Way back in March 2015 Jisc published its first Cyber security strategy, covering the security products and services that we offered or were planning on delivering over the subsequent three years. A lot has changed over this period, however the objectives of this original strategy have been broadly met, along with other solutions as we constantly revised our plans to best meet the needs of our members.
Building on the success of last year’s Cyber security posture survey, from March to May this year we surveyed Jisc members to better understand their security posture. We had a great responses from 118 different organisations: 65 universities, 49 colleges, 2 research institutions and 2 Arts and Heritage organisations – so thank you to all of you who took the time to respond.
Some of you may remember that last year we issued a survey to learn more about education and research organisation’s cyber security posture and to help Jisc better support your needs in this area. We had a great response last year, but now we want to see what has changed – are your security needs still the same? Have you now achieved Cyber Essentials so feel more confident about your security posture? Are you seeing different threats? Do you now have a strategic lead responsible for cyber security?
Computer Weekly have just published an article written by Jisc's Danny Moules on "A history of hacking and hackers".
Danny is a security assessment specialist and pen tester and was keen to help get the message out that the stereotypical image of a 'hacker in a hoodie' is outdated and you should be wary if that's the only threat you are concerned about...
Earlier this year we identified a need to better understand institutions’ security posture in light of the fast changing and increasingly critical area of cybersecurity. So for the past couple of months we have been running a survey to find out what more Jisc can do to help best support and protect institutions and the Janet network.
The survey had the following objectives:
We’d really like your help in finding out what more Jisc can do to help best support and protect institutions and the Janet network and would appreciate it if you would answer some questions about your institution’s security posture.
We’ve put together a short survey that will be used by us to develop new security-related services, to prioritise planned activities and to assist in protecting the Janet network. The survey should take approximately 20 minutes to complete and we’ll provide an anonymised summary back to you if you wish.
In my post last month reviewing the security sessions at Networkshop44 I mentioned that there would be an announcement coming soon about a new Vulnerability Assessment and Information Service.
As many of you will know, just before Easter we hosted our annual Networkshop conference at the University of Manchester. In case you were – like me – unable to attend, this post contains a roundup of the security related presentations. Where available I have included links to slides and/or videos, but as you would expect, some of the discussions were closed sessions due to the content that was presented.
In the opening plenary, Steve Kennet (Jisc’s Head of network operations and Jisc Group SIRO) provided:
The Strategy and Plan for Jisc security products and services were published last year so we will shortly be updating them to reflect recent activities. The aim of the strategy is to help you address the technical aspects of cyber security (protecting systems, networks and information) and also to help change the attitudes and behaviours of your organisation and the users of your networks.
You might be interested to know that Jisc have the following security-related courses coming up this Summer.
Computers, privacy and the law
19 July - 3 August 2016
This online course provides an introduction to the privacy and legal issues that arise when designing and operating shared computers, networks and services.