SlideShare a Scribd company logo
1 of 24
Some ideas on managing incidents
Wasn’t expecting that! Now what?
Andy Gibbs
Enterprise Architect - Security
Agenda
Introduction to UCAS
The nature of incidents: what, why, how
Aims of incident management
UCAS’ strategy and approach
Shared experiences
UCAS is Unique!
We are the national centralized organisation
processing applications to higher education in the UK.
An intermediary in an ever changing multi-£billion market.
UCAS Application Schemes
• UCAS Undergraduate
• UCAS Teacher Training
• UCAS Conservatoires
• UCAS Postgraduate
• UCAS Progress
Our customers
Circa 800,000 applicants each year
Circa 600,000 placed
4 million applications, in over 6,000 registered centers,
to 387universities & colleges & 1200 schools.
This includes UK & international schools, agents and advisers
from over 100 countries.
Our challenge
Protect vital stakeholder information
Deliver our services in a secure, reliable and operationally stable manner
What is an incident anyway?
event
INCIDENT
What is an incident anyway?
An event or occurrence that has an unexpected and adverse
effect on normal circumstances:
• Business assets (including digital assets)
• Services, outputs or deliverables
• Operational processes
• Resource levels
• Assurance levels (integrity, quality, reliability etc)
It will usually require special treatment to resolve:
• Additional resources (time, money, people, equipment)
• Emergency processes
• Skill-sets
Appropriate incident response
data breach
business loss
fines
reputational damage
harm
£ unnecessary
wasted resources
Distraction from normal business
panic & alarm
Too early, too greatToo little, too late
Why do incidents occur?
Organisations take risks
Processes can and will go wrong
Things break
People are human – we all make mistakes
Carelessness, naivety, distractions, misunderstanding
Those with malicious, malevolent or criminal intent
Defences are not perfect
INCIDENTS ARE INEVITABLE
PLAN and RESPOND ACCORDINGLY
Aims of incident management
Prevent incidents from occurring
Rapidly detect and respond to incidents when they do occur
Contain the situation and minimise business disruption
Quickly identify the issue and who/what has been affected
Inform and update affected parties of situation and action plan
Take prompt and co-ordinated remedial action to re-instate
Understand root-cause and adapt accordingly
Minimise the cost and disruption of handling incidents
UCAS Security Strategy
Incident management has a role to play in all 4 quadrants
Protect - managing your risk
Risk has three components:
• threat
• vulnerability
• impact
Eliminate any one of the above and you have no risk!
Threat
Understand your threat landscape
• Participate in Security Groups
JANET UK-SECURITY forum
CyberSecurity Information Sharing Partnership (CiSP) (NCSC)
LinkedIn Information Security Forum
• Media and Press
• Threat advisories and reports
Vulnerability
A vulnerability is an incident waiting to happen!
Identify and reduce your areas of vulnerability:
• Technical - vulnerability advisories
vulnerability scans and pen tests
• People - active awareness and education programmes
• Financial - contingency planning, budgeting, reserves
Reduce Impact
Reducing impact should an incident occur
• Regular backup of data
• Build in resilience
• Responsive incident management process
• Business continuity plan - Test
Detect
Keep employees vigilant
• Raise and maintain awareness
• Encourage and reward people for reporting
• Make reporting issues easy
Manual / passive detection alone is not sufficient
- pro-actively monitor for incidents
Detect
Detect
events
events
events
events
events
events
events
events
events
Security logs
&
event
repository
High
Medium
Low
Alerts
server management
anti-virus/malware
file integrity monitoring
firewall management
intrusion detection
network management
end user analytics
mobile device mgt
user access management
Event Correlation
Analysis
Dashboard / reports
Real-time alerting
Triage
eventscontextual security
Network &
Security
Operations
Centre
SIEM Other SIEM tools are available

