities.alienvault.com/
AlienVault Repository of Knowledge (ARK)
https://alienvault.bloomfire.com/
Marquette University case study
http://alienvault.com/c-suite/case-studies/index.html
“Five security tips IT personnel wish students knew”:
http://www.msnbc.msn.com/id/48782952/ns/technology_and_sci
ence-back_to_school/t/security-tips-it-personnel-wish-students-
knew/
14
Next Steps / Q&A
Request an AlienVault USM demo at:
www.alienvault.com/schedule-demo.html
Request a free trial of AlienVault USM:
http://www.alienvault.com/free-trial
Not quite ready for all that? Test drive our open
source project - OSSIM here:
communities.alienvault.com/
Need more info to get started? Try our knowledge
base here:
alienvault.bloomfire.com
These resources are also in the Attachments section
Join the
conversation!
@alienvault
#AlienIntel
15

More Related Content

PDF
Integrated Network Security Strategies
PDF
Midsize Business Solutions: Cybersecurity
PPTX
Enterprise Strategy Group: Security Survey
PDF
Pervasive Security Across Your Extended Network
PDF
Google peter logli & jake shea
PPSX
DOCX
The NIST Cybersecurity Framework
Integrated Network Security Strategies
Midsize Business Solutions: Cybersecurity
Enterprise Strategy Group: Security Survey
Pervasive Security Across Your Extended Network
Google peter logli & jake shea
The NIST Cybersecurity Framework

What's hot (19)

PPTX
Proposal for IT Security Team
PDF
Intel Security Endpoint Protection
PPTX
Webinar Ivanti Neurons For Patch Intelligence
PDF
Limitless xdr meetup
PDF
Conferencia principal: Evolución y visión de Elastic Security
PPTX
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
PPTX
Cloud Security using NIST guidelines
PDF
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
PDF
Security Risks: The Threat is Real
PPSX
Security policies
PDF
Cyber Security Challenges: how are we facing them?
PPT
2008: Web Application Security Tutorial
PDF
Secure your workloads with microsegmentation
PDF
Sikkerhed & Compliance i en cloud-verden
PPTX
Cyber Security and the CEO
PPTX
Cybersecurity Framework - Introduction
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PPT
Metholodogies and Security Standards
Proposal for IT Security Team
Intel Security Endpoint Protection
Webinar Ivanti Neurons For Patch Intelligence
Limitless xdr meetup
Conferencia principal: Evolución y visión de Elastic Security
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
Cloud Security using NIST guidelines
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
Security Risks: The Threat is Real
Security policies
Cyber Security Challenges: how are we facing them?
2008: Web Application Security Tutorial
Secure your workloads with microsegmentation
Sikkerhed & Compliance i en cloud-verden
Cyber Security and the CEO
Cybersecurity Framework - Introduction
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Metholodogies and Security Standards
Ad

Viewers also liked (15)

PPTX
Customer Training: Detect and Respond to Threats More Quickly with USM v4.5
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
How to Simplify PCI DSS Compliance with AlienVault USM
PPT
OSSIM and OMAR in the DoD/IC
PPTX
Practioners Guide to SOC
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
PPTX
AlienVault Threat Alerts in Spiceworks
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Best Practices for Configuring Your OSSIM Installation
Customer Training: Detect and Respond to Threats More Quickly with USM v4.5
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Simplify PCI DSS Compliance with AlienVault USM
OSSIM and OMAR in the DoD/IC
Practioners Guide to SOC
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Malware detection how to spot infections early with alien vault usm
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
AlienVault Threat Alerts in Spiceworks
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
How to Detect a Cryptolocker Infection with AlienVault USM
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Security Operations Center (SOC) Essentials for the SME
Best Practices for Configuring Your OSSIM Installation
Ad

Similar to Securing the ‘Wild Wild West’: USM for Universities (20)

PPT
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PDF
Council rock-school-case-study
PDF
Incident Response Whitepaper - AlienVault
PPTX
Tech 2 Tech: increasing security posture and threat intelligence sharing
PDF
Secure your network to secure your reputation and your income
PPTX
CyberSecurity Portfolio Management
PPT
Giving The Heave Ho To Worms, Spyware, And Bots!
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPT
The EDUCAUSE Security Professionals Experience [ppt]
PDF
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
PDF
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
PPTX
CS5300 class presentation on managing information systems
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPT
Security Lifecycle Management
DOCX
Network Security Proposal TemplateNetwork Security Proposal.docx
PDF
Community IT Innovators - IT Security Best Practices
PPTX
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
PPTX
Ea sy presentation4
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Improve Situational Awareness for Federal Government with AlienVault USM
Council rock-school-case-study
Incident Response Whitepaper - AlienVault
Tech 2 Tech: increasing security posture and threat intelligence sharing
Secure your network to secure your reputation and your income
CyberSecurity Portfolio Management
Giving The Heave Ho To Worms, Spyware, And Bots!
How to Solve Your Top IT Security Reporting Challenges with AlienVault
The EDUCAUSE Security Professionals Experience [ppt]
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
CS5300 class presentation on managing information systems
Today's Cyber Challenges: Methodology to Secure Your Business
Alienvault how to build a security operations center (on a budget) (2017, a...
Security Lifecycle Management
Network Security Proposal TemplateNetwork Security Proposal.docx
Community IT Innovators - IT Security Best Practices
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Ea sy presentation4

