SlideShare a Scribd company logo
Information security at University of East London:
The benefits (and pitfalls) of a framework approach
Craig Clark- Information Security and Compliance Manager
Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 111/11/2016
» Involved in information security at UEL since 2014 – previous experience in facilities
management and insurance sectors
» Not a traditional techie – background in social engineering, forensic science and
risk management
» Mandate covers implementing a ‘security culture’
» Certified ISO27001 lead implementer and GDPR practitioner
About me
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 2
» Sensitive data across multiple systems with multiple owners
» No consistent information governance methodology for classification and retention
» ‘Best efforts’ approach from within IT but no formal information security strategy at vice
chancellor and governor level
» No full time post for information security
» Fragmented approach information sharing
The UEL information security quandary – Previously:
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 3
» Embeds governance, responsibility and accountability values - protection at the front door
» A ‘one stop shop’ for information security and governance
» A mechanism to implement the CIA triad consistently across the institution
» Allows for information security to align with strategic goals
» The framework aligns with controls outlined for an ISO27001 ISMS
» Allows for a systematic approach to risk
What is an information security framework in a UEL context?
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 4
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 5
Policy
Signposting
and awareness
Procedures
Processes
Auditable evidence
Mandatory
» Data protection/GDPR
» Freedom of Information
» Copyright
» Intellectual Property
» Janet network
» Prevent
» PCI-DSS
Information security policy
Supporting policies
» Acceptable use
» Antivirus and malware
» Cloud services
» Social media
» Data retention
» Data classification
» Access management policy
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 6
» Updated to reflect evolving risk landscape especially Prevent and GDPR
» Modeled on Janet network/UCISA policies and toolkits
» For UEL it requires backing at governor level – takes time to get through
various committees
» Needs Union involvement to feed in to disciplinary process for staff breaches
» Communication and accountability across all levels is vital
Policies
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 7
» Multiple modes of delivery (intranet, internal communications, eLearning, workshops and
Lynda.com)
» Dedicated workshops tailored to business function (research, service desk etc)
» Dedicated intranet site aimed at highlighting good information security practices at work
and at home
» Information security incorporated into risk management strategy and various
sub-committees
Signposting and awareness
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 8
» Covers the who, what, where when and how
» Many procedures and processes exist as ‘business as usual’ activities – but documentation
is key to improve the amount of auditable evidence
» Where processes and procedures are widely applicable they must be highly visible and
people should be able to suggest improvements
» Information sharing agreements and internal audit results should be held outside the
affected department – ideally by governance
Procedures and processes
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 9
» Framework allows for increased output of auditable evidence
» Several audit templates available
» ICO has published high level audit areas
» Cloud SecurityAlliance
» GDPR likely to impact on evidence requirements
Auditable evidence
11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 10
Conclusions
» The framework is an evolving, flexible process
» Final version will include new GDPR processes, policies and procedures
» Buy in from the vice chancellor and governor has been vital
» It’s a long road!
» There has been resistance from some business units and academics but overall positive
experience
Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 11
Contact details
C.Clark@uel.ac.uk
twitter.com/cogitateclark
LinkedIn: https://uk.linkedin.com/in/craig-clark-itil-cis-li-eu-gdpr-p-17480198
Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 12

More Related Content

PPTX
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
PPTX
Find out about Jisc - Networkshop44 2016
PPT
UCISA digital capability survey 2017
PPTX
Jisc Monitor workshop - Jo Lambert and Brian Mitchell - Jisc Digital Festival...
PPTX
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
PPTX
Lowering the bar to using data – interactive dashboards for education
PDF
Digital literacy: key issues
PPTX
How you can enhance your efficiency and effectiveness for teaching and learni...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Find out about Jisc - Networkshop44 2016
UCISA digital capability survey 2017
Jisc Monitor workshop - Jo Lambert and Brian Mitchell - Jisc Digital Festival...
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
Lowering the bar to using data – interactive dashboards for education
Digital literacy: key issues
How you can enhance your efficiency and effectiveness for teaching and learni...

What's hot (20)

