CISObsessed –
Your Weekly CISO Blog
Dear all,
Welcome to a new post on the CISO Cytroy Cyber Blog! As the Chief
Information Security Officer of this University, CISO in short, I thought I
should introduce myself, my role and the
role of my department and explain the importance of Cyber Security in the life
of our University.
My name is John Doe and I am responsible for the design and
implementation of the information strategy for the University operational
activities.
In practical terms, it means that I devise a risk-based approach to managing information
security risk, while also driving and shaping the risk attitude of departments
and users within the University. In my job, I also lead information security
activities, mitigating risk to our IT facilities which may come under threats from both internal and external sources. To do this in a comprehensive manner, I
develop the overall security governance framework for us, including appropriate
security controls, policies and procedures and advise our University governing
bodies on the most efficient ways of their implementation and on-going
verification.
This is a job of constant vigilance and instant, active
response – it keeps us on our toes and forces us every day to try and improve
and expand our cyber security skills. I
hope this sounds interesting to you all!
The cyber operational reality drives our operational primary objective: to develop organisational level security strategies that are both flexible and adaptable, making them easily modifiable when the risk environment changes (it’s super dynamic and volatile). Traditionally, my role mostly included identifying information assets and applying corresponding preventative security measures, which were defined with clear boundaries. However, since the field of Cyber has expanded and evolved, boundaries have been changed with regards to technologies and trends making the access threat and sensitive information leakage a constant, on-going concern.
In my job, it is important to take a holistic view of
things, and take into account both the human aspects of Information Security,
as well as a proper business and operational context of our University. Human psychology, human approach to data and
information, human ways of making cyber mistakes are all important aspects to
be considered jointly with the data operational context - taking both into account allows us to manage cyber
risks from technological, user and business/operational standpoint. In fact,
most cyber security incidents I work with point to the fact that traditional
cyber security solutions might be skewed towards a system view, meaning that
they don’t support the long-term orientation of the organisation in the
holistic sense, and lack alignment with the user profile and/or business/operational
objectives. We are working actively to improve this.
Let me now introduce my cyber security team and explain how
we can all work together to contribute to high degree of cyber security in our
working environment. I hope that when
all our students are familiar with those
who work ‘behind the scenes’ to ensure the university is a safer place to
operate you will be able to work actively with us, reporting incidents and
helping us to put in place effective cyber security procedures.
Firstly, let me introduce Joe Bloggs, our Security Officer.
He reports directly to me and works on identifying vulnerabilities in our
network. He is responsible for developing and implementing effective plans to
secure our network while also monitoring network usage to make sure it complies
with security policies that we have in place. He keeps up to date with
developments in the cyber security field and any newly identified threats – he
also performs penetration tests to check how secure our networks are. If there are any network breaches, he will
document them, while also collaborating with us and educating his colleagues
about security practices and software.
Steve Jobs is our Security Consultant. He also reports to
me, and is responsible for protecting sensitive data within our network. His
responsibilities involve determining efficient strategies to protect our infrastructure,
data and information systems against any cyber risks. Steve performs threat analysis and system
checks, defining and updating cyber security criteria and validation procedures
while also meeting with other IT departments to fix safety problems and estimating
costs for our project teams. He’s definitely a busy guy!
Sasha Sloane, our Cyber Security Manager, who plans and
implements security measures on systems and networks, while also establishing
security policies and procedure and training staff on proper use of systems.
She also monitors the systems for any security gaps, design effective solutions
and provides reports. Her additional
responsibilities include running risk assessments, testing data processing
systems and designing firewalls. Her calm and collected demeanour are her
secret weapons in dealing with any cyber security threats quickly and
efficiently.
Working with Sasha, we have a team of Cyber Security
Technicians/Engineers who all work together to fix and protect systems from
data threats by staying ‘in the know’ with the latest tech developments. They
work together with our talented IT teams to create an emergency arrangement so
our systems recover fast in case they are taken down by an attack. They work
365 days a year, around the clock, as our cyber security defence response!
To help us in our daily job, our department is lucky enough
to also have a team of amazing Security Administrators who are your day-to-day
system managers – they run the systems on a daily basis! They are also the best
point of contact for issues such as setting up new accounts, increasing or
reducing permissions for existing accounts or even managing user information
and roles. They also help to brief us as management on current/emerging
security threats.
Last but not least, we have a great team of Security Staff
that support all these other roles in their jobs, to provide manpower and
ideas!
Following from this brief introduction of our department,
let me say a few words about the importance of what we do. As October was Security Awareness Month, I would
like to focus on the significance of Cyber Security for Universities as a
whole. Unfortunately, rapid and dynamic technological developments have been
leading to increased cyber security attack rates developments This means cybercrime
is now considered as a considerable operational and business risk to us.
Although we are confident that we have a good grasp of what is going on, our
system is open, permissive and highly distributed which means we have loads of
users and even more data / sensitive information to deal with!
