SlideShare a Scribd company logo
UNIVERSITY
OF
CALIFORNIA
Security&PrivacyinPractice
UNIVERSITY
OF
CALIFORNIA
UNIVERSITY
OF
CALIFORNIA
Higher security posture; e.g. HIPAA, CUI rely on guidelines from NIST, involves implementation of
technical, administrative and physical controls
Overhead in securing and managing sensitive data
Security: Vulnerability Mgmt., Log Management, AV/Malware Protection, IDS/IPS, VPNs/Firewalls,
Management: Account Mgmt., Configuration Mgmt., Monitoring, Backup/Archiving, etc.
Policies: Security Plan, Contingency Planning, Incident Response, Risk Assessment
DevOps teams to build, security teams needed to define control requirements, then audit
Cloud platforms offer shared responsibility model, i.e., “security of the cloud + security in the cloud”
Customers manage/secure application layers, which comes with associated costs and complexity
PROTECTEDDATARESEARCHINVOLVES
UNIVERSITY
OF
CALIFORNIA
Decide if you want a large capital expense (on-prem) or an ongoing operating
expense (cloud based)
Specific use cases or regulatory requirements (e.g. ITAR) may also influence
decisions on what to build/use
Managing a compliant environment comes with a certain cost
(people+infrastructure+licensing), but nobody wants to pay for it
Researchers want institutions to provide a campus service, campus IT wants
researchers to pay for it
Sustainability comes from economies of scale, also by not duplicating capability
across multiple units within an organization
THEBUSINESSOFRUNNINGASECUREHOSTINGCAPABILITY
UNIVERSITY
OF
CALIFORNIA
Learning curve of working in a secure environment (security over usability)
Cloud security is improving, ecosystem of services/micro-services, scaling, automation
Runaway costs if not managed well, data egress charges (low for protected data)
Containers everywhere, but how can you secure them?
Physical scientific equipment with protected data, end-point workstation security
We are moving away from standard architectures to more of a serverless architecture
Making commonly used tools like Jupiter Notebooks, GPU compute, RStudio, etc. should be
made available as turnkey platforms in a secure cloud
Bottomline, Make cloud services secure, easy to consume (managed) and keep costs down
EVOLUTIONOFPROTECTEDDATASERVICES
UNIVERSITY
OF
CALIFORNIA
Organizations have to educate researchers so they care about security, provide
information & tools, financial support, etc.
Researchers have to accept the new norm that if you are dealing with protected data, it
comes with a certain overhead
Partnership between researchers, contracts & grants, export control, campus IT and MSP
Cybersecurity training should be part of academic curriculum
If grant work involving protected data generates significant revenue (IDC), then institutions
should fund an operational capability for researchers to use
The need, and requirements, for data and privacy protection are only increasing, we need
to adapt to this change
OTHERTHOUGHTS…

More Related Content

PPTX
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
PPTX
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
PPTX
Managing Complexity in a World of Surprise David L. Alderson, PhD
PPT
Cyber Security Isaca Bglr Presentation 24th July
PDF
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
PDF
TAROT2013 Testing School - Antonia Bertolino presentation
PDF
Berzinski Writing Sample7-091023
PDF
IRJET- Big Data Privacy and Security Challenges in Industries
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
Managing Complexity in a World of Surprise David L. Alderson, PhD
Cyber Security Isaca Bglr Presentation 24th July
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
TAROT2013 Testing School - Antonia Bertolino presentation
Berzinski Writing Sample7-091023
IRJET- Big Data Privacy and Security Challenges in Industries

What's hot (20)

