SlideShare uma empresa Scribd logo
1 de 15
Cyber security landscape
Henry Hughes
deputy security director, Jisc.
Contents
• Cyber security strategy
• Incident response team
• Distributed denial of service attacks
• Professional services
• Cyber threat intelligence
• Security portal
• Roadmap
Cyber security strategy
First published in 2015:
• Set up a cyber security division Jan 2017 – focussing all security related activity into one
organisational structure
• Established Jisc’s Security Operations Centre – bringing together CSIRT and DDoS mitigation
functions into a single team
• Established an in-house professional services team to provide a range of penetration testing
and security assessment services
• Implemented a vulnerability assessment and information service and a phishing awareness
and associated training service
• Invested in a market-leading DDoS mitigation solution to reduce the time taken to mitigate
attacks, increased our capability to defend against attacks and developed enhanced services
that allow tailored bespoke solutions that directly meet member needs
Cyber security strategy
2015 - continued:
• Undertaken an annual cyber security posture survey to ensure we continue to provide services
and products that our members value
• Launched the cyber security portal to provide better visibility for our members of their network
traffic and DDoS mitigations and alerts
• Instigated the annual Jisc security conference
• Launched the security x-ray service to help institutions identify their spending on security
controls and provide targeted advice and guidance
• We have even launched our first cyber security documentary featuring some of our staff,
members and partners highlighting how we help protect the Janet network and institutions
Cyber security strategy
2018 – 2022 responding to an evolving threat landscape
• Defend – The CSIRT function within the SOC will continue to detect, report and investigate
incidents that pose a threat to the security of our customers’ information systems. We will
increase our coordination role nationally and internationally, particularly with regards to multi-
agency coordination, bring organisations and people together to best protect our community.
• Deter – We will continue to work with NCA, NCSC and other law enforcement agencies to
detect and investigate cyber incidents, and where possible will see these through to
prosecution. We will continue to work with members to develop their defences and test their
exposure to cyber risk.
• Develop – We will continue to develop the Jisc Security Operations Centre by recruiting and
training skilled individuals. By 2019 we have developed our digital forensics capability to enable
us to undertake more investigative work as part of ongoing incidents.
Incident Response Team – Janet CSIRT
Established 1994
• CSIRT for the Janet network
• Coordination of incident response for members connected to the network
• Investigate other forms of network abuse such as spam and copyright
infringement
• First port of call for when a Jisc member is experiencing a security issue
• Work with organisations within the UK and internationally to assist in
crime investigations
• Gather intelligence on potential security issues
• Minimise risk, prevent incidents, contain cyber damage
Janet CSIRT – Contact Points
CSIRT team available 8am-midnight Monday-Friday, and 9-5pm weekends
Telephone: 0300 999 2340
Email: irt@csirt.ja.net
Visit the Janet NetworkCSIRT blog (https://community.ja.net/blogs/csirt)
JiscMail Security list (UK-SECURITY@JISCMAIL.AC.UK)
"Academia" group on Cyber Security Information Sharing Partnership (CiSP)
https://share.cisp.org.uk/
Distributed Denial of Service attacks
Top 10 source countries involved in DDoS attacks
0
10
20
30
40
50
60
70
80
90
100
USA China Russia Brazil UK Germany France Ukraine Republic of
Korea
Taiwan
Percentageoftotalattacks
Country
Professional services
Penetration testing
• A method for evaluating the security of an information system,
network, application or programme by simulating the types of
attack that are known to occur in the real world.
• Our service is now entirely flexible and carried out by our own
experienced, trained and certified cyber-security experts.
• Our penetration testing team have over 25 years’ experience of
penetration testing across education, research, finance,
broadcast, critical healthcare infrastructure and civil service
projects.
• Can help with improving the overall security of a institution as
part of an audit, assessment, for Cyber Essentials+, GDPR or
for best practice and as a proactive step to safeguard against
threats.
Cyber Threat Intelligence
Established Jan 2018
•Seeking to identify the groups behinds the threats – helps us be better prepared
for attacks;
•Regular reporting on threat landscape – existing and emergent threats and
potential counter measures;
•Central scanning against top threats seen in use on Janet – externally accessible
address space only – explicit opt in will be required;
•Formal information sharing structures – contractual and infrastructure;
•Visible through the security portal.
Roadmap
2019 and beyond:
•DNS resolver service enhancements
•Refreshed NTP infrastructure
•Secondary DNS services
•Managed security services including firewall and end point assessment
•Digital forensics
•Security assessment – BSI 31111
•Web filtering
•SIEM services
Get in
touch…
Except where otherwise noted,
this work is licensed under CC-BY
Henry Hughes
deputy security director
henry.hughes@jisc.ac.uk