This brings me to another important topic in the world of
university risk: GDPR. All universities must comply with the General Data
Protection Regulation (GDPR) which came into force on the 25th of
May 2018, replacing the Data Protection Act of 1998. Crucially, for GDPR
compliance, we must perform many additional tasks. Firstly, we must supply all
staff and students with updated privacy information on how we use your data.
This affects my role as CISO because I have to take into consideration how we
might use data, and also what security policies we need to enforce to ensure it
is protected wherever it is used. We also have to make sure our records are
kept appropriately (GDPR insists that data is not kept longer than necessary)
which means I have to confer with my colleagues on an appropriate data disposal
policy to make sure it is truly removed from our systems with no possibility of
recovery. This carries a lot of risk and is a key part of what I do.
We also need to make our staff and research personnel aware
of the new guidance on research data management - through relevant
communication campaigns and training. GDPR heightens the importance of good
data handling, therefore we must educate researches on the best practice for
personal data collection, handling, security and sharing (which includes the
use of anonymisation techniques!). We also have introduced a Data Protection
Impact Assessment for certain projects to minimise privacy risk to
participants.
We have also had to review our Departmental Data Protection
Policies (DPA) to make sure they comply with GDPR. Furthermore, we have now only one Data
Protection officer who follows GDPR legislation to carry out their role.
We have reviewed our supplier arrangements with data
processors and set a policy in place to make sure our contractual obligations
have been described in greater detail while also complying with GDPR.
Finally, we have set
out newer and improved security policies to manage personal data to ensure its
confidentiality, integrity and identity. This was set out under the DPA,
however it required more detailed amendment to comply with the requirements of
GDPR. We have also introduced a
procedure for certain types of data breach which need to be reported to the ICO
(Internal Comms Officer) within 72 hours – this is a failsafe policy!
Please feel free to contact me as well as any member of the
cyber security department with any questions– john.doe@uniofcytroy.ac.uk extn
19058.
John Doe
Useful links and documents to look at! (Harvard referenced for your uni convenience):
Cambridge University
(2017). UNIVERSITY OF CAMBRIDGE GDPR DATA PROTECTION WORKING GROUP.
Field Engineer. (n.d.). Data
Security Administrator Job Duties. [online] Available at:
https://www.cybersecurityeducationguides.org/information-security-administrator/
[Accessed 20 Nov. 2020].
Floridatechonline.com.
(2020). Cyber Security Manager Guide. [online] Available at:
https://www.floridatechonline.com/blog/information-technology/cybersecurity-manager-career-guide/#:~:text=Cybersecurity%20managers%20accomplish%20their%20responsibilities
[Accessed 20 Nov. 2020].
Itgovernance.co.uk.
(2016). Cyber Security for Universities. [online] Available at:
https://www.itgovernance.co.uk/cyber-security-for-universities [Accessed 20
Nov. 2020].
Maynard, S.B., Onibere, M.
and Ahmad, A. (2018). Defining the Strategic Role of the Chief Information
Security Officer. Pacific Asia Journal of the Association for
Information Systems, pp.61–86.
Microsoft Pulse.
(2018). A guide to GDPR for universities. [online] Available at:
https://pulse.microsoft.com/en/work-productivity-en/education-en/fa2-a-guide-to-gdpr-for-universities/
[Accessed 20 Nov. 2020].
Ncsc.gov.uk. (2020). The
cyber threat to Universities. [online] Available at:
https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities.
www.fieldengineer.com. (n.d.). Cyber Security Technician - Job Role, Salary Details | field Engineer. [online] Available at: https://www.fieldengineer.com/skills/cyber-security-technician#:~:text=Cyber%20Security%20Engineers%20fix%20and [Accessed 20 Nov. 2020].
memes for you all to enjoy!:
https://www.google.com/url?sa=i&url=https%3A%2F%2Fmemegenerator.net%2Finstance%2F67841781%2Fwinter-is-coming-brace-yourself-the-ciso-has-good-ideas&psig=AOvVaw1QWLWVPhyaxVUln6NzdHJl&ust=1609708924453000&source=images&cd=vfe&ved=0CAIQjRxqFwoTCOj4iJiX_u0CFQAAAAAdAAAAABAD
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.boardish.io%2Fthe-5-step-framework-for-cisos-starting-in-a-new-company%2F&psig=AOvVaw05hW_bz0r_cnImQOhCbTBf&ust=1609709041304000&source=images&cd=vfe&ved=0CA0QjhxqFwoTCPCjs8-X_u0CFQAAAAAdAAAAABAD
https://www.google.com/url?sa=i&url=https%3A%2F%2Fm.youtube.com%2Fwatch%3Fv%3Do_XaJdDqQA0&psig=AOvVaw3z8JdkN49US_LiV-o09v7f&ust=1609709073807000&source=images&cd=vfe&ved=0CA0QjhxqFwoTCMjEt96X_u0CFQAAAAAdAAAAABAD
Comments
Post a Comment