Episode 36

Is Cybersecurity A Moving Target at Academic Institutions?

In a highly engrossing and in-depth discussion, Tej Patel, Vice President, and CIO at Stevens Institute of Technology sheds light on the various information security challenges that plague academic institutions and how best to deal with them. He talks about establishing a highly collaborative and security-centric culture, structuring an ideal CIO-CISO relationship, effective execution strategies, and more.


Time Stamps

01:57

Why don't you give listeners an overview of your professional background?

02:57

Let's begin by discussing the information security challenges that academic institutions face.

05:17

So the challenge lies in enabling the university pursue its mission as safely and securely as possible. Is that a fair understanding of the fundamental challenge?

09:09

How do you keep up with all the activities that are going on across campus or at satellite locations if you'll have satellite locations? What's the mechanism in place whereby you would be forewarned, people will feel the need to say, hey, we need to talk to the security office, because this has some serious security implications, and we want to make sure that we are doing it the right way.

13:44

How feasible is it to offer customized guidance to the various operating units at an academic institution?

16:23

What is your vision of an ideal CIO-CISO relationship?

21:40

If you could share an example of how you and your team brought about a change in the security culture at your institution

25:03

What steps do you all take to secure the student population as best as possible?

30:25

People are busy, they have to deal with so many things. So that becomes another chore where you are expected to diligently look through every email and see whether any particular email deserves to be reported. Where are you on this? What's your perspective?

35:25

How should organizations prepare for cyber attacks? And what does it take to execute plans effectively in a sustained manner?

39:49

I'd like to give you the final word.


Memorable Tej Patel Quotes/Statements

"Cybersecurity is a moving target in higher education."

"Cybersecurity is a shared responsibility to provide a protected cyber infrastructure on campus."

"Building trust and relationship are so critical; that allows my team and me to have a conversation with our researchers to fully understand what exactly they are trying to achieve."

"There are a lot of things that we have changed in our practices to ensure that we instill the culture of cybersecurity in our business from day one."

"It's not so much about reporting structures, it's more about how a CISO and CIO can partner together to deliver the message that cybersecurity or security is a strategic value service for any institution or organization."

Nowadays, the role of the CISO and the CIO is more geared toward reducing business risk. It's all about risk management.

"Organization must spend sufficient time, effort and resources to build a security-centric culture."

"It's not so much about reporting structures. It's more about how a CISO and CIO can partner together to deliver the message that cybersecurity or security is a strategic value service for any institution or organization."

"The role of CISO and CIO, in my view is more towards reducing the business risk nowadays."

"They expect the cybersecurity economy to grow to $10 trillion by 2025."

"You have to go back to the basics, do the basics right. Make sure you're transparent, make sure you find good people on your team who are stewards of good security hygiene and do your best efforts daily."

"The majority of the breaches happen not through any highly sophisticated cyber attacks. They happen because basic controls are lacking, fundamental training hasn't been provided, unsatisfactory patch management, and more."

"We also pay very close attention to finding that balance between user experiences and maintaining the security."

"Someone recently shared some statistics about cyber attacks. It happens every 39 seconds. The ransomware attacks are targeted every 14 seconds, and only 10% get reported."


Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast, so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcript
Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to

Dr. Dave Chatterjee:

welcome you to this episode of the Cybersecurity Readiness

Dr. Dave Chatterjee:

Podcast Series. Today, our guest is Mr. Tej Patel, Vice President

Dr. Dave Chatterjee:

and CIO at Stevens Institute of Technology. So I'm really

Dr. Dave Chatterjee:

thrilled to welcome someone who is from my industry, academia,

Dr. Dave Chatterjee:

and I can't wait to learn more about his thoughts and

Dr. Dave Chatterjee:

perspectives on how you secure academic institutions from

Dr. Dave Chatterjee:

different types of attacks. Our discussion will revolve around

Dr. Dave Chatterjee:

unique security challenges, CIO-CISO relationships,

Dr. Dave Chatterjee:

preparing for cyber attacks, effective execution strategies.

Dr. Dave Chatterjee:

So we will be covering a lot of ground and I hope you find it

Dr. Dave Chatterjee:

interesting. But before we get into the details, let's bring

Dr. Dave Chatterjee:

our guest into the discussion. So welcome, Tej. Thanks again

Dr. Dave Chatterjee:

for making time,

Tej Patel:

Dave, pleasure to be here.

Dr. Dave Chatterjee:

So Tej, why don't you give listeners an

Dr. Dave Chatterjee:

overview of your professional background?

