elevating security awareness - eab.com · pdf fileball state university ... higher education...

22
eab.com IT Forum Elevating Security Awareness Updates on IT Forum Research

Upload: haque

Post on 14-Mar-2018

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

eab.com

IT Forum

Elevating Security Awareness Updates on IT Forum Research

Page 2: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

2

©2014 The Advisory Board Company • eab.com

The IT Forum

100 Members and Growing

Armstrong State University

Ball State University

California State University,

Dominguez Hills

California State University, Fullerton

California State University,

Northridge

Carnegie Mellon University

Central Michigan University

College of William & Mary

Colorado State University

Dartmouth College

East Carolina University

Eastern Illinois University

Eastern Kentucky University

Elon University

Gallaudet University

Georgia College and State University

Georgia State University

Indiana University

Lafayette College

Longwood University

Louisiana State University

University of Alabama

University of Alabama at Birmingham

University of Alberta

University of Arkansas

University of British Columbia

University at Buffalo

University of California, Berkeley

University of California, Davis

University of Cincinnati

University of Colorado, Boulder

University of Connecticut

University of Florida

University of Georgia

University of Guelph

University of Kentucky

University of Massachusetts System

University of Memphis

University of Michigan

University of Nevada, Las Vegas

University of New Hampshire

University of North Carolina,

Charlotte

University of Oregon

University of Pittsburgh

University of Rochester

University of Saskatchewan

University of South Carolina,

Columbia

University of South Florida

University of Texas at Arlington

University of Texas at Tyler

University of Toronto

University of Utah

University of Wisconsin, Madison

University of Wisconsin, Milwaukee

University of Wisconsin, Stout

Virginia Polytechnic Institute and

State University

Washburn University

Washington State University

Washington University

Webster University

Western Illinois University

West Virginia University

Winthrop University

McGill University

Metropolitan State University of

Denver

Northern Arizona University

Northern Kentucky University

Old Dominion University

Oregon State University

Pepperdine University

Prairie View A&M University

Purdue University

Queen’s University

Ryerson University

San Jose State University

Southern Illinois University at

Carbondale

Southern Polytechnic State

University

Stony Brook University

Syracuse University

Tennessee Technological University

The George Washington University

Towson University

Tulane University

Page 3: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

3

©2014 The Advisory Board Company • eab.com

Topics at the Top of Your Agenda

Framing the Security Research

Formalizing Security Governance

Sizing risks across campus

Prioritizing remediation and education

Embedding risk in existing workflows

Student

Success

Road Map

Transforming

Administrative

Services

Rightsizing

Security

Strategy

Data-Driven

Enterprise

Elevating Security Awareness

Executive and end-user communications

Refining message channel and content

Incenting unit engagement and accountability

Page 4: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

4

©2014 The Advisory Board Company • eab.com

4 Resources for Members

3 Unit Leadership Awareness: Benchmarking

Unit-Level Security with Scorecards

2 End User Awareness: Lessons Learned from

Self-Phishing Campaigns

Roadmap for This Presentation

1 A Renewed Focus on Security Awareness

Page 5: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

5

©2014 The Advisory Board Company • eab.com Source: EAB Interviews and Analysis

Higher Education Uniquely Difficult to Secure

How Do We Protect an Institution Designed for Openness?

Determined to Stay “Free”

“Higher ed is by design focused on transparency,

with as few restrictions as possible to information

sharing. The bedrock mindset tilts toward

academic freedom.”

CIO, Regional Masters University

Openness = Academic Freedom + Shared Governance

Hundreds of

Autonomous Units

Wide Range of

IT Literacy Few Enforcement

Mechanisms

Uniquely Risky

“Higher education is one of the most heavily

regulated industries in the U.S.- and it has more

risk-producing constituencies than almost any

other industry.”

