SlideShare a Scribd company logo
‘What do you think are the key
information security challenges
facing universities and how would
you address them?’
By Martin Lawrence
What is information security?
Information security is the combination of
technical and organisational measures
deployed in an organisation that are
designed to protect the confidentiality,
availability and integrity of information
assets.
“a body of knowledge that is organised and
managed as a single entity and is of value
to the university”
University of Exeter Information
Classification Policy
What is an information asset
Why protect information assets?
• Information assets are of value
• Information assets are vital to the effective day-
to-day running of the university
• The university is also required by law to protect
some information e.g. personal data –
• Failure to protect personal data may lead to fines
/ law suits / reputational damage
• Confidential data provided by third parties
• Failure to uphold confidentiality may lead to law
suits / reputational damage / loss of confidence
University security challenges
• A dynamic organisation creating new information
assets and with unique risks
• Creating a security culture in a changing
academic and business landscape which values
information security and embeds this into
existing processes
• International working leading to cross boarder
transfers of data
• High value research data of significant national /
international value that may be subjected to
various internal and external threat actors
External information security
threats
• Commodity Threat Actors (Phishing / Scamming)
• Advanced threat actors (national / industrial
espionage)
• “Hackivists” (seeking to do damage to the
reputation of the University)
Managing information security
risks
My proposal for managing information security risks is to
adopt the PDCA approach established as part of the
ISO27001 security standard.
The Solution – PLAN
• Identifying information assets and their associated
risks
• Assigning responsibilities for assets and associated
information risks
• Assess these risks against the context of the
organisation and agreeing priorities
• Agree what risks are acceptable, what can be
transferred, which require mitigation and which require
monitoring
The Solution – DO
• Establish and implement an organisation wide
information security policy
• Establish a framework for investigating breaches
of information security
• Implementing appropriate controls that are
proportionate to the level of risk identified
• Create tailored guidance and training on how to
implement these controls
• Establish and implement a communications plan
to deliver heightened awareness of information
security good practice
The Solution – CHECK
• Establishing effective oversight and reporting of
information risks to senior management and risk
owners
• Review the effectiveness of controls over time
• Review intelligence from security incidents and
establish if any new risks have been identified or
whether pre-existing risks need reviewing or
escalating
The Solution – ACT
• Amend processes or procedures in light of any
vulnerabilities identified
• Target communications, awareness exercises
and training in response to any vulnerabilities
identified
• Re-assess information risks following information
security incidents
• Implement a revised risk treatment plan where
appropriate
In Summary
• Universities are a dynamic environment whose
information risk profile are constantly changing
• There needs to be a firm understanding of the
nature of information risks and what these mean
for the organisation
• A dynamic approach needs to be taken to
ensure that risks are identified, reviewed and
proportional controls put in place
• Risks and their associated controls need to be
kept under constant review so as to ensure they
remain fit for purpose for the organisation
• Staff need to understand their role in creating a
security conscious organisation
Thank you for your time
Any questions?

More Related Content

PPT
3.5 ICT Policies
PPT
Lesson 1- Information Policy
PPT
Lesson 1 - Introduction
PPT
Isys20261 lecture 01
PPT
Lesson 2- Information Asset Valuation
PPTX
A2 ICT Policies
PPT
Ict policy planning and implementation issues
3.5 ICT Policies
Lesson 1- Information Policy
Lesson 1 - Introduction
Isys20261 lecture 01
Lesson 2- Information Asset Valuation
A2 ICT Policies
Ict policy planning and implementation issues

What's hot (20)

PPT
Your Employees and Information Security
PPTX
Nursing technology and informatics
PPT
Implementation of security standards and procedures
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
PPT
Lesson 3- Effectiveness of IDPS
ODT
Ch.5 rq (1)
PPTX
Chapter 4 Risk Management.pptx
PPT
Lesson 1- Risk Managment
PDF
Wellbeing analytics code of practice
PPTX
Security Architecture
DOCX
Key Infrastructure Responsibilities for Steven Blanchard at Vital Holdings - v1
PDF
Engineering council uk guidance on security for engineers & technicians
PPTX
Selling security to the C-level
PPTX
Presentation ict plan2011
PPTX
Presentation1
Your Employees and Information Security
Nursing technology and informatics
Implementation of security standards and procedures
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 2
Lesson 3- Effectiveness of IDPS
Ch.5 rq (1)
Chapter 4 Risk Management.pptx
Lesson 1- Risk Managment
Wellbeing analytics code of practice
Security Architecture
Key Infrastructure Responsibilities for Steven Blanchard at Vital Holdings - v1
Engineering council uk guidance on security for engineers & technicians
Selling security to the C-level
Presentation ict plan2011
Presentation1
Ad

Viewers also liked (20)