Tej Patel:

Absolutely. They and again, it's my pleasure to be

Tej Patel:

here and look forward to sharing some of the thoughts around this

Tej Patel:

very important topic in all industry, in fact. So, a little

Tej Patel:

bit about me, I have been in higher education for almost 20

Tej Patel:

years now. My first job was in higher education, and I'm still

Tej Patel:

in higher education. Prior to joining my current organization,

Tej Patel:

I was at University of Pennsylvania, where I have held

Tej Patel:

several roles, most most recently, Chief Information

Tej Patel:

Officer for Penn Nursing. And in August of 2020, I joined Stevens

Tej Patel:

Institute of Technology as the Vice President for Information

Tej Patel:

Technology and University CIO. I am responsible for end-to-end

Tej Patel:

digital, IT cybersecurity enterprise data and data

Tej Patel:

services, classroom technology and learning technology.

Dr. Dave Chatterjee:

Okay, fantastic. So let's begin by

Dr. Dave Chatterjee:

discussing the information security challenges that

Dr. Dave Chatterjee:

academic institutions face.

Tej Patel:

Yeah, I think that's a great question. And before I

Tej Patel:

share challenges, I must tell you that cybersecurity is a

Tej Patel:

moving target in higher education. Right. And I, as I

Tej Patel:

tell my team and my constituency is that it's a team sport, where

Tej Patel:

it's a shared response, cybersecurity is a shared

Tej Patel:

responsibility to promote a protected cyber infrastructure

Tej Patel:

on campus. Right. And some of the challenges are unique to

Tej Patel:

higher education. But I think there are a lot of similarities

Tej Patel:

as well, when we look at banking, financial institutions,

Tej Patel:

or pharmaceuticals or healthcare and what have you, right. There

Tej Patel:

are specific areas within higher education, I believe, that are

Tej Patel:

very challenging to manage and maintain and meet the

Tej Patel:

expectation. For example, research, particularly research

Tej Patel:

IP, when a researchers is doing or conducting a research that

Tej Patel:

deals with a treatment or DOD or confidential data Department of

Tej Patel:

Defense. It's a very unique environment at that point. Then

Tej Patel:

you have students data, that is also very high target,

Tej Patel:

libraries, right, where open research, it's the motto, right?

Tej Patel:

The network is open in some of those areas where it creates a

Tej Patel:

very unique challenges where you want to find a perfect balance

Tej Patel:

between security and allowing learning and teaching to take

Tej Patel:

place for our students. Right. Classroom instructions nowadays,

Tej Patel:

right? Particularly throughout the pandemic, and the journeys

Tej Patel:

that we all went through, how do we secure that kind of hybrid

Tej Patel:

environment where we live in an increasingly interconnected

Tej Patel:

world? Right. So these are some of the unique challenges that we

Tej Patel:

have from a business perspective that I find it extremely

Tej Patel:

challenging to manage, and make sure that we are able to find a

Tej Patel:

perfect balance, where we are not hindering the progress of

Tej Patel:

faculties and students. So those are a few few things come in

Tej Patel:

mind.

Dr. Dave Chatterjee:

That makes a lot of sense. In fact, as you

Dr. Dave Chatterjee:

were articulating the challenges, I was reflecting on

Dr. Dave Chatterjee:

my experiences and expectations as an academic, the faculty

Dr. Dave Chatterjee:

members would like to operate in a very autonomous and open kind

Dr. Dave Chatterjee:

of an environment and environment that would enable

Dr. Dave Chatterjee:

the pursuit of research and teaching as freely and

Dr. Dave Chatterjee:

independently as possible. However, as you rightly pointed

Dr. Dave Chatterjee:

out, there is a lot of sensitive data that needs to be carefully

Dr. Dave Chatterjee:

managed, protected, we're talking about intellectual

Dr. Dave Chatterjee:

property, student data, library resources, and more. So the

Dr. Dave Chatterjee:

challenge lies in enabling the university pursue its mission as

Dr. Dave Chatterjee:

safely and securely as possible. Is that a fair understanding of

Dr. Dave Chatterjee:

the fundamental challenge?

Tej Patel:

It's more about understanding a researchers'

Tej Patel:

needs versus wants. I think that's where we draw the line.

