Asia Presentations

University of Central Florida: Post-breach Mitigation & Prevention Strategy 

06-15-2017 07:29 PM

How do you justify making a significant investment in protecting your PeopleSoft systems? We at UCF learned first hand following a highly publicized breach in January 2016. We had to balance the demand of law enforcement and lawyers with investigating the incident while preserving forensic integrity while moving to protect our systems. During this time, there were many costs associated with the data loss. We will discuss the hidden and direct costs on the organization as a whole as well as, the mitigation strategy moving forward.



Find out what happens after a breach directly from Felicia Kendall, IT Infrastructure Manager at UCF. Felicia led the investigation of the PeopleSoft technical teams to provide information to the ISO. She is also leading many of the resultant PeopleSoft projects for mitigation and prevention of future intrusions.

Actions after the breach

Providing ISO Security Incident Response Team (SIRT) with critical information to coordinate efforts for with law enforcement, Lawyers, Administration and constituents

Breach costs

Direct

Credit monitoring

Lawsuits

Indirect

Internal resources

Time

Insurance adjustments

Brand identity

Mitigation Strategy

Protection moving forward – other initiatives

PS Security redesign

Purging old data

Automated deprovisioning

Data masking of SSN

Location based authentication for administrative accounts

Logging of activity for users in the system

Two Multi-Factor authentication

At login

Page level

Lessons learned

Related Entries and Links

No Related Resource entered.