ALERT
Network &
Security
Operations
Data
Protection
&
Governance
Cyber
Security
Emergency
Change
Advisory
Board
Facilities &
Physical
Security
Business
Operations
External
Incident
Investigation
Crisis
Management
Team
Emergency
Services
Incident
Run Books
Escalation
Paths
Incident
Communications
Team Invoke
Triage
Incident
Team
Severity – how serious is it?
Containment – how do we get the situation under control
Incident Process - Invoke or not to invoke?
Routing – Most effective path to resolution? Who leads?
Event Log – Open an incident timeline and event log
Duty Incident Manager
Incident response- features
Clear incident process
• Common point of incident co-ordination
• Agreed lines of command and control
• Multiple ways of communicating
Triage process
Duty Incident Manager (+ deputies)
Incident team + resolver groups
Nominated deputies for all critical roles – no SPOF
Run-books to support incident handling and recovery
Communications – internal and external stakeholders, media and press
Escalation processes when necessary
Review – root cause + long-term fix
Incident closure
Adapt
Always establish root cause if possible – Why? Why? Why?
Do we have an underlying problem?
Identify lasting / long-term solution
Understand risks of maintaining any ‘sticking-plaster’ fixes
Learn from the experience
Adapt people, processes and technology
Record the outcome
Communicate to affected stakeholders
Questions?
Thank you

More Related Content

What's hot

Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security Andrew Close
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...APNIC
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24
 
Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationMonchai Phaichitchan
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseKevin Duffey
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate TrainingTonex
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTicTac Data Recovery
 

What's hot (20)

It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)ePlus Virtual Chief Information Security Officer (vCISO)
ePlus Virtual Chief Information Security Officer (vCISO)
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
 
Cybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentationCybersecurity framework v1-1_presentation
Cybersecurity framework v1-1_presentation
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Cyber Security Certificate Training
Cyber Security Certificate TrainingCyber Security Certificate Training
Cyber Security Certificate Training
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 

Similar to Wasn't expecting that! Now what?

Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
information security presentation topics
information security presentation topicsinformation security presentation topics
information security presentation topicsOlajide Kuku
 
educational content, educational contented educational content
educational content, educational contented educational contenteducational content, educational contented educational content
educational content, educational contented educational contentOlajide Kuku
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptxHandmade Rugs and Carpet Store
 
INFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTSINFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTShenlydailymotion
 

Similar to Wasn't expecting that! Now what? (20)

Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
information security presentation topics
information security presentation topicsinformation security presentation topics
information security presentation topics
 
educational content, educational contented educational content
educational content, educational contented educational contenteducational content, educational contented educational content
educational content, educational contented educational content
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx
 
INFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTSINFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTS
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Wasn't expecting that! Now what?

