Research Cybersecurity: What’s Next, What Now
Michael Corn
CISO, UC San Diego
mcorn@ucsd.edu
What’s next
What now
National Security Presidential Memo 33
| |
Provide regular cybersecurity awareness training* | Identify information system users, processes acting on behalf of users, or devices. |
Provide protection from malicious code | Limit information system access to authorized users |
Update malicious code protection mechanisms | Limit information system access to the types of transactions and functions that authorized users are permitted to execute. |
Perform periodic scans of the information system and real-time scans of files | Authenticate (or verify) the identities of those users |
Provide protection of scientific data from ransomware* | Control any non-public information posted or processed on publicly accessible information systems. |
Verify and control/limit connections to and use of external information systems | Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. |
Monitor, control, and protect organizational communications, | Identify, report, and correct information and information system flaws in a timely manner. |
What’s Next
UCSD Implementation: https://bit.ly/RCI-NSPM33
NSF Cyber Initiative
What Now?
Note recommendation 5:
Recommendation: NSF and the major facilities must be adequately resourced for their cyberinfrastructure and cybersecurity needs. What is appropriate will depend on each facility's unique characteristics and specific needs. The cybersecurity budget should be commensurate with perceived risk of an event, which may be unrelated to the cost of constructing or operating the facility.��NSF response: NSF will work with each awardee to develop a cybersecurity risk register for each major facility and will then integrate those risk registers in order to determine the highest NSF risks and implement any needed mitigations.
What constitutes a risk register?
What Now?