We will introduce Cybersecurity’s Incident Response (IR) team and walk through our investigation process using examples from real events on campus.
In this session you will learn how to report an incident, why reporting is important, what to expect from the IR team, possible outcomes of an investigation, and how to not panic.
Part traditional, part facilitated discussion, this session features presenters from the campus Policy Planning & Analysis Team (PAT) and will provide attendees with a refresh of the IT policy process in addition to a brief overview of key IT policies currently in development at UW-Madison. Attendees will be provided with the opportunity to give feedback on key IT policies currently in development in small group breakout sessions with time allocated at the conclusion of the session for a brief Q&A.
Attendees will come away with more knowledge on how IT policy can assist them in their respective roles and how to become active participants in the IT policy process.
Basic knowledge of campus IT policies beneficial, but not required.
When specialized IT fields – Development, Security and Operations – work together, they can solve problems that separate departments many not be able to handle. The process looks different from each perspective. Yet it is teamwork and respect for people with different skill sets that strengthens the UW IT community and keeps technology growing to meet the needs of the University and beyond.
Cybersecurity Governance, Risk, and Compliance (GRC) is often the overlooked, and misunderstood, subset of cybersecurity. GRC is a way for organizations to meet compliance, manage risk, and provide internal governance. It is not a singular solution, but rather an overall strategy. It allows an organization to be more aware, more aligned, and more agile.
It may be helpful to have cybersecurity experience or background but not required. Attendees will learn what GRC is, why GRC matters, & how the GRC mindset can be applied to IT.
*Captions have been auto-generated via YouTube. We are actively working to edit these. Please check back if you need captions.
Description
If you have servers, you might want to use Qualys Cloud Agent to learn about which of your servers have vulnerabilities, like Log4J. This session will go over how to navigate the VMDR dashboard to see which Vulnerabilities are highest priority, which servers they are on, and how you’re making progress over time.
Attendees will learn how Qualys can help you avoid scrambling during security events like Log4J.
This is a brief overview of how you can use features in AWS to protect web resources. It will include several examples of how to architect for resilience against the unknown and varied threats that attack us daily.
Attendees will learn about each feature of AWS can be used to protect web resources.
Join the campus Policy Planning & Analysis Team (PAT) for resources and information on the who, what, when, where, why and how of policy and the IT Policy process at UW-Madison. Learn how policy can assist you in your respective IT roles and how to get involved in the process.
Expect to gain a deeper understanding of why policy is important, the components that make up a successful policy and what information is included in a policy document. In addition, attendees will gain an understanding of what information is included and the purpose of supporting policy documents including policy standards, guidelines, procedures, and implementation plans. Finally, attendees will walk away with an understanding of why their voice is important in the policy process, how policy assists in supporting their work and how to get involved in current and/or future policy initiatives.
Basic knowledge of campus IT Policies beneficial, but not required.
The last 15 minutes of this session will also be open for Q&A about the Pre-Recorded Session: IT Policy – What’s Hot and in the Hopper
Get an update on the Interop Initiative including new infrastructure services and capabilities, and plans for the coming year. Learn about the new tools and approaches that are coming online, and how they impact data access and integration.
Learn how to respond to a ransomware threat proactively, ideally to prevent an attack, or to have the resources to recover if one occurs. Looking beyond the infamous components of an extortion attack – data encryption and demands for ransom – this will cover the most common methods for gaining access, use of lateral movement and privilege escalation, and how an attacker uses fear to increase the chance of getting payment. I will focus on prevention, ideally to stop the attacker from gain access by following best practices in IT security. Logging and monitoring can detect an attack before data is encrypted, although that may not prevent data exfiltration. Effective backup strategy, having backups offline and keeping them long enough that there will be a backup from before the initial compromise, is essential to recovery.