PPTX
How to change the learning landscape
PPTX
Staff-student partnership working to effect institutional change - Jisc Digit...
PPTX
Transnational education: conversations for success - Jisc Digital Festival 2015
PPTX
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
PPTX
Directions in research data management - Jisc Digital Festival 2015
PPTX
How you can enhance the efficiency and effectiveness of teaching and learning...
PPTX
Collaboration through technology: moving from possibility to practice
PPTX
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
PPTX
Outcomes from the Digital Student Skills project
PPTX
Collaboration through technology: moving from possibility to practice - Tim B...
PPTX
Tracking research and research systems
PPTX
Connect More with peers in practice - Connect More 2017 Birmingham
PPTX
Mobile learning in practice - Jisc Digital Festival 2015
PPTX
Collaboration through technology: moving from possibility to practice - Marti...
PPT
Good Intentions: improving the evidence base in support of sharing learning m...
PPTX
Developing and extending approaches to embedding digital capabilities into in...
PPTX
Making the most of digital resources - Hazel White and Alicia Wallace
PPTX
Whats new in ict law - Networkshop44
PDF
How compliant is your institution? University of Glasgow RIOXX case study - M...
PPTX
Collaboration through technology: moving from possibility to practice - Tim B...
How to change the learning landscape
Staff-student partnership working to effect institutional change - Jisc Digit...
Transnational education: conversations for success - Jisc Digital Festival 2015
Jisc Support for Asset Sharing - Kit-Catalogue National User Group November 2014
Directions in research data management - Jisc Digital Festival 2015
How you can enhance the efficiency and effectiveness of teaching and learning...
Collaboration through technology: moving from possibility to practice
Kit-Catalogue - Discovering the Value of Equipment Sharing - Universities UK ...
Outcomes from the Digital Student Skills project
Collaboration through technology: moving from possibility to practice - Tim B...
Tracking research and research systems
Connect More with peers in practice - Connect More 2017 Birmingham
Mobile learning in practice - Jisc Digital Festival 2015
Collaboration through technology: moving from possibility to practice - Marti...
Good Intentions: improving the evidence base in support of sharing learning m...
Developing and extending approaches to embedding digital capabilities into in...
Making the most of digital resources - Hazel White and Alicia Wallace
Whats new in ict law - Networkshop44
How compliant is your institution? University of Glasgow RIOXX case study - M...
Collaboration through technology: moving from possibility to practice - Tim B...
Ad

Viewers also liked (20)

PPTX
Data and information governance: getting this right to support an information...
PPTX
GDPR: More reasons for information security
PPTX
Cyber Crime - "Who, What and How"
PPT
Role of the CISO in Higher Education
PDF
Protecting our customers - BT security
PPTX
Mitigation starts now
PPTX
Certifying and Securing a Trusted Environment for Health Informatics Research...
PPT
Working with students and ISO27001
PPTX
Embracing local devolution - two college's intriguing insights into respondin...
PPTX
An evolution of Vscene in action - John Wilson
PPTX
Perspectives on implementing a vision for developing staff digital capability
PPTX
Learning analytics for FE colleges
PPT
Inclusively enhancing learning from lecture recordings: using Synote without ...
PPTX
Making best use of technology for employability: the Jisc employability toolkit
PPTX
An evolution of Vscene in action - Tim Boundy
PPTX
Institutional visions for a digital student experience
PPTX
Increasing student satisfaction by closing the feedback loop
PPTX
Exploiting digital collections in learning, teaching and research
PPTX
Transforming organisational culture
PPTX
Amazon Web Services
Data and information governance: getting this right to support an information...
GDPR: More reasons for information security
Cyber Crime - "Who, What and How"
Role of the CISO in Higher Education
Protecting our customers - BT security
Mitigation starts now
Certifying and Securing a Trusted Environment for Health Informatics Research...
Working with students and ISO27001
Embracing local devolution - two college's intriguing insights into respondin...
An evolution of Vscene in action - John Wilson
Perspectives on implementing a vision for developing staff digital capability
Learning analytics for FE colleges
Inclusively enhancing learning from lecture recordings: using Synote without ...
Making best use of technology for employability: the Jisc employability toolkit
An evolution of Vscene in action - Tim Boundy
Institutional visions for a digital student experience
Increasing student satisfaction by closing the feedback loop
Exploiting digital collections in learning, teaching and research
Transforming organisational culture
Amazon Web Services
Ad

Similar to Information security at University of East London: the benefits (and pitfalls) of a framework approach (20)

PPT
Exeter university ig manager presentation [1]
DOCX
Controls for Information SecurityChapter 88-1.docx
PPT
Start With A Great Information Security Plan!
ODT
Ch.5 rq (1)
PDF
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
PDF
Safe setting competency framework
PDF
Recapitulating the development initiatives of a robust information security s...
PPTX
Building Your Information Security Program: Frameworks & Metrics
PDF
2007 issa journal-building a comprehensive security control framework
PPT
Chapter004
PPTX
Governing Privacy Commons at Pitt Science 2017 - Madison
PPTX
IS Chap 1 by whitman chapter 1 pptx.pptx
PPTX
Information Security Blueprint
PDF
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
PDF
Information Security and GDPR
PPTX
Introduction to Information security ppt
PPTX
Basic Security Concepts JMSupan 2019 Edition
DOCX
BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
PPT
168581476-Critical-Characteristics-of-Information-In-Information-Security.ppt
PPTX
Introduction to Information security ppt
Exeter university ig manager presentation [1]
Controls for Information SecurityChapter 88-1.docx
Start With A Great Information Security Plan!
Ch.5 rq (1)
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Safe setting competency framework
Recapitulating the development initiatives of a robust information security s...
Building Your Information Security Program: Frameworks & Metrics
2007 issa journal-building a comprehensive security control framework
Chapter004
Governing Privacy Commons at Pitt Science 2017 - Madison
IS Chap 1 by whitman chapter 1 pptx.pptx
Information Security Blueprint
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
Information Security and GDPR
Introduction to Information security ppt
Basic Security Concepts JMSupan 2019 Edition
BCJ 4385, Workplace Security 1 Course Learning Outcom.docx
168581476-Critical-Characteristics-of-Information-In-Information-Security.ppt
Introduction to Information security ppt

