U' T' System IT Security Vulnerability Assessment - PowerPoint PPT Presentation

Loading...

PPT – U' T' System IT Security Vulnerability Assessment PowerPoint presentation | free to view - id: 1bebcb-ZDc1Z



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

U' T' System IT Security Vulnerability Assessment

Description:

U' T' System IT Security Vulnerability Assessment – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 11
Provided by: kristi48
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: U' T' System IT Security Vulnerability Assessment


1
U. T. System IT Security Vulnerability
Assessment AssuranceInitiatives
  • This presentation will probably involve audience
    discussion, which will create action items. Use
    PowerPoint to keep track of these action items
    during your presentation
  • In Slide Show, click on the right mouse button
  • Select Meeting Minder
  • Select the Action Items tab
  • Type in action items as they come up
  • Click OK to dismiss this box
  • This will automatically create an Action Item
    slide at the end of your presentation with your
    points entered.
  • Presented to the
  • Audit, Compliance and Management Review Committee
    of the
  • Board of Regents of The University of Texas
    System
  • August 2003

2
Topic Overview
  • Chancellors IT Vulnerability Assessment
  • Timeline
  • Coordination
  • Office of Information Technology
  • System Audit Office
  • Status
  • Long-range IT Security Initiative
  • Objectives
  • Steering Committee

3
The Chancellors Initiative
  • March 6, 2003 - memo to presidents
  • Comprehensive IT Security Vulnerability Inventory
    and Assessment
  • Action Plan to address identified vulnerabilities

4
Timeline
  • Phase 1 Mission-Critical and Centrally Managed
    Systems
  • Vulnerability Inventory due April 15
  • Action Plan due June 1
  • Phase 2 Departmental (all other) Systems
  • Vulnerability Inventory due August 1
  • Action Plan due October 1

5
Coordination
  • U. T. System Offices of Information Technology /
    Information Resources
  • Videoconference on March 21, 2003
  • Requested SUMMARY information
  • Provided instructions, templates, and sample
    reports

6
Coordination (cont.)
  • System Audit Office
  • Assurance services provided by audit function at
    each institution with guidance from System Audit
    Office
  • Monitor process, evaluate detailed reports, and
    verify summarized information
  • Issuing an Assurance Report to accompany each
    management report

7
Status
  • Phase 1 Completed
  • Vulnerability reports and action plans received
    from all components
  • 34 major categories of vulnerabilities identified
  • Qualitative risk ranking clarified highest risks
  • Major initiative for some campuses, involving
    outside consultants and substantial costs

8
Status (cont.)
  • July meeting to discuss systemic vulnerabilities
  • Phase 2 in progress (near completion at several
    components)
  • Audit offices continue to monitor
  • Overarching IT Security Initiative has been
    launched

9
IT Security Initiative
  • Long-range objectives
  • Comprehensive system-wide assessment
  • Four parts
  • Data gathering
  • System-wide contracts
  • Operational reviews
  • Internal methods and monitoring

10
IT Security Initiative (cont.)
  • IT Security Steering Committee
  • Led by
  • Dr. Clair Goldsmith (Assoc. Vice Chancellor
    CIO)
  • Bill Taylor (Audit Supervisor, System Audit
    Office)
  • Representatives from the Strategic Leadership
    Council
  • Focusing on operational assessment of security at
    all components
  • IT High-risk Working Group
About PowerShow.com