Mais conteúdo relacionado

Mais procurados

SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_application
Umut IŞIK
 

Mais procurados (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Physical security
Physical securityPhysical security
Physical security
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Cyber security
Cyber security Cyber security
Cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Threat modelling with_sample_application
Threat modelling with_sample_applicationThreat modelling with_sample_application
Threat modelling with_sample_application
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application security
Application securityApplication security
Application security
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Semelhante a Cyber security landscape

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 

Semelhante a Cyber security landscape (20)

Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
DHS Cybersecurity Webinar
DHS Cybersecurity Webinar DHS Cybersecurity Webinar
DHS Cybersecurity Webinar
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 

Mais de Jisc

Mais de Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cyber security landscape

  • 1. Cyber security landscape Henry Hughes deputy security director, Jisc.
  • 2. Contents • Cyber security strategy • Incident response team • Distributed denial of service attacks • Professional services • Cyber threat intelligence • Security portal • Roadmap
  • 3. Cyber security strategy First published in 2015: • Set up a cyber security division Jan 2017 – focussing all security related activity into one organisational structure • Established Jisc’s Security Operations Centre – bringing together CSIRT and DDoS mitigation functions into a single team • Established an in-house professional services team to provide a range of penetration testing and security assessment services • Implemented a vulnerability assessment and information service and a phishing awareness and associated training service • Invested in a market-leading DDoS mitigation solution to reduce the time taken to mitigate attacks, increased our capability to defend against attacks and developed enhanced services that allow tailored bespoke solutions that directly meet member needs
  • 4. Cyber security strategy 2015 - continued: • Undertaken an annual cyber security posture survey to ensure we continue to provide services and products that our members value • Launched the cyber security portal to provide better visibility for our members of their network traffic and DDoS mitigations and alerts • Instigated the annual Jisc security conference • Launched the security x-ray service to help institutions identify their spending on security controls and provide targeted advice and guidance • We have even launched our first cyber security documentary featuring some of our staff, members and partners highlighting how we help protect the Janet network and institutions
  • 5. Cyber security strategy 2018 – 2022 responding to an evolving threat landscape • Defend – The CSIRT function within the SOC will continue to detect, report and investigate incidents that pose a threat to the security of our customers’ information systems. We will increase our coordination role nationally and internationally, particularly with regards to multi- agency coordination, bring organisations and people together to best protect our community. • Deter – We will continue to work with NCA, NCSC and other law enforcement agencies to detect and investigate cyber incidents, and where possible will see these through to prosecution. We will continue to work with members to develop their defences and test their exposure to cyber risk. • Develop – We will continue to develop the Jisc Security Operations Centre by recruiting and training skilled individuals. By 2019 we have developed our digital forensics capability to enable us to undertake more investigative work as part of ongoing incidents.
  • 6. Incident Response Team – Janet CSIRT Established 1994 • CSIRT for the Janet network • Coordination of incident response for members connected to the network • Investigate other forms of network abuse such as spam and copyright infringement • First port of call for when a Jisc member is experiencing a security issue • Work with organisations within the UK and internationally to assist in crime investigations • Gather intelligence on potential security issues • Minimise risk, prevent incidents, contain cyber damage
  • 7. Janet CSIRT – Contact Points CSIRT team available 8am-midnight Monday-Friday, and 9-5pm weekends Telephone: 0300 999 2340 Email: irt@csirt.ja.net Visit the Janet NetworkCSIRT blog (https://community.ja.net/blogs/csirt) JiscMail Security list (UK-SECURITY@JISCMAIL.AC.UK) "Academia" group on Cyber Security Information Sharing Partnership (CiSP) https://share.cisp.org.uk/
  • 8. Distributed Denial of Service attacks
  • 9.
  • 10. Top 10 source countries involved in DDoS attacks 0 10 20 30 40 50 60 70 80 90 100 USA China Russia Brazil UK Germany France Ukraine Republic of Korea Taiwan Percentageoftotalattacks Country
  • 11. Professional services Penetration testing • A method for evaluating the security of an information system, network, application or programme by simulating the types of attack that are known to occur in the real world. • Our service is now entirely flexible and carried out by our own experienced, trained and certified cyber-security experts. • Our penetration testing team have over 25 years’ experience of penetration testing across education, research, finance, broadcast, critical healthcare infrastructure and civil service projects. • Can help with improving the overall security of a institution as part of an audit, assessment, for Cyber Essentials+, GDPR or for best practice and as a proactive step to safeguard against threats.
  • 12. Cyber Threat Intelligence Established Jan 2018 •Seeking to identify the groups behinds the threats – helps us be better prepared for attacks; •Regular reporting on threat landscape – existing and emergent threats and potential counter measures; •Central scanning against top threats seen in use on Janet – externally accessible address space only – explicit opt in will be required; •Formal information sharing structures – contractual and infrastructure; •Visible through the security portal.
  • 13.
  • 14. Roadmap 2019 and beyond: •DNS resolver service enhancements •Refreshed NTP infrastructure •Secondary DNS services •Managed security services including firewall and end point assessment •Digital forensics •Security assessment – BSI 31111 •Web filtering •SIEM services
  • 15. Get in touch… Except where otherwise noted, this work is licensed under CC-BY Henry Hughes deputy security director henry.hughes@jisc.ac.uk