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
August Patch Tuesday
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
The various Industrial Revolutions .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hybrid model detection and classification of lung cancer
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
Module 1.ppt Iot fundamentals and Architecture
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
OMC Textile Division Presentation 2021.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
Group 1 Presentation -Planning and Decision Making .pptx
A novel scalable deep ensemble learning framework for big data classification...
DP Operators-handbook-extract for the Mautical Institute
The various Industrial Revolutions .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
observCloud-Native Containerability and monitoring.pptx
Architecture types and enterprise applications.pdf
Web App vs Mobile App What Should You Build First.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hybrid model detection and classification of lung cancer
cloud_computing_Infrastucture_as_cloud_p
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Hindi spoken digit analysis for native and non-native speakers
Module 1.ppt Iot fundamentals and Architecture

Information security at University of East London: the benefits (and pitfalls) of a framework approach

  • 1. Information security at University of East London: The benefits (and pitfalls) of a framework approach Craig Clark- Information Security and Compliance Manager Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 111/11/2016
  • 2. » Involved in information security at UEL since 2014 – previous experience in facilities management and insurance sectors » Not a traditional techie – background in social engineering, forensic science and risk management » Mandate covers implementing a ‘security culture’ » Certified ISO27001 lead implementer and GDPR practitioner About me 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 2
  • 3. » Sensitive data across multiple systems with multiple owners » No consistent information governance methodology for classification and retention » ‘Best efforts’ approach from within IT but no formal information security strategy at vice chancellor and governor level » No full time post for information security » Fragmented approach information sharing The UEL information security quandary – Previously: 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 3
  • 4. » Embeds governance, responsibility and accountability values - protection at the front door » A ‘one stop shop’ for information security and governance » A mechanism to implement the CIA triad consistently across the institution » Allows for information security to align with strategic goals » The framework aligns with controls outlined for an ISO27001 ISMS » Allows for a systematic approach to risk What is an information security framework in a UEL context? 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 4
  • 5. 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 5 Policy Signposting and awareness Procedures Processes Auditable evidence
  • 6. Mandatory » Data protection/GDPR » Freedom of Information » Copyright » Intellectual Property » Janet network » Prevent » PCI-DSS Information security policy Supporting policies » Acceptable use » Antivirus and malware » Cloud services » Social media » Data retention » Data classification » Access management policy 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 6
  • 7. » Updated to reflect evolving risk landscape especially Prevent and GDPR » Modeled on Janet network/UCISA policies and toolkits » For UEL it requires backing at governor level – takes time to get through various committees » Needs Union involvement to feed in to disciplinary process for staff breaches » Communication and accountability across all levels is vital Policies 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 7
  • 8. » Multiple modes of delivery (intranet, internal communications, eLearning, workshops and Lynda.com) » Dedicated workshops tailored to business function (research, service desk etc) » Dedicated intranet site aimed at highlighting good information security practices at work and at home » Information security incorporated into risk management strategy and various sub-committees Signposting and awareness 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 8
  • 9. » Covers the who, what, where when and how » Many procedures and processes exist as ‘business as usual’ activities – but documentation is key to improve the amount of auditable evidence » Where processes and procedures are widely applicable they must be highly visible and people should be able to suggest improvements » Information sharing agreements and internal audit results should be held outside the affected department – ideally by governance Procedures and processes 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 9
  • 10. » Framework allows for increased output of auditable evidence » Several audit templates available » ICO has published high level audit areas » Cloud SecurityAlliance » GDPR likely to impact on evidence requirements Auditable evidence 11/11/2016 Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 10
  • 11. Conclusions » The framework is an evolving, flexible process » Final version will include new GDPR processes, policies and procedures » Buy in from the vice chancellor and governor has been vital » It’s a long road! » There has been resistance from some business units and academics but overall positive experience Information Security at University of East London: The Benefits (and Pitfalls) of a Framework Approach 11