Loading…
2021 UNC CAUSE has ended
Information Security and Compliance [clear filter]
Wednesday, October 6
 

10:00am EDT

Vendor Risk Management - Lessons Learned across UNC system
Vendor risk management (VRM) is a program that all higher education institutions have struggled with over the years. In many cases, Information Security Offices are not aware of technology purchases until they are already purchased or a tight deadline for review. Given the recent incidents revolving around supply chain management, campus senior leadership are asking great questions on how IT and Information Security are managing these risks. This panel presentation and discussion will showcase the different models that are in place today and the evolution across the UNC system to standardize, establish baselines and be able to collaborate on VRM activities so that we can raise awareness of the risks and provide visibility to our campus leadership.

Our panel includes: Oscar Knight, Miranda Warren from Appalachian State University; Bill Coker, Damon Armour from NC State University; Brian Penders, Mel Radclife from UNC Chapel Hill; Mike Rollins from UNC Greensboro.

Note: Log into Sched to see the "Open Zoom" button. Make sure to complete these 5 steps to get access.

Speakers
MR

Mel Radcliffe

Information Security Manager, UNC-CH
My group handles risk assessments and other compliance projects. We are currentlu building a security program aimed at supporting our research community.
avatar for Mike Rollins

Mike Rollins

Security Architect, UNC Greensboro
avatar for Damon Armour

Damon Armour

Director of Information Security, Risk & Assurance, North Carolina State University
avatar for Miranda Warren

Miranda Warren

IT Project Manager, App State
avatar for Bill Coker

Bill Coker

Manager, North Carolina State University
BP

Brian Penders

School of Medicine CISO, University of North Carolina at Chapel Hill


Wednesday October 6, 2021 10:00am - 10:45am EDT
Zoom Meeting
 
Tuesday, October 12
 

1:00pm EDT

Easy to Accumulate, Difficult to manage: Remediating Technical Debt
A technical debt remediation project that was already in its planning phase had to be completely reimagined for a post-pandemic return to campus. With a list of 9 compliance metrics needing to be assessed on over 1,700 devices across a 50 department division, the sudden change to remote-work brought on by the global pandemic made accurate inventory management seemingly impossible. Equipped with a department of only 13 technology staff members, we developed a comprehensive schedule and communication plan and roll-out to accommodate the unique needs of 50 different stakeholder departments.

Presentation will include:
- Problem overview (what is Technical Debt? How does it compound? Why is it difficult to eliminate?
- Mechanisms we tracked
- Tools and resources
- Communication plans
- Various roadblocks and solutions
- Overall completion metrics
- Technical debt prevention methods

Participants will leave with a blueprint for addressing tech debt in their organizations.

Note: Log into Sched to see the "Open Zoom" button. Make sure to complete these 5 steps to get access.

Speakers
avatar for Leah Sauerstrom

Leah Sauerstrom

Technology Support Analyst, North Carolina State University
KM

Keith Medlin

IT Director, North Carolina State University


Tuesday October 12, 2021 1:00pm - 1:50pm EDT
Zoom Meeting
 
Thursday, October 14
 

10:00am EDT

Research-based Ransomware Defense Strategy
News reports continue to highlight the serious implications for ransomware attacks against companies and organizations, including for higher education institutions. We will examine practical security controls that can be effective in defending against ransomware attacks, with an emphasis on examining what the literature says concerning what practices are most likely to demonstrably reduce risk. At the same time as we take such an evidence-based perspective at looking at what safeguards are likely to work, we'll also look at what weaknesses have been exploited in ransomware incidents. Our UNC System Standard 1400.3 on User Identify and Access Control emphasizes the importance of MFA. For example, we'll look at empirical evidence concerning the value of MFA and consider examples such as how failure to have MFA safeguards in place was at the heart of the Colonial Pipeline attack.

Note: Log into Sched to see the "Open Zoom" button. Make sure to complete these 5 steps to get access.

Speakers
avatar for Mark Webster

Mark Webster

Chief Information Security Officer, East Carolina University


Thursday October 14, 2021 10:00am - 10:50am EDT
Zoom Meeting
 
Filter sessions
Apply filters to sessions.