In With the New,
Out with the Old
Maddie Osei: Information Security and Business Analyst
Vladimir Baghdasaryan: Incident Response Security Specialist
June 18th, 2024
Addressing Cybersecurity Vulnerability Risks and Managing Legacy System Vulnerabilities in the University
Overview and Objectives
Overview
Objectives
1
2
We have many types including Software vulnerabilities, Configuration vulnerabilities and Human vulnerabilities!
On April 2024, a critical vulnerability was identified in the PAN-OS GlobalProtect Gateway, a widely used security software application for firewalls.
On May 22, 2024 - Veeam Backup Enterprise Manager prior to version 12.1.2.172 could allow an unauthenticated attacker to log in to the web interface as any user.
Real-life examples from universities:
Stories of vulnerabilities affecting users and institutions
Types and examples of Vulnerabilities (Institution and User Stories):
What is Vulnerability Management?
Why is it Crucial for Universities?
What is Vulnerability?
Critical Asset Prioritization and Remediation Strategies
Identifying and Inventorying Critical Assets:
Prioritizing Vulnerabilities: How do we determine which vulnerabilities to address first?
Remediation Strategies:
1
2
3
Cyber Security Awareness and Communication
Raising Awareness on Vulnerabilities and Advisories/ Communication Channels:
Challenges and Pitfalls in Vulnerability Management
Communication gaps between IT and other departments.
Ensuring timely updates and patches
Legacy systems/applications and their limitations
Difficulties in implementing new guidelines
Questions on Maturity and Asset Inventory:
Discuss the maturity of vulnerability management practices
Tips on building and leveraging asset inventories
Highlight best practices from audience contributions
Thank You
Maddie Osei:
Vladimir Baghdasaryan: vlad.Baghdasaryan@utoronto.ca
For any questions, please reach out to Omar Khan: @omarkhan.khan@mail.utoronto.ca
June 18th, 2024