Notas do Editor

  1. It is likely that when this strategy is updated in 3 years’ time we will have undergone even more change, as although the types of threats are evolving, they are not going away, and as funding changes within the education and research sector we will need to be more agile and innovative about how we all work together to address cyber security threats.
  2. It is likely that when this strategy is updated in 3 years’ time we will have undergone even more change, as although the types of threats are evolving, they are not going away, and as funding changes within the education and research sector we will need to be more agile and innovative about how we all work together to address cyber security threats.
  3. It is likely that when this strategy is updated in 3 years’ time we will have undergone even more change, as although the types of threats are evolving, they are not going away, and as funding changes within the education and research sector we will need to be more agile and innovative about how we all work together to address cyber security threats.
  4. It is likely that when this strategy is updated in 3 years’ time we will have undergone even more change, as although the types of threats are evolving, they are not going away, and as funding changes within the education and research sector we will need to be more agile and innovative about how we all work together to address cyber security threats.
  5. It is likely that when this strategy is updated in 3 years’ time we will have undergone even more change, as although the types of threats are evolving, they are not going away, and as funding changes within the education and research sector we will need to be more agile and innovative about how we all work together to address cyber security threats.
  6. First year of in-house Jisc Penetration testing service – Oct 2017-Oct 2018 What is it? Evaluates and improves the security of your system or network by simulating real-world attacks Why do we do it? Membership asked us for it. Needed for audits, certain standards / membership / Cyber Essentials +, following a breach, proactive security management, change in infrastructure or applications, mergers, new security staff, GDPR….. Benefits of testing? Discover the unknown, help with information security across the entire institution, mitigate risk, knowledge sharing, can highlight gaps in security process ownership and departmental risk ownership, systems segmentation analysis Current team 1 pen tester > 5 now (8 incl support staff) 64 engagements first year, mean average is 7 days, mode is 5 days (a typical pentest) Stuff we have found Blackbox (unauthenticated) Infrastructure testing: discovered a unique vulnerability in RSA securID integration with a software repository at a major UK research institution: impact was a perimeter breach with potential for international supply chain attack Spearphishing: the promise of free cake has proven 100% effective across engagements as an enticement to gain credentials and gain a foothold on the internal network. Effective bypass techniques explored and proven to mitigate Google's GSuite phishing protection to harvest credentials. Discoveries across commercial applications: data-exposing vulnerabilities identified in products used across the sector for HR, finance and student records have been reported and fixed by vendors including Tribal, EveryonePrint and TechnologyOne. The future Enhanced pen tests including more assessment work, roadmap guidance, digital forensics Labs to regularly test the apps our sector is using (ongoing remediation work for the sector) Training courses for members