SlideShare a Scribd company logo
1 of 16
The Center for Nonprofit Information Technology Hosting
A 501(C)(3) Nonprofit
Dedicated Cyber Security and Threat Mitigation Assistance
The CNPITH Mission Statement
 To improve America’s cyber security posture through public awareness,
research, and open collaboration.
About The CNPITH
 The CNPITH is a IRS recognized 501(C)(3) founded in 2010 to provide
dedicated pro-bono cyber security and threat mitigation assistance to United
States based 501(C)(3) nonprofits under 25 personnel.
 The CNPITH mission is built on the philosophy of education of national cyber
security issues, providing cyber security Subject Matter Expertise, and threat
mitigation to participating 501(C)(3)’s.
 Located in Metro Washington DC.
 Senior Engineer is DOD 8570.1 Compliant IATIII, IAMIII, and CNDSP
 The CNPITH maintains a 3rd Party Certified Public Accountant (CPA) firm
located in the Metro DC area for compliance and monitoring.
Goals and Initiatives
 Education
 Providing cross educational assistance to high school and college students with in house
training on new technologies related to network, cloud computing and cyber security.
 Providing members annual security awareness training and tracking metrics.
 Providing “Social Community Clouds” for SharePoint and Lync instant Messaging
collaboration through our secure private cloud infrastructure.
 Cyber Security Mitigation Services
 Providing Turn-Key infrastructure services to small nonprofits in an effort to secure,
protect, identify threats, and increase our nations cyber security posture one nonprofit
at a time.
 Monitor, identify, track and document threat vectors infiltrating small nonprofits through
out the United States.
 Providing rapid response IT systems for domestic and international crisis relief programs.
 Prevent organizational disruptions by malware, botnets, and ransomware.
 Prevent financial loss and compromise of nonprofit bank accounts resulting in the loss of
publically funded money and the inability for nonprofits to gain future grants and
donations.
The CNPITH Background
The CNPITH owns and
controls 100% of the
cloud hardware, design
and operations.
The infrastructure is 100%
Commercial Off The Shelf – no
custom software components.
Nonprofits have the benefit of
interacting with common known
software such as Microsoft
Windows Server, Windows 8.1,
Microsoft office suite.
The CNPITH is a pure IAAS “Turn-
Key Service” providing a pre built
modern Microsoft based
environments consisting of Active
Directory 2012, Exchange 2013, Lync
Communicator 2013 and 1 Win8.1
desktops. Members also have the
option for Sharepoint 2013, additional
virtual desktops, and even the ability
to migrate current infrastructure into
the CNPITH cloud solution.
The CNPITH is dedicated to US
based 501(C)(3) nonprofits. The
CNPITH provides a turn-key
solution to organizations under
25 personnel.
100% Owned100% COTS 100% Service 100% Nonprofit
5
The CNPITH is built on federal
security standards such as NIST
800-53, DOD DISA STIG’s for OS
hardening, Unified Threat
Management solutions, End Point
Security, Real Time Threat
Monitoring, and active cyber
threat intelligence from the
FBI Infragard Program.
100% Security
What makes The CNPITH unique?
The CNPITH stands out as being unique in its mission goals and objectives due in part to it’s
production multi-tenancy and community cloud environment.
While there are handful of organizations that provide information on How small business’s
and nonprofits can make themselves more “cyber ready” and enhance security. No current
organization provides a service and expertise to facilitate such activities. They stand alone
in being informational.
The CNPITH stands out by providing an actual pro bono solution that nonprofits can
participate in that take a substantial financial, management, and technical burden off the
organizations themselves related to Information Technology requirements.
Leveraging cloud solutions allows for lower cost solution that provides a substantial
security and quality of service increase, while lowering management, operational, and
technical burdens on small nonprofits.
The CNPITH has not had one unscheduled network outage since its inception.
What nonprofits face in today’s cyber
insecure environment
 Lack of funding for modern equipment.
 Many organizations still run windows XP and Vista Operating Systems.
 Many organizations run Microsoft Server 2003 and 2008 with no updates enabled
and no host security.
 Many organizations run no end point security and those who do, do not have
automatic updates enabled and or expired free trial licenses.
 Lack of funding for technical personnel with cyber security experience.
 Personnel with knowledge and experience to secure even the most smallest of
environments.
 Theft of financial information leading to the loss of publically funded money,
grants and donations. Causing some nonprofits the inability to gain future
funding without proving some level of IT security to protect future monies.
Core Pro Bono Services
 Dedicated Active Directory Server
 Dedicated user setup
 User security based off of groups and role based access
 Dedicated Exchange 2016 Server
 Outlook Web Access for anywhere Web access
 Outlook Anywhere for laptop and desktop secure outlook connections
 Mobil device email
 Unlimited email accounts and alias name* (predicated on allocated
hard drive space)
 Dedicated Skype for Business Communication Server
 IM communicator
 Skype calling ability