Leta Finch, Aon Risk Management Services

Constantly Changing Users Profoundly Decentralized

Collaborative Research

Around the Globe

New Students,

New Devices

Page 6: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

6

©2014 The Advisory Board Company • eab.com

Source: Corman and Etue, Adversary ROI: Why Spend $40B Developing It, When You

Can Steal It for $1M?, RSA Conference 2012

Higher Ed: A Data-Rich “Soft Target”

Middle-Tech Adversaries See Broad Range of Vulnerable Assets

Adversary

ROI

“Adversaries don’t

care about your

ROI - they care if

they can get a

return from

investment on an

attack”

Josh Corman

and David Etue

Deterrence

% Chance ×

$ Cost of Capture

= × − Attack Value

$ Data Value −

$ Attack Cost

“Ten Industries

in One”

Banking Healthcare

Tech R&D Facilities

Higher Ed Inviting to Middle-Tech Adversaries

Success

Probability

% Chance of Success

Hard to Track

Vulnerabilities

Research Email

Mobile Vendors

Page 7: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

7

©2014 The Advisory Board Company • eab.com

Simple User Errors Prevalent

Source: Privacy Rights Clearinghouse

More Than Our Share of Preventable Breaches

Problems Caused by Lax Security Hygiene Twice as Prevalent in Higher Ed

Percentage of Total Breaches in Higher Education vs. All Other Sectors (2005-2014)

Only as Secure as Our People

“The reality is, someone who’s negligent or naïve about

information security can defeat 95 percent of the technology

barriers and protections that you put around them.”

CISO, Public Masters University

Unintended

Disclosure

Hacking and

Malware

Portable Device Insider Theft Payment Card

Fraud

Stationary

Device and

Physical Loss

17%

25%

12% 18%

3%

14%

1% 2%

Higher Education

All Other Sectors

38%

23%

30%

16%

Not patching software

Unencrypted email

Downloading programs

Phishing response

“Unhygienic” Behaviors

Page 8: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

8

©2014 The Advisory Board Company • eab.com

Source: http://yaledailynews.com/blog/2010/09/02/new-its-mascot-hooks-freshmen/

Source: https://www.behance.net/gallery/1030407/Anti-Phishing-Posters-for-Yale-2010

The Limitations of Security Awareness As Marketing

Cleverest Cues Catch the Eye, But Don’t Really Educate

Not-Uncommon University Security Messaging

Dehydration?

From IT, Not Managers

Matters to central admin, not unit

or personal goals

“What” >> “Why Me?”

Actions are concrete,

risks are abstract

Relies on Entertainment,

Shock Value, and Ubiquity

To which end-users get

desensitized

Page 9: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

9

©2014 The Advisory Board Company • eab.com

S

A

T

U

R

A

T

I

O

N

Source: EAB Interviews and Analysis

The Predictable Fate of Security-As-Campaign

Diminishing Returns to Mass-Marketing Awareness Themes

Relaunch

High

Low

Launch Security Campaign

Security

Flyers

“What’s

NCSAM?”

Users Don’t

Internalize Motivation

Communication

Doesn’t Reach All

End-Users

Desensitized to

External Cues

Students and

Staff Turn Over

“Louder”

Message Needed

Selling What

They Don’t Want

to Buy

“A process where ‘I

sell, and you buy’, is

not commitment,

since selling means

persuading people

to do something

they would not do

knowing all the

facts.”

Peter Senge,

The Learning

Organization

Email

Reminders Impact on

End-Users

Page 10: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

10

©2014 The Advisory Board Company • eab.com

What We Have Learned from Members

Renewing Our Focus on Cybersecurity Awareness

Time to Move Forward

“You don’t see Student

Affairs doing it by just

putting up posters and

putting videos on the

website… It’s much more

intentional, the messaging

is more targeted, and

they’re trying to engage

students in peer

discussions where they

live and communicate. If

we were really to go after

this, that’s the playbook

we ought to use.”

CIO, Public

Research University

Current Trainings Check a Necessary Box,

Don’t Do Enough to Elevate Awareness

The Standard Playbook of Posters, Videos,

and NCSAM Events Was a Good Start- But It

Won’t Solve Deeper Problems

How Can CIOs Better Use the Tools and

Resources at Their Disposal to Increase

Attention and Awareness of Constituents?