Tej Patel:

But more importantly, building that trust and relationship that

Tej Patel:

is so critical, that allows my team and myself to have a

Tej Patel:

conversation with our researchers to fully understand

Tej Patel:

what exactly are they trying to achieve. And once we understand

Tej Patel:

their needs and requirements, we are able to create custom

Tej Patel:

solutions that allowed them to flourish and produce the amount

Tej Patel:

of work that they're committed to do. But we also take this

Tej Patel:

opportunity to educate them as well. So it's a learning on both

Tej Patel:

sides, right. And I think that's the most important thing that we

Tej Patel:

all need to understand that it begins, we need to have a

Tej Patel:

dialogue where both parties are able to understand like, right

Tej Patel:

before this call, you mentioned, make sure if I use any acronyms,

Tej Patel:

I spell it out. Right. And this goes same for a lot of our

Tej Patel:

faculty members who are tremendous researchers, they are

Tej Patel:

10X knowledgeable compared to some of us in our team. But

Tej Patel:

there is that's their expertise. And we have our own expertise.

Tej Patel:

The goal is to how do we bring both expertise together to meet

Tej Patel:

that digital ambition for that particular individual faculty.

Tej Patel:

And when that happens, a lot of great solutions come to life,

Tej Patel:

right? Most recently, we partnered with one of the

Tej Patel:

faculty where we were able to create a closed VLAN network

Tej Patel:

where he was able to conduct his research. And our CISO was also

Tej Patel:

happy that this this partnership took place because we also

Tej Patel:

reduced the overall risk that is associated with this kind of

Tej Patel:

setup. And lot of time, then we document all of this in our

Tej Patel:

exception processes. And everyone was it was a win-win

Tej Patel:

for both where the researchers were allowed to conduct their

Tej Patel:

research, the security folks and the network folks said that

Tej Patel:

providing this environment in the most secure possible way

Tej Patel:

that we could. And and this is the type of partnership that

Tej Patel:

will be required to address some of the challenges. Dave, there's

Tej Patel:

one more thing I also wanted to mention around the challenges,

Tej Patel:

right, there are two specific challenges that I believe were

Tej Patel:

unique to Higher Ed as well. Number one is having

Tej Patel:

non-centralized security perform on campus, right? Because you

Tej Patel:

know, the larger the organization, the larger the IT

Tej Patel:

teams and the research that take place in a localized area,

Tej Patel:

right? And they all have independent systems, how do you

Tej Patel:

bring them together? Right. And the second one is, majority of

Tej Patel:

the universities are still dealing with outdated systems,

Tej Patel:

whether it's desktop systems or service systems. And that also

Tej Patel:

creates rather unique challenges to keep up with what's happening

Tej Patel:

in the security. So those are a few things that probably we need

Tej Patel:

to pay very close attention to.

Dr. Dave Chatterjee:

very true. In fact, when he talked about

Dr. Dave Chatterjee:

the importance of a collaborative relationship, it

Dr. Dave Chatterjee:

brought to mind a podcast that I just published today, where the

Dr. Dave Chatterjee:

guest talks about transitioning to the cloud, and how they were

Dr. Dave Chatterjee:

very successful. Because it was an all hands on deck, kind of an

Dr. Dave Chatterjee:

operation. Everybody was engaged. Everyone recognize that

Dr. Dave Chatterjee:

this organization, which was the American Cancer Society, they

Dr. Dave Chatterjee:

couldn't lose any more money because money was needs to go to

Dr. Dave Chatterjee:

research and not be spent on on it operating costs. So they were

Dr. Dave Chatterjee:

doing their best to optimize operations. So that's an

Dr. Dave Chatterjee:

interesting story. But essentially what he was trying

Dr. Dave Chatterjee:

to say is, is is is similar to what you're saying, is that The

Dr. Dave Chatterjee:

importance of collaboration. That brings up the next

Dr. Dave Chatterjee:

question, you know, a university setting different schools,

Dr. Dave Chatterjee:

different departments doing so many different things. And you

Dr. Dave Chatterjee:

gave us this example of helping a particular researchers set up

Dr. Dave Chatterjee:

a virtual LAN so they could securely, you know, exchange

Dr. Dave Chatterjee:

information with their colleagues in other parts of the

Dr. Dave Chatterjee:

world. How do you keep up with all the activities that's going

Dr. Dave Chatterjee:

on across campus or at satellite locations? If you'll have

Dr. Dave Chatterjee:

satellite locations? What's the mechanism in place where you

Dr. Dave Chatterjee:

would be forewarned, people will feel the need to say, hey, we

Dr. Dave Chatterjee:

need to talk to the security office, because this has some

Dr. Dave Chatterjee:

serious security implications that we want to make sure that

Dr. Dave Chatterjee:

we are doing doing it the right way.