  • 1. Some ideas on managing incidents Wasn’t expecting that! Now what? Andy Gibbs Enterprise Architect - Security
  • 2. Agenda Introduction to UCAS The nature of incidents: what, why, how Aims of incident management UCAS’ strategy and approach Shared experiences
  • 3. UCAS is Unique! We are the national centralized organisation processing applications to higher education in the UK. An intermediary in an ever changing multi-£billion market.
  • 4. UCAS Application Schemes • UCAS Undergraduate • UCAS Teacher Training • UCAS Conservatoires • UCAS Postgraduate • UCAS Progress
  • 5. Our customers Circa 800,000 applicants each year Circa 600,000 placed 4 million applications, in over 6,000 registered centers, to 387universities & colleges & 1200 schools. This includes UK & international schools, agents and advisers from over 100 countries.
  • 6. Our challenge Protect vital stakeholder information Deliver our services in a secure, reliable and operationally stable manner
  • 7. What is an incident anyway? event INCIDENT
  • 8. What is an incident anyway? An event or occurrence that has an unexpected and adverse effect on normal circumstances: • Business assets (including digital assets) • Services, outputs or deliverables • Operational processes • Resource levels • Assurance levels (integrity, quality, reliability etc) It will usually require special treatment to resolve: • Additional resources (time, money, people, equipment) • Emergency processes • Skill-sets
  • 9. Appropriate incident response data breach business loss fines reputational damage harm £ unnecessary wasted resources Distraction from normal business panic & alarm Too early, too greatToo little, too late
  • 10. Why do incidents occur? Organisations take risks Processes can and will go wrong Things break People are human – we all make mistakes Carelessness, naivety, distractions, misunderstanding Those with malicious, malevolent or criminal intent Defences are not perfect INCIDENTS ARE INEVITABLE PLAN and RESPOND ACCORDINGLY
  • 11. Aims of incident management Prevent incidents from occurring Rapidly detect and respond to incidents when they do occur Contain the situation and minimise business disruption Quickly identify the issue and who/what has been affected Inform and update affected parties of situation and action plan Take prompt and co-ordinated remedial action to re-instate Understand root-cause and adapt accordingly Minimise the cost and disruption of handling incidents
  • 12. UCAS Security Strategy Incident management has a role to play in all 4 quadrants
  • 13. Protect - managing your risk Risk has three components: • threat • vulnerability • impact Eliminate any one of the above and you have no risk!
  • 14. Threat Understand your threat landscape • Participate in Security Groups JANET UK-SECURITY forum CyberSecurity Information Sharing Partnership (CiSP) (NCSC) LinkedIn Information Security Forum • Media and Press • Threat advisories and reports
  • 15. Vulnerability A vulnerability is an incident waiting to happen! Identify and reduce your areas of vulnerability: • Technical - vulnerability advisories vulnerability scans and pen tests • People - active awareness and education programmes • Financial - contingency planning, budgeting, reserves
  • 16. Reduce Impact Reducing impact should an incident occur • Regular backup of data • Build in resilience • Responsive incident management process • Business continuity plan - Test
  • 17. Detect Keep employees vigilant • Raise and maintain awareness • Encourage and reward people for reporting • Make reporting issues easy Manual / passive detection alone is not sufficient - pro-actively monitor for incidents
  • 19. Detect events events events events events events events events events Security logs & event repository High Medium Low Alerts server management anti-virus/malware file integrity monitoring firewall management intrusion detection network management end user analytics mobile device mgt user access management Event Correlation Analysis Dashboard / reports Real-time alerting Triage eventscontextual security Network & Security Operations Centre SIEM Other SIEM tools are available 
  • 20. ALERT Network & Security Operations Data Protection & Governance Cyber Security Emergency Change Advisory Board Facilities & Physical Security Business Operations External Incident Investigation Crisis Management Team Emergency Services Incident Run Books Escalation Paths Incident Communications Team Invoke Triage Incident Team Severity – how serious is it? Containment – how do we get the situation under control Incident Process - Invoke or not to invoke? Routing – Most effective path to resolution? Who leads? Event Log – Open an incident timeline and event log Duty Incident Manager
  • 21. Incident response- features Clear incident process • Common point of incident co-ordination • Agreed lines of command and control • Multiple ways of communicating Triage process Duty Incident Manager (+ deputies) Incident team + resolver groups Nominated deputies for all critical roles – no SPOF Run-books to support incident handling and recovery Communications – internal and external stakeholders, media and press Escalation processes when necessary Review – root cause + long-term fix Incident closure
  • 22. Adapt Always establish root cause if possible – Why? Why? Why? Do we have an underlying problem? Identify lasting / long-term solution Understand risks of maintaining any ‘sticking-plaster’ fixes Learn from the experience Adapt people, processes and technology Record the outcome Communicate to affected stakeholders