Page 11: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

11

©2014 The Advisory Board Company • eab.com

Source: Lori McElroy and Eric Weakland, Measuring the Effectiveness of Security Awareness Programs, EDUCAUSE

2013, http://www.educause.edu/library/resources/measuring-effectiveness-security-awareness-programs

Relying On “Reach” Because “Relevance” Is Hard

Typical Security Campaigns Push One-Size-Fits-All Messages

14%

15%

12%

26%

32%

51%

54%

57%

Role-Based Training

Customized Workshops

Social Media

Instructor Training

Awareness Month

E-mail Reminders

Website

Online Training

Only 1 in 7

customizing

messages

Push

Messages

Standard

Training

Little Impact

Relevance to work

Professional and personal networks

Few Institutions Investing in Tailored Awareness Education

Preferred communication channel

Page 12: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

12

©2014 The Advisory Board Company • eab.com

Self-Phishing

Demonstrating Personal Vulnerability

Self-Phishing Shows End Users They Are At Risk

CIO approves IT security idea to

self-phish staff based on success

at other schools. The template is

sent to internal or phishing vendor

staff for feedback.

Phishing email is delivered

to targeted student or staff

sample. The email is

designed to bypass the

university’s spam filters.

Recipients who succumb and

enter passwords are directed to

a page with a video that

educates them about phishing

emails.

Recipients who click

on the link go to a

landing page that

requests user names

and passwords

Simulation Creation Email Distribution Education Delivery Behavior Test

Page 13: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

13

©2014 The Advisory Board Company • eab.com

Self-Phishing

Source: http://www.eab.com/research-and-insights/it-

forum/studies/2014/driving-phishing-awareness

Great in Theory, Distracting in Practice

CISOs Hesitant to Self-Phish Due to Distraction and Hard Feelings

Account

Verification

Needed

Direct

Deposit

Update

Required

Email

Account

Hacked

“Stealth” Self-Phishing Courts Time-Consuming Confusion

“I got phished. Am I in trouble?”

Manager

“Here’s the data you requested”

Vendor

“Did I get a raise?”

HR

“Do I need a password reset?”

IT Help Desk

Page 14: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

14

©2014 The Advisory Board Company • eab.com

Self-Phishing

Source: http://www.eab.com/research-and-insights/it-

forum/studies/2014/driving-phishing-awareness

Best Self-Phishers’ Biggest Lesson: Pre-Wire

Targeted Preparation Maximizes Campaign Benefits at Eastern Michigan

Prior to Campaign After Go-Live

Managers

When campaign

begins and why

it’s worthwhile

Users

No penalties

associated with

falling for phish

Services

Expect call

volume to

increase

Help Desk

Scripted to

explain

campaign goals

“You’ve Been Phished”

Instant Notification

If reply to email

Non-Punitive

Manager won’t know

Reinforce Policy

We never ask credentials

Link to Trainings

Online Modules

Page 15: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

15

©2014 The Advisory Board Company • eab.com

Self-Phishing

Source: http://www.emich.edu/it/security/initiatives/cybersac/reports/summary_report.pdf

Source: http://www.eab.com/research-and-insights/it-forum/studies/2014/driving-phishing-awareness

Moving in the Right Direction

Raising Awareness Through Fake Phishes Lowers Real Account Losses

Students and Faculty Better Prepared After Being Self-Phished

Accounts Compromised per Month

Rocky Jenkins

IT Director, EMU

Hug-Worthy?

“One colleague walked

up to me outside and

hugged me. She said

she thought she was

insulated from phishing

attacks and understood

them, until she got

caught.”

0

40

80

Dec 2012 June 2013 Dec 2013

Student

Employee

Page 16: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

16

©2014 The Advisory Board Company • eab.com

Security Scorecards

Note: Risk categories are illustrative only.

Making the Most of Required Board Reporting

Ohio State Uses Security “Heat Map” to Build Unit-Level Risk Awareness

Campus Security Survey

Access to protected data for unit staff

meets university role recommendations

All new hardware and software

vendor contracts approved by CISO

We have a process to identify and meet

requirements of new compliance rules

3

2

5

Finance Dean IT

How Are We Doing?

• 160 “auditable” units

• 30 risk categories, 100 self-ratings

• Academic, business, and IT

directors must sign off

A Bottom-Up Summary of Risks and Recommendations for Board

0

5

Information Security Heat Map (illustrative)

Perfect

Nothing

Access to

Protected Data

Incident

Response Plan

Vendor Security

Controls

No Action Educate Outliers Systemic Fix

Existing controls

working well for

most units

Units lacking plans

write or receive

plan from IT

New process for

auditing third-party

data protection

Page 17: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

17

©2014 The Advisory Board Company • eab.com

Security Scorecards

Note: Risk categories are illustrative only.

