Cybersecurity and Master Planning

Report 0 Downloads 73 Views
By Bob Olsen, Compass Cyber Security

RISK & COMPLIANCE

Cybersecurity and Master Planning One of the best times to address cybersecurity risks is before building or remodeling. Do not rely solely on your IT team.

H

undreds of schools have reported data breaches in recent months. How can your school avoid being next? An ideal time to

shore up cybersecurity efforts is when building new or remodeling. Not only does construction provide a clean slate on which to implement solutions, but even relatively simple renovations can involve industrial control systems that

Bob Olsen is CEO of Compass Cyber Security, which provides a variety of services to protect the data of independent schools and other organizations. compasscyber.com

invite cybersecurity risks. A new automated HVAC system, for example, ties into a school’s IT infrastructure. And every new vendor to your campus presents a potential threat. Thinking through cybersecurity challenges during the planning process will save costs and headaches in the long run. It’s especially important to consider cybersecurity implications when beginning larger capital improvement projects, which usually roll around only every 20 or 25 years. One of our clients took this opportunity when "tech enabling" older classrooms — that is, updating with Wi-Fi, LED screens, laptop docking, etc. In this case, starting from scratch and implementing entirely new systems proved less

important threats. A planning committee, for

costly than patching up older ones. On the other

instance, might use it to identify the pros and

hand, schools must sometimes integrate legacy systems with brand new ones, such as when connecting building controls in a new facility with those in a nearby older building. Asking these questions will help you assess cyberthreats and prevention when developing a master plan:

• How will we use technology in the future

cons of different security options and the effect of changes on end users. Cyberthreats affect the entire range of functions within an organization, and cybersecurity is a team sport. Do not rely solely on your IT department when evaluating cybersecurity risks. A more effective, integrated

and what does that mean to our security

approach includes the head of school, trustees,

Mandated Reporting Laws

program? Are we moving to a cloud application

business officer and facilities director along with

environment? Will we outsource more of our

the IT director. We often offer schools up to four

Be aware of new and changing regulations that impact data security. Legislators regularly debate changes to FERPA and the Child Internet Protection Act. Less well-known to schools are state security breach notification laws, which require organizations with a threshold of records, usually around 500, to notify affected parties in regulated ways if they experience a data breach. Forty-eight states and three territories have these laws.

information technology needs to a third-party

solutions to a problem, none of them black and

service provider?

white. Whoever is evaluating these options must

10

JULY/AUGUST 2017

• How do we keep our staff up-to-date on the latest cyberthreats, and on trends that are unique to our environment?

• Who has organizational responsibility for managing our cyber risk?

A risk management and strategic planning

understand the end users. Moreover, those end users must understand any changes to existing processes and systems to avoid help desk tickets, headaches and especially data breaches — all outcomes with direct costs.

model can help you develop robust and useful answers to these and other questions. One

MORE ON NETASSETS.ORG

that I recommend for its user-friendliness is

Case Study: a School’s Last Phishing Trip go.nboa.org/2pkLyYW

ISACA’s Business Model for Information Security (go.nboa.org/2qSwa66). This model helps organizations prioritize data protection activities and ensure that their plan focuses on the most

Your Money or Your Data go.nboa.org/2pzGzQp Greetings from Kazakhstan go.nboa.org/2q3yx4N

NETASSETS.ORG