 Gotomeeting/WebEx like shared desktop
 1 Dedicated Windows 10 virtual desktop
 Web Hosting with complete access through IIS
 Daily Scanning of vulnerabilities and mitigation reports based on
DOD and NIST framework cyber standards
 Dedicated Symantec Antivirus Server 12.1.6
 Unified Threat Messaging Suite
 Real time antivirus updates at gateway
 SPAM control and monitoring
 Intrusion detection sensors
 Global reputation threat analysis
 Custom firewall settings
 Between all servers and services 250GB of Hard Drive
Space
 Unclassified cyber threat mitigation of “Bad actors”
and phishing scams VIA the FBI Infragard program.
Threats are assessed and worked into the CNPITH
primary systems for monitoring
 5MB/PS of internet speed. Will provide enough
bandwidth for email and Lync communication over
VPN line and 1x 24/7 connection to Virtual Remote
Desktop
 Hourly VEEAM backups of email, Daily for all other
servers and workstations.
 Free EV SSL public certs through Digicert.
Cloud Hosting Baseline Comparison
Vendor Total
Virtual
Machines
Total VM
Processors
Total
VM
RAM
Total VM
Hard
Drive
External
IP
Office to
CNPITH
VPN
Security Support Backups Total
Monthly
COST
CNPITH 5 9 14 365 1 1 UTM Firewall with Gateway scanner, Malware
detector, APT, SPAM detector, Microsoft Patching
Integration through WSUS, Symantec End Point for
servers and Hosts. Custom Firewall rules.
Weekly Compliance Scanning.
Dark Web monitoring through Norse.
Free public SSL certs through Digicert ($1000.00)
On prem Watchguard firewall for each org
($1500.00)
Free 1 hour
per week on
internal
organizational
requirements
Daily VM
backups,
with hourly
backups on
email.
$0.00
CenturyLink 5 9 14 365 1 1 Basic firewall rules, no other options available. None $720.00
Dimension
Data
5 9 14 365 1 1 Basic firewall rules, no other options available. None $850.00
The Cyber Communities Program
 The Cyber Communities Program is an initiative started by The CNPITH
that brings cloud computing and cyber security together to offer a unique
environment both individually for each nonprofit and collectively as a
community.
 This concept is initiated by providing individual nonprofits there own
secured Infrastructure As A Service(IAAS) environment . Providing a turn
key solution for each nonprofit to accept or move their existing
environment into the cloud.
 The CNPITH then provides a unique “Community cloud” where utilizing
shared services in Microsoft known as “Federated Services”; each
nonprofit that may want to participate can join their organizations to
specific community cloud’s created around specific national initiatives
such as volunteer fire departments, schools, veteran groups, foreign
country missions, disaster recovery and relief, and so on.
Security Operations
Application Security
Server and EndPoint Security
Perimeter and Infastructure Security
Symantec End Point
Manager for all
Endpoints
WhatsUpGold for
Centralized Logs
Event Monitoring and
Management
Configuration and Asset
Management
Application Whitelisting
and Sandboxing
Email Data Encryption Instant Messaging Single Sign On
Symantec Anti Virus
WSUS Patch
Management
Data Loss Prevention
Capabilities
Duo Two Factor
Authentication
Secured Vlans with
Vmware NSX
Virtualized Firewalls
Load Balancing and
Reverse Proxy
Gateway AntiVirus
Dark Fibre Monitoring
through Norse
Steelcloud DOD STIG
Scanning and
Remedition
Infragard and Other
Monitoring Sources
The CNPITH “Security Onion”
Nonprofit Cyber Research And Collaboration
Program
 The Center for Nonprofit Information Technology Hosting’s “Nonprofit
Cyber Research and Collaboration Program” also known as the NCRCP was
created to provide vulnerability and cyber threat analytical date
collection with 501C3 organizations. This data collection is limited to
information pertaining to transport Internet Protocol (IP) data
information, collection of gateway firewall logs, SPAM monitoring
systems, vulnerability scanning, audit logs, Intrusion Detection Systems
(IDS), Intrusion Prevention Systems (IPS), Event system logs, SIEM, analysis
systems, and data collection tools.
 The information gathered by participating 501C3 shall not contain
specific Personally Identifiable Information (PII), Intellectual Property (IP)
information, or files traversing any of the network pathways. The goal of
the program is to just identify where things are coming from, where they
are going, and what types of security threats are impacting US based
Nonprofit and educational groups.
2014-2016 Lessons learned from Pilot
Programs
 Internal staff must work to effective evangelize the technologies and in many cases migration to
them.
 Over the last several years one of the largest reasons to move to such a cloud based solution is the
centralization of email and communication dedicated to each VFD business. With many individuals, the use of
their personal Gmail, Hotmail, Yahoo and AOL email to conduct volunteer activities is “familiar”, and
“convenient” and can often be difficult to convince individuals to embrace another email account. Especially
one that may have more security involved.
 Level of Effort from VFD’s is minimal.
 Through our first pilot programs we found the extent of request for assistance often went no further then
updating individuals and email addresses. And often those request were minimal as well.
 Passwords
 We general encourage a 90 day password change, but after much discussion we found it was easier to give a 6
month acclimation period to using the services before deploying a 90 day password change.