No One Wants to Be Last

Scorecards Show How Units Fare Relative to Local Peers and Overall Norms

Department Security Scorecard

Your Unit Units Like You Institution

Data Management

Information Classification

Archiving and Destruction

Incident Management

Response Leaders

Business Continuity

Applications and Devices

Malicious Software Monitoring

Mobile Development

4.3

3.5

3.6

3.8

3.2

2.9

1.5

3.2

3.6

3.1

2.7

2.8

2.8

2.1

2.9

2.4

3.1

3.2

Are We Improving? Longitudinal trends show correction

of identified risks

Are We Lagging Peers? Humanities with humanities, STEM

with STEM, administrative with

administrative

Are We Far Outside Norms? Units and peers lagging reasonable

“hygiene” security expectations

Annual Awareness Briefings

Page 18: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

18

©2014 The Advisory Board Company • eab.com

Security Scorecards

Source: EAB Interviews and Analysis

Visibility Sustains Engagement

Units More Proactive Knowing Others Besides IT Are Watching

Board Scrutiny Commands Campus Attention

Helen Patton

CISO at Ohio State University

100% Participation

“We told units we couldn’t

force them to participate in the

surveys and scorecarding, but

we’d report on who wasn’t

participating to the trustees.

No one wants to be the

department in front of the

board for not playing ball.”

Units Coming to “Own” Risk Identification

Security Consultation

Requests

Asset Tracking

Initiate tracking of devices

under $5,000

Incident Response Plans

Import existing roles and

policies from similar unit

Vendor Screening

Procurement vets data for

data security in RFP

process

100

300

2012 2014

CISO “Teach-In” Attendance

Scorecard Introduced

Page 19: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

19

©2014 The Advisory Board Company • eab.com

How Can We Elevate Security Awareness?

The Destination Remains Clearer than the Path for Most

Today Future

Awareness Effort Reactive Notification Proactive Risk Education

Message What to Do Why It’s Worth Doing

Consequence Institutional Threat Unit, Personal Mission

Coming From IT Department Managers and Colleagues

Source of Impact Ubiquitous Cues Personal Relevance

Motivation External, Temporary Intrinsic, Sustained

Strategy Campaign, Single Message Tailored, Embedded in Work

Page 20: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

20

©2014 The Advisory Board Company • eab.com

What to Watch For

Related Meetings and Deliverables

Today Q1 2015 Q2 2015

Presentation on

elevating campus

security awareness

Best practice

publication printed

New security research

and services

Templates for

communication

Breach toolkit,

phishing white paper

Further meetings with

CIOs (January and

February)

Leadership meeting

for key nominated

delegates (March)

Onsite presentation

available

Continuing

engagement series of

implementation-

focused conference

calls (for CIOs and

CISOs)

Page 21: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

21

©2014 The Advisory Board Company • eab.com

Contact Information for IT Forum Team Members

Thank You

[email protected]

202-568-7483

Laura Foster Whitaker

Practice Manager

EAB Strategic Research

[email protected]

202-266-6235

Ben McGuire

Analyst

EAB Strategic Research

Education Advisory Board

Website

www.eab.com

Open to all members of your

institution with an @___.edu or

@____.ca email address

Page 22: Elevating Security Awareness - eab.com · PDF fileBall State University ... Higher Education Uniquely Difficult to Secure ... RSA Conference 2012 Higher Ed: A Data-Rich “Soft Target

22

©2014 The Advisory Board Company • eab.com

Toolkit and Case Study

Existing Security Research

IT Breach Preparation and

Response Toolkit

Guidance on necessary preparation and

planning steps to lay the groundwork for

timely, effective, and efficient data breach

response.

Forum: IT Forum

Audience: CIOs and CISOs

Year: 2014

Learn How To:

– Expedite Breach Response

– Reduce the Cost of Breach and

Response

– Minimize Risk to Institution

– Protect Institutional Reputation

Driving Phishing Awareness

Across Campus

Case studies of the creative approaches to

raise awareness of phishing and eliminate

constituent feelings of immunity through

education and phishing simulations.

Forum: IT Forum

Audience: CIOs and CISOs

Year: 2014

Learn How To:

– Raise awareness through blogs

and education dedicated to

phishing vulnerability

– Create self-phishing campaigns

that target your most vulnerable

constituents without incurring

backlash