23
Data Security Best Practices KySTE Fall Meet October 21, 2015

Data Security Best Practices KySTE Fall Meet October 21, 2015

Embed Size (px)

Citation preview

Page 1: Data Security Best Practices KySTE Fall Meet October 21, 2015

Data Security Best Practices

KySTE Fall MeetOctober 21, 2015

Page 2: Data Security Best Practices KySTE Fall Meet October 21, 2015

Security

• A belated thanks for coming! Because…– Being the “Security Guy” is like being the “video camera” guy

at a family reunion – everyone stiffens up and you never get a hug

– Nobody likes talking about security or “incidents”• Until they realize they don’t have any security or have had an

“incident”• And by then, of course, it’s WAY. TOO. LATE

– It’s MUCH easier and cheaper to BE secure than it is to GET secure

• This is NOT a technical presentation. Our biggest security problems aren’t technical.

Page 3: Data Security Best Practices KySTE Fall Meet October 21, 2015

My Presentation

1. May be a Repeat to You (If so, sorry. I was asked back)2. Begins with an Intro (that we are in)3. Asks “What is Security?” and answers it4. Discusses Risk5. Dives into House Bills 5 and 2326. Reminds us of the “Data Security and Breach

Notification Guide”7. Prompts us to Get the Basics Right8. And then it Wraps Up, With all of us much Wiser

Page 4: Data Security Best Practices KySTE Fall Meet October 21, 2015

• Confidentiality– Only the right people can see the data (privacy)

• Integrity– The data are accurate and haven’t been changed

by an unauthorized person• Availability– The data are there when you need them

Is Data Security?

WHAT

Page 5: Data Security Best Practices KySTE Fall Meet October 21, 2015

Security Follows Function

Uh…

Page 7: Data Security Best Practices KySTE Fall Meet October 21, 2015

Life is Risky

• Most Victims Humans are BAD at Judging Risk

Page 8: Data Security Best Practices KySTE Fall Meet October 21, 2015

As a matter ofFact:

And…

Page 9: Data Security Best Practices KySTE Fall Meet October 21, 2015

Things More Dangerous than Sharks

• Crocodiles• Constipation• Toilets• Hospitals• Grooming One’s

Privates• Trampolines• Gun Accidents• Toys• Christmas Trees• Being a Chef, Cook or

Baker (no word on candlestick maker)

• Volcanoes• Ladders• Bees

• Room Fresheners• Oysters• Chairs• Icicles• Hot Tap Water• Hotdogs, Balloons,

other choking hazards

• Skiing• Sex• Obesity• Lightning• Dogs• Deer• Cattle

• Texting• Hippos• Airplanes• Shopping on Black

Friday• Falling out of Bed• Bathtubs• Tornadoes• Jellyfish• Ants• Vending Machines• Roller Coasters• Selfies• HS Football

Page 10: Data Security Best Practices KySTE Fall Meet October 21, 2015

Most Secure Automobile in World

"Cadillac V8 Cabriolet 1916" by Lars-Göran Lindgren Sweden - Own work. Licensed under CC BY-SA 3.0 via Wikimedia Commons - https://commons.wikimedia.org/wiki/File:Cadillac_V8_Cabriolet_1916.jpg#/media/File:Cadillac_V8_Cabriolet_1916.jpg

In 1916

Page 11: Data Security Best Practices KySTE Fall Meet October 21, 2015

Why is there So Much Risk?

• Times REALLY HAVE changed• Because so much of our lives now depend on

computers and networks• Because so much of our lives are now captured on

computers and networks - contacts, bank information, social media, birthdays, SSNs…

• Because we aren’t careful around PII

• Because it’s much easier, more profitable, and less risky to rob a computer than a bank

www.us-cert.gov/ncas/tips/st04-001

Page 12: Data Security Best Practices KySTE Fall Meet October 21, 2015

Remember…

You are the BEST CHAMPION fo

r and

BIGGEST RISK to Distr

ict se

curity

Page 13: Data Security Best Practices KySTE Fall Meet October 21, 2015

Main Causes of Data Breaches

1. Negligent Insiders a.k.a. – Me, Youa) Accidental Sharing (email, website, paper, etc)b) Weak Credentials a.k.a. – Passwordsc) Theft of Employee Device (USB Drive, Laptop…)d) Phishing (“CLICK ME NOW!”)

2. Everything Else, likea) Application Vulnerabilities a.k.a. – Unpatched

softwareb) Aliensc) Leprechauns

Page 14: Data Security Best Practices KySTE Fall Meet October 21, 2015
Page 15: Data Security Best Practices KySTE Fall Meet October 21, 2015

How to Prevent Breaches

• TRAINING, TRAINING, TRAINING on– Strong Passwords– Identify phishing scams– Review all emails before sending, especially with

attachments you didn’t create– Learn to encrypt USB Drives or just don’t use them to

share PII. Period– Keep valuables in your trunk, out of sight, or just

don’t keep PII on your device. Period• All the other stuff you do anyway (firewalls…)

Page 16: Data Security Best Practices KySTE Fall Meet October 21, 2015

House Bill 5 (KRS 61.931 et seq)

• Defines PII• Requires state agencies, schools, districts and

their contract holders to keep data secured• Requires state agencies, schools, districts and

their contract holders to report data breaches– Talk to your CIO, who has been highly briefed– House Bill 5 document with Highlighting– Important to anyone who shares data

Page 17: Data Security Best Practices KySTE Fall Meet October 21, 2015

House Bill 232 (KRS 365.734)

• Protects student data from misuse by vendors by limiting its use to educational purposes, unless otherwise agreed to in writing by the students’ parents or as permitted FERPA

• Defines “student data”– Contract language should be amended to ensure

vendors understand their responsibilities– House Bill 232 document with Highlighting

Page 18: Data Security Best Practices KySTE Fall Meet October 21, 2015

KBE Regulation

• 702 KAR 1:170– Is NEARLY final – November?– Defines how to communicate a breach– Requires KDE and Districts to inform respective

boards of efforts to keep data safe as well as why some efforts are not taken

– Incorporates into the KAR by reference the “Data Security and Breach Notification Best Practice Guide”

Page 19: Data Security Best Practices KySTE Fall Meet October 21, 2015

19

• Always secure your workstation

• Keep a strong password

• NEVER use the same password for multiple services

• Never give out a password

• Encrypt PII on portable drives

• Use good practices when e-mailing

• Use safe practices when browsing the Internet

• Report possible viruses immediately

• Realize that yes, WE ARE ALL targets (we have valuable data)

• Make cyber & physical security a REGULAR point of conversation in high-level meetings (ensure CIO/DTC is there, too)

What Can I Do?

Page 21: Data Security Best Practices KySTE Fall Meet October 21, 2015

Convenience vs. Security

• It’s a tightrope• Should we do NOTHING and have NO FUN just

to be secure?• Security, and Passwords, do not exist for OUR

CONVENIENCE. For us, passwords exist to protect our customers. Isn’t that worth a little inconvenience? (think: car keys, child seats)

• ANY security seems like too much, UNTIL it isn’t.

Page 22: Data Security Best Practices KySTE Fall Meet October 21, 2015

Final Thoughts

• When we are all connected, everyone is – A Target– Defense

• Any system can be breached

• Amateurs hack computers. Pros hack people.

Us

Page 23: Data Security Best Practices KySTE Fall Meet October 21, 2015

Thanks a Bunch!

• Robert Hackworth– KDE Chief Security Officer/Guy– [email protected]

• Free Cyber-security pamphlets and postersBulkorder.ftc.gov