PPTX
Abg complete
PPTX
Oxygen therapy
PPT
ABG Interpretation
DOC
Turkish Traditional Menu
PPTX
Web 2.0 Part 2
PDF
Bleach 386
PPT
U.K. Presentation
PDF
Naruto475
PPT
Compulink Core Presentation
PPT
Location Shots A2 Production
PPT
PPTX
Un Ejemplo De Multimedia
PPT
Activity3- Tomás Mingot High School. Pictorial Alphabet for Simplicity
PPSX
PDF
hawkeye Webinar: Increase Sales with Personalized URLs
PPT
Macromolecules Structure And Function
PPT
APHA Tabora, Tanzania
PDF
Naruto477
PPTX
DOC
Spanish Christmas Menu
Abg complete
Oxygen therapy
ABG Interpretation
Turkish Traditional Menu
Web 2.0 Part 2
Bleach 386
U.K. Presentation
Naruto475
Compulink Core Presentation
Location Shots A2 Production
Un Ejemplo De Multimedia
Activity3- Tomás Mingot High School. Pictorial Alphabet for Simplicity
hawkeye Webinar: Increase Sales with Personalized URLs
Macromolecules Structure And Function
APHA Tabora, Tanzania
Naruto477
Spanish Christmas Menu
Ad

Similar to Exeter university ig manager presentation [1] (20)

PPT
Start With A Great Information Security Plan!
PPTX
Secutity Risk+Assessment+Methodology.pptx
PDF
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
PPT
Role of the CISO in Higher Education
PPT
Educause+V4
PPTX
Managing IT Risk and Assessing Vulnerability
PDF
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
PPTX
Information security fasit-cait-20150129_v04
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PPT
Educause+V4.ppt
PPTX
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
PPTX
Wandschneider ischool symposium
PPTX
Kick off Meeting Presentation to Framingham State Information Security Council
PDF
IST606_SecurityManagement-slides_ 4 pdf
DOCX
Group Project RisksThreatsWeaknessesCountermeasures©.docx
PDF
Unit 1&2.pdf
PPTX
IT Security Bachelor in information technology.pptx
PPT
1. security management practices
Start With A Great Information Security Plan!
Secutity Risk+Assessment+Methodology.pptx
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
Role of the CISO in Higher Education
Educause+V4
Managing IT Risk and Assessing Vulnerability
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Information security fasit-cait-20150129_v04
Introduction to Information security ppt
Introduction to Information security ppt
Educause+V4.ppt
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Wandschneider ischool symposium
Kick off Meeting Presentation to Framingham State Information Security Council
IST606_SecurityManagement-slides_ 4 pdf
Group Project RisksThreatsWeaknessesCountermeasures©.docx
Unit 1&2.pdf
IT Security Bachelor in information technology.pptx
1. security management practices

More from Martin Lawrence (7)

PPTX
Skills to Foster data protection power point 2015
PPT
Foi and open data
PPT
The pride of devon
PPT
Slides for the open evening rp 27.05.10
PPT
Powerpoint football
PPT
Skills to Foster data protection power point 2015
Foi and open data
The pride of devon
Slides for the open evening rp 27.05.10
Powerpoint football

Recently uploaded (20)

PDF
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
PDF
Palghar-286Nilemore-VoterList-Aug25-1.pdf
PPT
Gender sensitivity and fair language implementation
PPTX
What Happens to Your Business If You Become Incapacitated
PPTX
PA2014 for Employer and employee at workplace
PDF
Ricado Antonio Pellerano Paradas The Criminal
PPTX
PRODUCT LIABILITY AMID TECHNOLOGICAL DISRUPTION_ ABATING THE SURGE OF DIGITAL...
PDF
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...
PPTX
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PPTX
Basic key concepts of law by Shivam Dhawal
PPTX
CRPC NOTES AND DETAIL PREVAILING TO CRPC
PPTX
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
PPTX
white collar crime .pptx power function and punishment
PDF
OBLICON (Civil Law of the Philippines) Obligations and Contracts
PDF
Black And Deep Peach Geometric Legal Advisor Firm Presentation.pdf
PPTX
Constitution of india module one of ktu
PPTX
Cyber Bullying & harassment on social media.pptx
PDF
Companies Act (1).pdf in details anlysis
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PPTX
Financial Rehabilitation and Insolvency Act
2022CH12581 - Civil Rights vs Morzak, Harrison, Chrisman et al. (Cook County,...
Palghar-286Nilemore-VoterList-Aug25-1.pdf
Gender sensitivity and fair language implementation
What Happens to Your Business If You Become Incapacitated
PA2014 for Employer and employee at workplace
Ricado Antonio Pellerano Paradas The Criminal
PRODUCT LIABILITY AMID TECHNOLOGICAL DISRUPTION_ ABATING THE SURGE OF DIGITAL...
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
Basic key concepts of law by Shivam Dhawal
CRPC NOTES AND DETAIL PREVAILING TO CRPC
DepEd 4A Gender Issues and Promoting Gender Equality.pptx
white collar crime .pptx power function and punishment
OBLICON (Civil Law of the Philippines) Obligations and Contracts
Black And Deep Peach Geometric Legal Advisor Firm Presentation.pdf
Constitution of india module one of ktu
Cyber Bullying & harassment on social media.pptx
Companies Act (1).pdf in details anlysis
NRL_Legal Regulation of Forests and Wildlife.pdf
Financial Rehabilitation and Insolvency Act

