Assessing our readiness for a security breach
Kevin Vadnais
University of Lethbridge
Kevin has been at the University of Lethbridge since 2009, and in the security field since July of 2010. Prior to his entrance into post secondary information technology he worked as a developer for Hewlett Packard for 8 years. Kevin's interest in the security field has often been described as obsessive, but he's positive that's just an overstatement. He finds joy in life through activities with his family, volunteering in a local Scouts Canada organization, and scaring community groups who ask him to come speak about Information Security topics.
Abstract
When an institution experiences a data breach, there is a limited amount of time to detect, contain, remediate and report on what happened. The response to this type of incident needs to be deliberate, practiced, and well... [ view full abstract ]
When an institution experiences a data breach, there is a limited amount of time to detect, contain, remediate and report on what happened. The response to this type of incident needs to be deliberate, practiced, and well understood by all levels of the organization. The University of Lethbridge undertook an effort to create a program for Higher Education Institutions and Municipalities which would offer simulations of various real life data breaches and Information Security incidents that would allow institutions to assess their readiness, and determine how to improve their capabilities so when a real situation occurs they would not be practicing responses in front of the television camera. This is the only way to get involvement from every level of the organization, from System technicians to the President's office.
I will talk about how the University, in partnership with IPS Network Services, created a program, what was learned during the process, and how other organizations can take advantage of the output at significantly reasonable rates. I will talk about recommended practices and how to make this type of activity a productive part of your Business Continuity Planning process.
Authors
-
Kevin Vadnais
(University of Lethbridge)
Topic Area
Topics: Data privacy and security
Session
CM2.2 » Data Privacy and Security II (11:15 - Tuesday, 21st June, CCIS 1-430)
Presentation Files
The presenter has not uploaded any presentation files.