Editor's Notes

  1. Introduction Andy Gibbs Enterprise Architect – specialising in the area of Security. I’ve worked at UCAS for just over three years now, . . . helping to choose the people, processes and technology needed to protect UCAS’ vital information assets, systems and business services.
  2. Introduction to UCAS I expect that most here to already know who UCAS are and what we do . . . But just a brief introduction to those who don’t . . . and also to set the scene in terms of the operational and security challenges we handle The nature of incidents: what, why, how Since we’re here to discuss Incident Management I’d like to briefly touch upon what we mean by an ‘incident’ . . . Aims of incident management . . . and understand what we are trying to achieve by having good incident management process in place. UCAS’ strategy and approach I’d like to share with you the way UCAS’ Incident management processes have evolved in line with UCAS’ security strategy . . . Shared experiences . . . and also share some practical experiences in handling incidents of all types
  3. Standard Intro Slide – DON’T SHOW
  4. Most people in UK know UCAS for our Undergraduate Admissions and Clearing scheme. UCAS also provides admission services for Teacher Training, arts courses through the Conservatoires and Post-Graduate courses UCAS is increasing involved in providing guidance earlier in the learning cycle with UCAS Progress, which allows young people between 13 and 17 years old to search for courses across England and Wales, . . . and now advice on apprenticeships.
  5. Standard Intro Slide – DON’T SHOW
  6. Standard Intro Slide – DON’T SHOW
  7. This means UCAS is dealing with a the best part of a million applicants each year, generating about 4 million applications to about 400 universities & colleges & 1200 schools. This includes UK & international schools, agents and advisers from over 100 countries. From an operational and security viewpoint that means we have a huge population of end-points over which we have little control of the technical configuration and use. With our connections to universities, colleges & schools, we are connecting to some of the most tech-savvy , but also technologically diverse communities.
  8. At any time we are holding tens of millions of highly sensitive learner records containing contact details, personal attributes, educational achievements and aspirations, personal statements etc At key times of year we hold exam results BEFORE they’ve been released to the learners Commercially valuable sector reports, trends analysis etc We also hold the corporate data about UCAS, our employees, customers, suppliers etc We have a duty of care to our stakeholder groups to protect the information we hold about them or on their behalf We strive to ensure our services are delivered in a secure, reliable and operationally stable manner. Failure to do so could have significant impact on UCAS’ reputation. During our Confirmation and Clearing Processes, operational failure is NOT AN OPTION. Also true of our Admissions processes. We have highly responsive Incident Management processes in place should any adverse event or circumstance threaten delivery of our services or jeopardise the security of our data.
  9. Are we all speaking the same language? Why is it important to understand the difference between and event, an INCIDENT
  10. Are we all speaking the same language? It important that we understand what we mean by an INCIDENT and to know when we have one. An will usually require special treatment and additional resources to resolve. This may vary from, for example, applying a simple patch to invoking a full-blown crisis management process (obviously depending on severity) Straw poll of Audience: How many here have an Incident Management Process? How many here have a formal Business Continuity Process? Of those, how many here have rehearsed/tested their processes in the last year? How many have an Incident Prevention Programme?
  11. Getting Incident Response wrong either way can have a huge detrimental impact: Premature or over zealous response is expensive and may cause undue alarm or panic Slow response may fail to effectively address issue, resulting in loss, damage, harm
  12. We live in an imperfect world Business is a continual balance between risk and return The bad guys are out there!
  13. The ultimate aim of good incident management is to minimise the cost and disruption of handling incidents. If we accept that to be the case, we have a choice – respond as best we can when incidents occur OR anticipate incidents and be prepared to manage them. The best way is to actively avoid incidents in the first place.
  14. Our Security Strategy has 4 Quadrants – PROTECT, DETECT, RESPOND and ADAPT Incident management has a role to play in all 4
  15. Be pro-active in reducing or eliminating THREATS and VULNERABILITIES; Aim to reduce potential IMPACT It is often difficult to eliminate THREAT; bad weather, terrorists and viruses are out there! But you can successfully reduce your exposure to these by reducing or removing your vulnerability. And given that incidents will still occur, we can also pre-empt these and have risk reduction strategies in place.
  16. Understand your threat landscape UCAS are members of the JISC Security Group; also CiSP (Cyber Security Information Sharing Partnership) who are part of the National Cyber Security Centre, LinkedIn Cyber Security Forum Threat advisories – 3rd party security vendors (eg. Incapsula, Akamai, Symantec) publish regular threat landscape reports Media and Press –The Register, SC Magazine, Cyber Daily, Info Security Alert, CSO Security Alert Bloggers – Graham Cluley
  17. Identify your areas of vulnerability Technical - vulnerability scans and pen tests People – active awareness and education programmes Financial – planning, budgeting, reserves Set up emergency finance booking codes (and clear authorities for use) to accommodate and record emergency spending – useful with insurance claims!
  18. Reduce Impact Good backup Build in resilience – particularly for critical systems and services Responsive incident management Business Continuity Plans – These must be tested to be successful (come back to this later)
  19. Provide bulletins updates etc in Intranet, Yammer etc Ensure staff know how to report incidents or suspicious activity Encourage reporting Make mechanisms for reporting easy – Service Now
  20. Physical incidents can sometimes be glaringly obvious . . . . . . but in the digital world the smoke isn’t so obvious . . . . . . until it its too late!
  21. We use Splunk Cloud for our Security Information and Event Monitoring. This allows: Secure log repository (forensic record of events leading up to incident) event correlation Analysis Dashboard reports Real Time alerting We use Service Now in Security Operations for tracking incidents to successful closure We will progressively integrate the capabilities of the two
  22. Have a clear incident process laid down and well communicated Common point of incident co-ordination Clear invocation process - invoke Triage – have a clear system of triage. Include a clear definition of incident classes (eg, P0, P1, P2 P3, P4) based upon severity, complexity, required resources and/or communication levels Containment Agreed line of command and control Multiple means of communication