PDF
From principles to action: A method for ethically aligned AI design and imple...
PPT
Poster nci 2010
PDF
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
PDF
Trustworthy Computational Science: A Multi-decade Perspective
DOCX
Securing Wearable Device Data
PPTX
Interoperability, Standards and Cybersecurity: A Business Perspective
PPTX
Ethics, Professionalism and Other Emerging Technologies
PDF
Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية
PDF
CACR Overview
PDF
Cybersecurity with AI - Ashrith Barthur
PDF
IoT Research & Education at LNU
PPT
Threat landscape 4.0
PDF
Strategy for Holistic Security
PPT
Exploring New Methods for Protecting and Distributing Confidential Research ...
PDF
Control in Cyber-Physical Systems
PDF
Research and Testbeds in Cyber-Physical Systems
PPT
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PDF
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PDF
Inventory of IoT slide sets
PDF
Security in Cyber-Physical Systems
From principles to action: A method for ethically aligned AI design and imple...
Poster nci 2010
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Trustworthy Computational Science: A Multi-decade Perspective
Securing Wearable Device Data
Interoperability, Standards and Cybersecurity: A Business Perspective
Ethics, Professionalism and Other Emerging Technologies
Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية
CACR Overview
Cybersecurity with AI - Ashrith Barthur
IoT Research & Education at LNU
Threat landscape 4.0
Strategy for Holistic Security
Exploring New Methods for Protecting and Distributing Confidential Research ...
Control in Cyber-Physical Systems
Research and Testbeds in Cyber-Physical Systems
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
Inventory of IoT slide sets
Security in Cyber-Physical Systems
Ad

Similar to Panel 3: Security and Privacy in Practice (20)

PPTX
Cloud_Security.pptx
PDF
SECURE CLOUD ARCHITECTURE
PDF
Research Report on Preserving Data Confidentiality & Data Integrity in ...
PDF
(Pdf) yury chemerkin _ita_2013 proceedings
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
PDF
Cloud Computing Security - Cloud Controls Security
PDF
out of the topics listed below which will be the best one fo.pdf
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
PDF
Assurance of Security and Privacy Requirements for Cloud Deployment Model
PDF
A Survey of Cloud Computing Security Issues and Consequences
PPTX
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
PDF
10-ways-the-dissolving-perimeter-kills-IT
PDF
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
PDF
Cloud Data Protection for the Masses
PDF
B018211016
PDF
Cloud Security POV_Final (by KM)
DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
PDF
Securing Nuclear Facilities
Cloud_Security.pptx
SECURE CLOUD ARCHITECTURE
Research Report on Preserving Data Confidentiality & Data Integrity in ...
(Pdf) yury chemerkin _ita_2013 proceedings
Investigative analysis of security issues and challenges in cloud computing a...
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
Cloud Computing Security - Cloud Controls Security
out of the topics listed below which will be the best one fo.pdf
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Assurance of Security and Privacy Requirements for Cloud Deployment Model
A Survey of Cloud Computing Security Issues and Consequences
Top reasons why Endpoint Security should move to Cloud | Sysfore
10-ways-the-dissolving-perimeter-kills-IT
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Cloud Data Protection for the Masses
B018211016
Cloud Security POV_Final (by KM)
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Securing Nuclear Facilities
Ad

More from PacificResearchPlatform (12)

PPTX
Hybridizing Kubernetes and HPC securely - Pavan Gupta
PPTX
Securing Research Data - David Rusting
PPTX
PRP Distributed Kubernetes Cluster
PPTX
AstroGANS - David Reiman
PPTX
Autoencoding RNN for Inference on Unevenly Sampled Time-series data - Josh Bloom
PPTX
NERSC, AI and the Superfacility, Debbie Bard
PPTX
RESEARCH CYBERINFRASTRUCTURE Jeff Weekly
PPTX
Deep Learning Applied to Galaxy Evolution: Identifying and Characterizing Sta...
PPTX
Fast and Automated Analysis of Interferometric Images of Strong Gravitational...
PPTX
NERSC, AI and the Superfacility, Debbie Bard
PPTX
Deep Learning of Astronomical Spectroscopy, J. Xavier Prochaska
PPTX
Stanford/SLAC Cryo-EM Computing and Storage, Yee-Ting Li
Hybridizing Kubernetes and HPC securely - Pavan Gupta
Securing Research Data - David Rusting
PRP Distributed Kubernetes Cluster
AstroGANS - David Reiman
Autoencoding RNN for Inference on Unevenly Sampled Time-series data - Josh Bloom
NERSC, AI and the Superfacility, Debbie Bard
RESEARCH CYBERINFRASTRUCTURE Jeff Weekly
Deep Learning Applied to Galaxy Evolution: Identifying and Characterizing Sta...
Fast and Automated Analysis of Interferometric Images of Strong Gravitational...
NERSC, AI and the Superfacility, Debbie Bard
Deep Learning of Astronomical Spectroscopy, J. Xavier Prochaska
Stanford/SLAC Cryo-EM Computing and Storage, Yee-Ting Li