More Related Content

What's hot

Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 

What's hot (20)

Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 

Viewers also liked (9)

Composition2
Composition2Composition2
Composition2
 
Reducing Health Disparities: The Journey of Brightpoint Health
Reducing Health Disparities: The Journey of Brightpoint HealthReducing Health Disparities: The Journey of Brightpoint Health
Reducing Health Disparities: The Journey of Brightpoint Health
 
La question de l'éco - Tilder / LCI - Par OpinionWay - 11 Février 2016
La question de l'éco - Tilder /  LCI  - Par OpinionWay - 11 Février 2016La question de l'éco - Tilder /  LCI  - Par OpinionWay - 11 Février 2016
La question de l'éco - Tilder / LCI - Par OpinionWay - 11 Février 2016
 
Zayed International for the Environment Award given last January 2016 in a hi...
Zayed International for the Environment Award given last January 2016 in a hi...Zayed International for the Environment Award given last January 2016 in a hi...
Zayed International for the Environment Award given last January 2016 in a hi...
 
AFDC_Cyber2016_SponsorInfo
AFDC_Cyber2016_SponsorInfoAFDC_Cyber2016_SponsorInfo
AFDC_Cyber2016_SponsorInfo
 
Nexus ad hookup
Nexus ad hookupNexus ad hookup
Nexus ad hookup
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
SEO training brochure
SEO training brochureSEO training brochure
SEO training brochure
 
20160126 jetson ps4eye_01
20160126 jetson ps4eye_0120160126 jetson ps4eye_01
20160126 jetson ps4eye_01
 

Similar to The_CNPITH_STORY_V1.2(draft)

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
Stephen Rose
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
ARIV4
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 

Similar to The_CNPITH_STORY_V1.2(draft) (20)

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Ms webfourm nettskyen okt2010
Ms webfourm   nettskyen okt2010Ms webfourm   nettskyen okt2010
Ms webfourm nettskyen okt2010
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the Datacenter
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Computo en la nube moda o valor de negocio v2
Computo en la nube   moda o valor de negocio v2Computo en la nube   moda o valor de negocio v2
Computo en la nube moda o valor de negocio v2
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 

The_CNPITH_STORY_V1.2(draft)

