{"id":16185,"date":"2019-08-28T10:10:09","date_gmt":"2019-08-28T18:10:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/08\/28\/news-9927\/"},"modified":"2019-08-28T10:10:09","modified_gmt":"2019-08-28T18:10:09","slug":"news-9927","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/28\/news-9927\/","title":{"rendered":"Making the case: How to get the board to invest in higher education cybersecurity"},"content":{"rendered":"<p><strong>Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000<\/strong><\/p>\n<p>Security leaders in institutions of higher education face unique challenges, as they are charged with keeping data and the network secure, while also allowing for a culture of openness, sharing, and communication\u2014all cornerstones of the academic community. And depending on the college or university, concerns such as tight budgets and staffing shortages can also make running a successful security program difficult. So how do CISOs get their boards to invest in higher education cybersecurity?<\/p>\n<p>In the second part of our series of posts about <a rel=\"noreferrer noopener\" aria-label=\"CISO communication (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-board-to-invest-in-government-cybersecurity\/\" target=\"_blank\">CISO communication<\/a>, we look at the considerations and skills required for presenting to the board on higher education cybersecurity, including which tactics will increase their understanding and financial support.<\/p>\n<p>This month, I asked David Escalante, Director of Computer Policy &amp; Security at Boston College and a veteran information security leader, for his perspective on what it takes to advocate for security in this environment.<\/p>\n<p><strong>What unique challenges do CISOs\/security managers working in higher education have that differ from their peers in the public sector? <\/strong><\/p>\n<p>Many large universities are best thought of as small cities. Frequently, an organization is able to focus on a few products, or a range of products in its given industry space. Because of the diversity of things a university does, the variety of software and hardware required to run everything is huge, and this, in turn, means that security teams are stretched thin across all those systems, versus being able to focus on a smaller number of critical systems.<\/p>\n<p>University environments have a culture of openness, and that can conflict culturally with a least privilege or <a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"zero trust security model (opens in a new tab)\">zero trust security model<\/a>.<\/p>\n<p>Without getting into detail, risk trade-offs in higher education aren&#8217;t as well understood as in many other sectors. And because of the diverse systems alluded to above, balancing those trade-offs is complex.<\/p>\n<p><strong>What do education CISOs need to keep in mind when they communicate with either the board or other governing bodies in their organization?<\/strong><\/p>\n<p>Boards in education, in non-profits, and for state entities don&#8217;t tend to have the same makeup as public company boards do. For a non-profit example, think of the opera company whose board members are the big donors. As a result of this, we&#8217;ve noted that the &#8220;standard&#8221; templates for cybersecurity communication with the board tend not to strike the right notes, since they&#8217;re pitched for a public company board made up largely of senior corporate officers. So don&#8217;t just go &#8220;grab a template.&#8221;\u00a0 <\/p>\n<p>The trend we&#8217;ve seen, advice-wise, of &#8220;tell the board stories&#8221; seems to resonate better than, say, a color-coded risk register. The scope of the systems running at a big university that need to be secured, plus the board&#8217;s limited detailed knowledge, makes substantive conversations about specific security approaches difficult. It&#8217;s better to highlight things both good and bad than to try to be comprehensive.<\/p>\n<p>It&#8217;s very hard to balance being technical or not. Use a mix. On the one hand, board members have probably read about ransomware bringing organizations to their knees, and may even have read up on ransomware to prep for the board meeting, and will expect some technical material on the subject. On the other hand, almost all board members will not be technical, so overdoing the technical component will lose them.<\/p>\n<p>Don&#8217;t directly contradict your own management chain\u2014if you&#8217;ve asked for more staff and haven&#8217;t gotten it, don&#8217;t ask the board for it.<\/p>\n<p><strong>What other advice would you give higher ed CISOs when it comes to communication? <\/strong><\/p>\n<p>On the non-board management side, if you aren&#8217;t already, it&#8217;s time to emphasize that <a rel=\"noreferrer noopener\" aria-label=\"security is everyone's responsibility (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2019\/02\/tackling-the-shortage-in-skilled-it-staff-whole-team-security\/\" target=\"_blank\">security is everyone&#8217;s responsibility<\/a>. The days when you could &#8220;set and forget&#8221; antivirus and be secure are long gone.\u00a0 <\/p>\n<p>Now social engineering and credential theft are rampant, and management is consuming information on personal mobile devices. Non-IT management needs to be clear that securing campuses is a team effort, not just an IT one.\u00a0 <\/p>\n<p>At BC, we have been having the CIO, versus the security team, communicate personally with senior management a couple times a year on specific cyberattacks we&#8217;ve seen to emphasize that they need to be vigilant partners, and not to assume that IT will catch all threats in advance.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-the-board-to-invest-in-higher-education-cybersecurity\/\">Making the case: How to get the board to invest in higher education cybersecurity<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-the-board-to-invest-in-higher-education-cybersecurity\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-the-board-to-invest-in-higher-education-cybersecurity\/' title='Making the case: How to get the board to invest in higher education cybersecurity'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/shutterstock_794036323.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/business-2\/\" rel=\"category tag\">Business<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/boston-college\/\" rel=\"tag\">boston college<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/c-level\/\" rel=\"tag\">c-level<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cio\/\" rel=\"tag\">CIO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ciso\/\" rel=\"tag\">CISO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cisos\/\" rel=\"tag\">CISOs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/enterprise\/\" rel=\"tag\">enterprise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/higher-education\/\" rel=\"tag\">higher education<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/higher-education-cybersecurity\/\" rel=\"tag\">higher education cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/higher-education-security\/\" rel=\"tag\">higher education security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/investment-in-cybersecurity\/\" rel=\"tag\">investment in cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/non-profit\/\" rel=\"tag\">non-profit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-trust-security-model\/\" rel=\"tag\">zero trust security model<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-the-board-to-invest-in-higher-education-cybersecurity\/' title='Making the case: How to get the board to invest in higher education cybersecurity'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-the-board-to-invest-in-higher-education-cybersecurity\/\">Making the case: How to get the board to invest in higher education cybersecurity<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22765,1001,22525,20282,11142,22000,12177,22766,22767,22768,22769,10570,22770],"class_list":["post-16185","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-boston-college","tag-business","tag-c-level","tag-cio","tag-ciso","tag-cisos","tag-enterprise","tag-higher-education","tag-higher-education-cybersecurity","tag-higher-education-security","tag-investment-in-cybersecurity","tag-non-profit","tag-zero-trust-security-model"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16185"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16185\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16185"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}