1 / 18

Towards Protecting Critical Infrastructure

Towards Protecting Critical Infrastructure. The Role of Information Security Management in Australian Universities. Lauren May, Tim Lane. Outline. Goals IS Threats/Issues in the Tertiary Sector The Need for a Systemic Approach The Survey Practitioner’s Management Model The Trial

Angelica
Download Presentation

Towards Protecting Critical Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Towards Protecting Critical Infrastructure The Role of Information Security Management in Australian Universities Lauren May, Tim Lane

  2. Outline • Goals • IS Threats/Issues in the Tertiary Sector • The Need for a Systemic Approach • The Survey • Practitioner’s Management Model • The Trial • Conclusion

  3. Goal of this research To improve the culture of compliance towards information security in the Australian university sector.

  4. IS Threats in the Tertiary Sector Universities: • host a large number of diverse systems • IT exploration and research • reflect community standards

  5. Issues in Tertiary Environment • Challenge of cultures and technologies • academia needs • corporate and business requirements • transient and explorative student base

  6. IS Issues in Tertiary Environment • Balance of requirements • conflicts of priorities • coordinated security approach • acceptance in environment

  7. The Need for a Systemic Approach to Managing Security • existing approaches - standards • no single point of understanding • analysis of factors and issues • need systemic approach to ISM which will progress appropriate good practice

  8. The Survey ... • Participants: all 38 Australian universities – 100% response • current status of ISM ? • key issues surrounding ISM ? • how to improve ISM ?

  9. ... The Survey – key findings • existing approaches • awareness, understanding • structured coordinated model • management support • resources

  10. Security Practitioner’s Management Model

  11. Security Practitioner’s Management Model

  12. Security Practitioner’s Management Model

  13. Security Practitioner’s Management Model

  14. Security Practitioner’s Management Model

  15. Security Practitioner’s Management Model

  16. Security Practitioner’s Management Model

  17. In trial at Southern Cross University • IS practitioner • senior management • IT staff • non-IT staff (end users)

  18. Conclusion • IS - an important role in universities • comprehensive survey supports concepts • model focuses on how to transparently progress security knowledge to implementation • in trial at Southern Cross University • future research – benchmarking, measurement

More Related