  • 1. The Center for Nonprofit Information Technology Hosting A 501(C)(3) Nonprofit Dedicated Cyber Security and Threat Mitigation Assistance
  • 2. The CNPITH Mission Statement  To improve America’s cyber security posture through public awareness, research, and open collaboration.
  • 3. About The CNPITH  The CNPITH is a IRS recognized 501(C)(3) founded in 2010 to provide dedicated pro-bono cyber security and threat mitigation assistance to United States based 501(C)(3) nonprofits under 25 personnel.  The CNPITH mission is built on the philosophy of education of national cyber security issues, providing cyber security Subject Matter Expertise, and threat mitigation to participating 501(C)(3)’s.  Located in Metro Washington DC.  Senior Engineer is DOD 8570.1 Compliant IATIII, IAMIII, and CNDSP  The CNPITH maintains a 3rd Party Certified Public Accountant (CPA) firm located in the Metro DC area for compliance and monitoring.
  • 4. Goals and Initiatives  Education  Providing cross educational assistance to high school and college students with in house training on new technologies related to network, cloud computing and cyber security.  Providing members annual security awareness training and tracking metrics.  Providing “Social Community Clouds” for SharePoint and Lync instant Messaging collaboration through our secure private cloud infrastructure.  Cyber Security Mitigation Services  Providing Turn-Key infrastructure services to small nonprofits in an effort to secure, protect, identify threats, and increase our nations cyber security posture one nonprofit at a time.  Monitor, identify, track and document threat vectors infiltrating small nonprofits through out the United States.  Providing rapid response IT systems for domestic and international crisis relief programs.  Prevent organizational disruptions by malware, botnets, and ransomware.  Prevent financial loss and compromise of nonprofit bank accounts resulting in the loss of publically funded money and the inability for nonprofits to gain future grants and donations.
  • 5. The CNPITH Background The CNPITH owns and controls 100% of the cloud hardware, design and operations. The infrastructure is 100% Commercial Off The Shelf – no custom software components. Nonprofits have the benefit of interacting with common known software such as Microsoft Windows Server, Windows 8.1, Microsoft office suite. The CNPITH is a pure IAAS “Turn- Key Service” providing a pre built modern Microsoft based environments consisting of Active Directory 2012, Exchange 2013, Lync Communicator 2013 and 1 Win8.1 desktops. Members also have the option for Sharepoint 2013, additional virtual desktops, and even the ability to migrate current infrastructure into the CNPITH cloud solution. The CNPITH is dedicated to US based 501(C)(3) nonprofits. The CNPITH provides a turn-key solution to organizations under 25 personnel. 100% Owned100% COTS 100% Service 100% Nonprofit 5 The CNPITH is built on federal security standards such as NIST 800-53, DOD DISA STIG’s for OS hardening, Unified Threat Management solutions, End Point Security, Real Time Threat Monitoring, and active cyber threat intelligence from the FBI Infragard Program. 100% Security
  • 6. What makes The CNPITH unique? The CNPITH stands out as being unique in its mission goals and objectives due in part to it’s production multi-tenancy and community cloud environment. While there are handful of organizations that provide information on How small business’s and nonprofits can make themselves more “cyber ready” and enhance security. No current organization provides a service and expertise to facilitate such activities. They stand alone in being informational. The CNPITH stands out by providing an actual pro bono solution that nonprofits can participate in that take a substantial financial, management, and technical burden off the organizations themselves related to Information Technology requirements. Leveraging cloud solutions allows for lower cost solution that provides a substantial security and quality of service increase, while lowering management, operational, and technical burdens on small nonprofits. The CNPITH has not had one unscheduled network outage since its inception.
  • 7. What nonprofits face in today’s cyber insecure environment  Lack of funding for modern equipment.  Many organizations still run windows XP and Vista Operating Systems.  Many organizations run Microsoft Server 2003 and 2008 with no updates enabled and no host security.  Many organizations run no end point security and those who do, do not have automatic updates enabled and or expired free trial licenses.  Lack of funding for technical personnel with cyber security experience.  Personnel with knowledge and experience to secure even the most smallest of environments.  Theft of financial information leading to the loss of publically funded money, grants and donations. Causing some nonprofits the inability to gain future funding without proving some level of IT security to protect future monies.