More from AlienVault (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Malware Invaders - Is Your OS at Risk?
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Insider Threat Detection Recommendations
PPTX
Alienvault threat alerts in spiceworks
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
Improve threat detection with hids and alien vault usm
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Incident response live demo slides final
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
How Malware Works
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Alien vault sans cyber threat intelligence
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Malware Invaders - Is Your OS at Risk?
Simplify PCI DSS Compliance with AlienVault USM
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Insider Threat Detection Recommendations
Alienvault threat alerts in spiceworks
Open Source IDS Tools: A Beginner's Guide
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
Improve threat detection with hids and alien vault usm
The State of Incident Response - INFOGRAPHIC
Incident response live demo slides final
Improve Security Visibility with AlienVault USM Correlation Directives
How Malware Works
AWS Security Best Practices for Effective Threat Detection & Response
Improve Threat Detection with OSSEC and AlienVault USM
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Alien vault sans cyber threat intelligence
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”

Securing the ‘Wild Wild West’: USM for Universities

  • 1. Securing the “Wild Wild West”: Unified Security Management for Colleges and Universities Justin P. Webb Information Security Officer GCIH, GPEN, GWEB, GCFA Marquette University Sandy Hawke, CISSP VP of Product Marketing AlienVault@alienvault #AlienIntel
  • 2. Agenda Introductions Common IT Security Challenges for Higher Education Overview of Marquette University’s approach Security strategy –> Unified Security Management Key Use Cases for USM Benefits & Results Architecture / Deployment Discussion Summary 2
  • 3. Introductions 3 Sandy Hawke, CISSP VP, Product Marketing AlienVault @sandybeachSF Justin’s Photo Justin Webb Information Security Officer Marquette University
  • 4. Common IT Security Challenges for Universities Decentralized networks without centralized control or visibility Lean IT teams whose members wear lots of hats, security is just one piece of the puzzle Herds of digital natives as end-users (“the click generation”) Compliance pressures (PCI, HIPAA, FERPA, etc.) 4
  • 5. POLLING QUESTION #1 What’s your biggest IT Security challenge? 5
  • 6. Marquette University Founded in 1881 Wisconsin’s largest private university 11,800 students, 11 schools & colleges Hundreds of servers, thousands of student & lab computers = terabytes of log data across 10G network IT organization operates as the campus ISP IT staff = 60 IT security staff = ~3 (1 FTE, 2 PTE) At-a-glance 6
  • 7. IT Security Challenges at Marquette Lack of security visibility Hard to detect and remediate threats Hard to analyze data from disparate sources, log rotation causes gaps in coverage Manual and time-intensive review of terabytes of log data Not scalable, not responsive enough 7
  • 8. Marquette’s IT Security Monitoring Program Security Monitoring Solution Looked to open source/OSSIM at first Key Use Cases Log Management: Cisco ACS, Cisco PIX, Cisco ASA, Tripwire Detecting DMCA Policy Violations: NAT’ed IP address translation issues Incident Response: Customized built-in snort rules; Tripwire plug-in Compliance Reporting: PCI, HIPAA, FERPA 8
  • 9. Unified Security Management: Benefits & Results Benefits: Centralized visibility Easily customizable Easier incident response / investigations Results: Rapid deployment - less than 2 weeks 80% YoY reduction in DMCA violations 15-25% cost reduction (through time-saving) 9
  • 10. AV-USM: Dramatic Reduction in DMCA Violations 10 AV-USM implementation
  • 11. Solution Architecture / Deployment 11 • Three-tier architecture (recently added the Logger) • 2-week deployment • Built-in security tools (OSSEC, OpenVAS, Nagios) • Consistent high quality tech support • Future plans • Suricata, more correlation
  • 12. POLLING QUESTION #2 What’s your experience with open source security tools? 12
  • 13. Key Take-aways Open source security tools may be right for teams who are trying to show need for more investment Consolidation and automation can help small security teams do more with less Configurability allows for novel uses without significant development time Scalability allows any educational institution to tailor system to the size of enterprise 13
  • 14. Resources OSSIM Download and Community http://communities.alienvault.com/ AlienVault Repository of Knowledge (ARK) https://alienvault.bloomfire.com/ Marquette University case study http://alienvault.com/c-suite/case-studies/index.html “Five security tips IT personnel wish students knew”: http://www.msnbc.msn.com/id/48782952/ns/technology_and_sci ence-back_to_school/t/security-tips-it-personnel-wish-students- knew/ 14
  • 15. Next Steps / Q&A Request an AlienVault USM demo at: www.alienvault.com/schedule-demo.html Request a free trial of AlienVault USM: http://www.alienvault.com/free-trial Not quite ready for all that? Test drive our open source project - OSSIM here: communities.alienvault.com/ Need more info to get started? Try our knowledge base here: alienvault.bloomfire.com These resources are also in the Attachments section Join the conversation! @alienvault #AlienIntel 15

Editor's Notes

  • #6: POLLING QUESTION:What’s your biggest IT Security challenge?Concern about audits (either pre- or post-)Lack of security visibilityNot sure how to handle incidents (or suspected ones)Executive management doesn’t “get” securityDoing too many things at once
  • #9: Log Management – Cisco ACS, Cisco PIX, Cisco ASA, TripwireDetecting DMCA Policy Violations – needed easier way to translate NAT’ed address back to external IPIncident Response – data center protection – Snort, custom written (by Alienvault) Tripwire pluginCompliance Reporting (PCI, HIPAA, FERPA)
  • #10: Benefits:Centralized visibility – network events/threats, user activity, policy violations, etc.Easily customizable (adding data sources, configuring event correlation rules, etc.)Faster, less painful auditsEasier incident response / investigationsResults:Rapid deployment – X weeks80% YoY reduction in malware infections (drop chart in next slide?)15-25% cost reduction – based on the TechValidate survey
  • #13: Polling Question #2What’s your experience with open source security tools?I have little to no experience with open sourceI’ve played a little bit with open source, but nothing substantialI use open source security tools (e.g. snort) to show management where the holes areExecutive management won’t let us rely on open source due to lack of support