Exeter university ig manager presentation [1]

  • 1. ‘What do you think are the key information security challenges facing universities and how would you address them?’ By Martin Lawrence
  • 2. What is information security? Information security is the combination of technical and organisational measures deployed in an organisation that are designed to protect the confidentiality, availability and integrity of information assets.
  • 3. “a body of knowledge that is organised and managed as a single entity and is of value to the university” University of Exeter Information Classification Policy What is an information asset
  • 4. Why protect information assets? • Information assets are of value • Information assets are vital to the effective day- to-day running of the university • The university is also required by law to protect some information e.g. personal data – • Failure to protect personal data may lead to fines / law suits / reputational damage • Confidential data provided by third parties • Failure to uphold confidentiality may lead to law suits / reputational damage / loss of confidence
  • 5. University security challenges • A dynamic organisation creating new information assets and with unique risks • Creating a security culture in a changing academic and business landscape which values information security and embeds this into existing processes • International working leading to cross boarder transfers of data • High value research data of significant national / international value that may be subjected to various internal and external threat actors
  • 6. External information security threats • Commodity Threat Actors (Phishing / Scamming) • Advanced threat actors (national / industrial espionage) • “Hackivists” (seeking to do damage to the reputation of the University)
  • 7. Managing information security risks My proposal for managing information security risks is to adopt the PDCA approach established as part of the ISO27001 security standard.
  • 8. The Solution – PLAN • Identifying information assets and their associated risks • Assigning responsibilities for assets and associated information risks • Assess these risks against the context of the organisation and agreeing priorities • Agree what risks are acceptable, what can be transferred, which require mitigation and which require monitoring
  • 9. The Solution – DO • Establish and implement an organisation wide information security policy • Establish a framework for investigating breaches of information security • Implementing appropriate controls that are proportionate to the level of risk identified • Create tailored guidance and training on how to implement these controls • Establish and implement a communications plan to deliver heightened awareness of information security good practice
  • 10. The Solution – CHECK • Establishing effective oversight and reporting of information risks to senior management and risk owners • Review the effectiveness of controls over time • Review intelligence from security incidents and establish if any new risks have been identified or whether pre-existing risks need reviewing or escalating
  • 11. The Solution – ACT • Amend processes or procedures in light of any vulnerabilities identified • Target communications, awareness exercises and training in response to any vulnerabilities identified • Re-assess information risks following information security incidents • Implement a revised risk treatment plan where appropriate
  • 12. In Summary • Universities are a dynamic environment whose information risk profile are constantly changing • There needs to be a firm understanding of the nature of information risks and what these mean for the organisation • A dynamic approach needs to be taken to ensure that risks are identified, reviewed and proportional controls put in place • Risks and their associated controls need to be kept under constant review so as to ensure they remain fit for purpose for the organisation • Staff need to understand their role in creating a security conscious organisation
  • 13. Thank you for your time Any questions?

Editor's Notes

  • #2: 30 seconds max Introduce myself Read the heading and introduce the presentation
  • #3: 1min max Read the definition Explain what an information asset is (university definition) Give examples of technical measure Give examples of organisational measures Explain that assets will often require a range of technical and organisational measures to protect them, depending on the nature of the risk
  • #5: 1 minute max Read the slide Give examples of how information assets are used to run the university Expand on how research assets may impact on national policy makers – Strategy & Security Institute
  • #6: 1 minute max I see a University as a dynamic organisation that is constantly evolving to meet the changing political and academic landscape This changing environment is likely to lead to difficulties in embedding a security conscious culture The nature of a university is such that it is likely to be constantly creating new information assets. Therefore identifying these assets and assessing the security threats these assets face, is going to be a constant concern. With the degree of high value research data held by the university there will be an increasing number of external threat actors operating to gain access to this data. Examples of such external threat actors include;
  • #7: 30 seconds max Read the slide
  • #8: 30 seconds max Read the slide
  • #9: 1 minute max Read the slide Include understanding the heads of college have been assigned responsibility under the university’s existing policy
  • #10: 1 minute max Read slide Expand on the University Information Security Policy
  • #11: 1 minute max Read slide Expand on University Security Management Framework (VCEG – ISSG)
  • #12: 30 Seconds max Read slide
  • #13: 30 seconds max Read slide
  • #14: Negligible