  • 8. Core Pro Bono Services  Dedicated Active Directory Server  Dedicated user setup  User security based off of groups and role based access  Dedicated Exchange 2016 Server  Outlook Web Access for anywhere Web access  Outlook Anywhere for laptop and desktop secure outlook connections  Mobil device email  Unlimited email accounts and alias name* (predicated on allocated hard drive space)  Dedicated Skype for Business Communication Server  IM communicator  Skype calling ability  Gotomeeting/WebEx like shared desktop  1 Dedicated Windows 10 virtual desktop  Web Hosting with complete access through IIS  Daily Scanning of vulnerabilities and mitigation reports based on DOD and NIST framework cyber standards  Dedicated Symantec Antivirus Server 12.1.6  Unified Threat Messaging Suite  Real time antivirus updates at gateway  SPAM control and monitoring  Intrusion detection sensors  Global reputation threat analysis  Custom firewall settings  Between all servers and services 250GB of Hard Drive Space  Unclassified cyber threat mitigation of “Bad actors” and phishing scams VIA the FBI Infragard program. Threats are assessed and worked into the CNPITH primary systems for monitoring  5MB/PS of internet speed. Will provide enough bandwidth for email and Lync communication over VPN line and 1x 24/7 connection to Virtual Remote Desktop  Hourly VEEAM backups of email, Daily for all other servers and workstations.  Free EV SSL public certs through Digicert.
  • 9. Cloud Hosting Baseline Comparison Vendor Total Virtual Machines Total VM Processors Total VM RAM Total VM Hard Drive External IP Office to CNPITH VPN Security Support Backups Total Monthly COST CNPITH 5 9 14 365 1 1 UTM Firewall with Gateway scanner, Malware detector, APT, SPAM detector, Microsoft Patching Integration through WSUS, Symantec End Point for servers and Hosts. Custom Firewall rules. Weekly Compliance Scanning. Dark Web monitoring through Norse. Free public SSL certs through Digicert ($1000.00) On prem Watchguard firewall for each org ($1500.00) Free 1 hour per week on internal organizational requirements Daily VM backups, with hourly backups on email. $0.00 CenturyLink 5 9 14 365 1 1 Basic firewall rules, no other options available. None $720.00 Dimension Data 5 9 14 365 1 1 Basic firewall rules, no other options available. None $850.00
  • 10.
  • 11. The Cyber Communities Program  The Cyber Communities Program is an initiative started by The CNPITH that brings cloud computing and cyber security together to offer a unique environment both individually for each nonprofit and collectively as a community.  This concept is initiated by providing individual nonprofits there own secured Infrastructure As A Service(IAAS) environment . Providing a turn key solution for each nonprofit to accept or move their existing environment into the cloud.  The CNPITH then provides a unique “Community cloud” where utilizing shared services in Microsoft known as “Federated Services”; each nonprofit that may want to participate can join their organizations to specific community cloud’s created around specific national initiatives such as volunteer fire departments, schools, veteran groups, foreign country missions, disaster recovery and relief, and so on.
  • 12. Security Operations Application Security Server and EndPoint Security Perimeter and Infastructure Security Symantec End Point Manager for all Endpoints WhatsUpGold for Centralized Logs Event Monitoring and Management Configuration and Asset Management Application Whitelisting and Sandboxing Email Data Encryption Instant Messaging Single Sign On Symantec Anti Virus WSUS Patch Management Data Loss Prevention Capabilities Duo Two Factor Authentication Secured Vlans with Vmware NSX Virtualized Firewalls Load Balancing and Reverse Proxy Gateway AntiVirus Dark Fibre Monitoring through Norse Steelcloud DOD STIG Scanning and Remedition Infragard and Other Monitoring Sources The CNPITH “Security Onion”
  • 13.
  • 14. Nonprofit Cyber Research And Collaboration Program  The Center for Nonprofit Information Technology Hosting’s “Nonprofit Cyber Research and Collaboration Program” also known as the NCRCP was created to provide vulnerability and cyber threat analytical date collection with 501C3 organizations. This data collection is limited to information pertaining to transport Internet Protocol (IP) data information, collection of gateway firewall logs, SPAM monitoring systems, vulnerability scanning, audit logs, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Event system logs, SIEM, analysis systems, and data collection tools.  The information gathered by participating 501C3 shall not contain specific Personally Identifiable Information (PII), Intellectual Property (IP) information, or files traversing any of the network pathways. The goal of the program is to just identify where things are coming from, where they are going, and what types of security threats are impacting US based Nonprofit and educational groups.
  • 15.
  • 16. 2014-2016 Lessons learned from Pilot Programs  Internal staff must work to effective evangelize the technologies and in many cases migration to them.  Over the last several years one of the largest reasons to move to such a cloud based solution is the centralization of email and communication dedicated to each VFD business. With many individuals, the use of their personal Gmail, Hotmail, Yahoo and AOL email to conduct volunteer activities is “familiar”, and “convenient” and can often be difficult to convince individuals to embrace another email account. Especially one that may have more security involved.  Level of Effort from VFD’s is minimal.  Through our first pilot programs we found the extent of request for assistance often went no further then updating individuals and email addresses. And often those request were minimal as well.  Passwords  We general encourage a 90 day password change, but after much discussion we found it was easier to give a 6 month acclimation period to using the services before deploying a 90 day password change.