Recently uploaded (20)

PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Database Infoormation System (DBIS).pptx
PDF
.pdf is not working space design for the following data for the following dat...
PDF
Lecture1 pattern recognition............
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
Computer network topology notes for revision
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
annual-report-2024-2025 original latest.
PDF
Business Analytics and business intelligence.pdf
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Database Infoormation System (DBIS).pptx
.pdf is not working space design for the following data for the following dat...
Lecture1 pattern recognition............
Introduction to Knowledge Engineering Part 1
IBA_Chapter_11_Slides_Final_Accessible.pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Computer network topology notes for revision
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
Qualitative Qantitative and Mixed Methods.pptx
climate analysis of Dhaka ,Banglades.pptx
ISS -ESG Data flows What is ESG and HowHow
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Acceptance and paychological effects of mandatory extra coach I classes.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
annual-report-2024-2025 original latest.
Business Analytics and business intelligence.pdf

Panel 3: Security and Privacy in Practice

  • 2. UNIVERSITY OF CALIFORNIA Higher security posture; e.g. HIPAA, CUI rely on guidelines from NIST, involves implementation of technical, administrative and physical controls Overhead in securing and managing sensitive data Security: Vulnerability Mgmt., Log Management, AV/Malware Protection, IDS/IPS, VPNs/Firewalls, Management: Account Mgmt., Configuration Mgmt., Monitoring, Backup/Archiving, etc. Policies: Security Plan, Contingency Planning, Incident Response, Risk Assessment DevOps teams to build, security teams needed to define control requirements, then audit Cloud platforms offer shared responsibility model, i.e., “security of the cloud + security in the cloud” Customers manage/secure application layers, which comes with associated costs and complexity PROTECTEDDATARESEARCHINVOLVES
  • 3. UNIVERSITY OF CALIFORNIA Decide if you want a large capital expense (on-prem) or an ongoing operating expense (cloud based) Specific use cases or regulatory requirements (e.g. ITAR) may also influence decisions on what to build/use Managing a compliant environment comes with a certain cost (people+infrastructure+licensing), but nobody wants to pay for it Researchers want institutions to provide a campus service, campus IT wants researchers to pay for it Sustainability comes from economies of scale, also by not duplicating capability across multiple units within an organization THEBUSINESSOFRUNNINGASECUREHOSTINGCAPABILITY
  • 4. UNIVERSITY OF CALIFORNIA Learning curve of working in a secure environment (security over usability) Cloud security is improving, ecosystem of services/micro-services, scaling, automation Runaway costs if not managed well, data egress charges (low for protected data) Containers everywhere, but how can you secure them? Physical scientific equipment with protected data, end-point workstation security We are moving away from standard architectures to more of a serverless architecture Making commonly used tools like Jupiter Notebooks, GPU compute, RStudio, etc. should be made available as turnkey platforms in a secure cloud Bottomline, Make cloud services secure, easy to consume (managed) and keep costs down EVOLUTIONOFPROTECTEDDATASERVICES
  • 5. UNIVERSITY OF CALIFORNIA Organizations have to educate researchers so they care about security, provide information & tools, financial support, etc. Researchers have to accept the new norm that if you are dealing with protected data, it comes with a certain overhead Partnership between researchers, contracts & grants, export control, campus IT and MSP Cybersecurity training should be part of academic curriculum If grant work involving protected data generates significant revenue (IDC), then institutions should fund an operational capability for researchers to use The need, and requirements, for data and privacy protection are only increasing, we need to adapt to this change OTHERTHOUGHTS…