Tej Patel:

I think that's, that's a very good question,

Tej Patel:

Dave. Again, and there are some specific steps that we have

Tej Patel:

taken to to gain that visibility campus wide, right, whether it's

Tej Patel:

one campus or multi multiple campus. The first and first most

Tej Patel:

important thing is, is having a solid cybersecurity program and

Tej Patel:

governance that will guide us through some of those challenges

Tej Patel:

that you describe in your question. For example, how are

Tej Patel:

we partnering with procurement? Is our CISO and, and, and CIO

Tej Patel:

involved in some of the new contracts that are being

Tej Patel:

reviewed or drafted? Are we following hacker guidelines? Are

Tej Patel:

we following certain steps to ensure that privacy and other

Tej Patel:

standards are being followed? So there are a lot of things that

Tej Patel:

we have changed our practices to make sure that we instill the

Tej Patel:

culture of cybersecurity in our business from day one, right? So

Tej Patel:

before even a software platform shows up on our campus, we have

Tej Patel:

some visibility, and IT and and the Security office are part of

Tej Patel:

this conversation. That's number one. Number two is what happens

Tej Patel:

once all these platforms and activities are taking place on

Tej Patel:

campus, right? It requires solid 24/7 monitoring, right? So we

Tej Patel:

have partnered with external vendors, for example, we have

Tej Patel:

24/7 SOC center, a security operation centers where we are

Tej Patel:

we are monitoring and detection and response takes place in that

Tej Patel:

area, right? We have developed risk profiles, where we are able

Tej Patel:

to look at university wide between manage assets and non

Tej Patel:

managed assets. Where do we stand overall, in terms of patch

Tej Patel:

management, OS deployments and all of that, right? And the last

Tej Patel:

and the most important is network monitoring and

Tej Patel:

partnership with our network ISP provider, right? How do we work

Tej Patel:

with them to make sure that we have a good visibility

Tej Patel:

throughout our entire network, whether it's wired or physical,

Tej Patel:

and that is what allows us at a very high level, to make sure

Tej Patel:

that if we see some activities like Bitcoin mining or what have

Tej Patel:

you, that's taking place, we are able to stop the problem before

Tej Patel:

it becomes a larger issue. So those are some of the steps we

Tej Patel:

take very proactively on a daily basis. And then on a weekly and

Tej Patel:

bi-weekly basis, we have executive updates as well, where

Tej Patel:

I get briefed on on certain incidents that takes place

Tej Patel:

certain projects that are moving on, or just simply speaking,

Tej Patel:

just just review of some of the KPIs that we have built around

Tej Patel:

to improve our security posture.

Dr. Dave Chatterjee:

Makes a lot of sense. So you mentioned about

Dr. Dave Chatterjee:

creating a collaborative learning environment, where your

Dr. Dave Chatterjee:

unit is learning about the researchers, about what they do,

Dr. Dave Chatterjee:

and they're learning about the role of Information Technology,

Dr. Dave Chatterjee:

Information Security personnel. So, you are essentially feeding

Dr. Dave Chatterjee:

off each other's knowledge and expertise. And that's great. In

Dr. Dave Chatterjee:

that spirit, how feasible is it to provide every unit, every

Dr. Dave Chatterjee:

department with a customized do's and don'ts list?

Tej Patel:

I would, for us at least, that journey starts as

Tej Patel:

part of our onboarding process, particularly speaking faculty

Tej Patel:

orientation, there are very specific sessions geared towards

Tej Patel:

data security and privacy. They were we walk the new onboarding

Tej Patel:

faculty members, the resources that they have available, how to

Tej Patel:

partner with IT. And this goes back to your do's and don'ts,

Tej Patel:

Don's. Not going to go into a lot of details there. But at a

Tej Patel:

very high level, we provide the data classification review, and

Tej Patel:

what that entails right. High, medium, low risk, and where and

Tej Patel:

how they should partner with IT, and the Security to ensure that

Tej Patel:

the data that they are acquiring or sharing, it meets some of

Tej Patel:

those guidelines. Followed by once they determine their high

Tej Patel:

medium risk data, there are some specific guidelines that have

Tej Patel:

been put together, whether it's related to Cloud Storage, or

Tej Patel:

servers or virtual servers, or what have you. And that guides

Tej Patel:

them to have to make sure that this data and the systems remain

Tej Patel:

secure. Furthermore, there are certain there are specific

Tej Patel:

instructions that we also provide because many of these

Tej Patel:

faculty work with graduate students as well. And we have

Tej Patel:

very specific guidelines for for them as well whenever CISO meets

Tej Patel:

with them actually on a regular basis to make sure that these

Tej Patel:

guidelines are being followed. And the last one is we created a

Tej Patel:

dotted reporting structure, sort of, where the local tier system

Tej Patel:

administrator and researchers, they work very closely with our

Tej Patel:

systems and infrastructure group, where they have learned

Tej Patel:

to share some of the details at the system level to make sure

Tej Patel:

they are following the best practices, whether it's a Zero

Tej Patel:

Trust framework, or NIST framework that we are adopting

Tej Patel:

and deploying some of the controls to make sure that

Tej Patel:

university wide we have a similar controls applied and

Dr. Dave Chatterjee:

Okay. Good to know, good to know. So let's

Dr. Dave Chatterjee:

configured.

Dr. Dave Chatterjee:

talk a little bit about the CIO-CISO relationship. You know,

Dr. Dave Chatterjee:

you keep referring to we we we, which sounds great actually

Dr. Dave Chatterjee:

seems like you're a very integrated, cohesive team. But

Dr. Dave Chatterjee:

what is your vision of an ideal CIO-CISO relationship?

Tej Patel:

It's a it's a great question. And there's so much

Tej Patel:

debate going on, right? Do you couple them, do you decouple

Tej Patel:

them? What's the reporting structure looks like and this

Tej Patel:

and that, right? There are three main topics that a lot of folks

Tej Patel:

talk about right one where CISO reports to CIO, one where a CISO

Tej Patel:

reports to the CEO or President. Right. And I think the third one

Tej Patel:

nowadays, the new one that I hear is the CISO reports to the

Tej Patel:

CPO, the chief privacy officer, right? That's it. Those are the

Tej Patel:

three themes I have seen. But really the way I look at it,

Tej Patel:

it's not so much about reporting structures. It's more about how

Tej Patel:

a CISO and CIO can partner together to deliver the message

Tej Patel:

that cybersecurity or security is a strategic value service for

Tej Patel:

any institution and organization. Right. This is

Tej Patel:

something that is beyond CIO and CISO relation. It's about

Tej Patel:

instilling a culture of security at large and institution, right?

Tej Patel:

How do we leverage and implement governance structure around

Tej Patel:

security that allows us to bring together, work together, right.

Tej Patel:

For me, the CISO does report to me, but one of the major changes

Tej Patel:

that we instilled is the CISO also has dotted reporting into

Tej Patel:

our Audit and Risk committee as well for full transparency and

Tej Patel:

visibility. And that's the way I look at it, right? We don't want

Tej Patel:

to control anything, but how do we bring information to life?

Tej Patel:

How do we share some of these learnings lesson learned? Right?

Tej Patel:

And how can we be transparent with the community and the

Tej Patel:

Board? That what are some of the challenges? What are some of the

Tej Patel:

things we are doing well, and what are some of the deltas that

Tej Patel:

we need to constantly adapt and and proactively address some of

Tej Patel:

those right? And the last and the most important, which I also

Tej Patel:

pointed out earlier, right? The role of CISO and CIO, in my

Tej Patel:

view, is more towards reducing the business risk nowadays,

Tej Patel:

right? It's all about risk management there. Right? It's

Tej Patel:

not about technology, cybersecurity, 10 years ago, it

Tej Patel:

was all about bits and bytes, right? But now, if you look at

Tej Patel:

the CISO, who understands bits and bytes, but also pays very

Tej Patel:

close attention to figuring out the business risk, and how to

Tej Patel:

manage that business risk and works with CIO very closely as a

Tej Patel:

peer. They are the ones who are going to make sure that the

Tej Patel:

institution or the organization remains safe. And they could

Tej Patel:

provide the value added services that any organization will

Tej Patel:

benefit from. So that's the way I look at that CIO CISO.

Tej Patel:

relationship in today's world.

Dr. Dave Chatterjee:

I couldn't agree with you more. That's a

Dr. Dave Chatterjee:

very holistic approach. It's a very pragmatic and practical

Dr. Dave Chatterjee:

approach. And as you said, one can always debate the different

Dr. Dave Chatterjee:

reporting relationships. And each reporting approach has its

Dr. Dave Chatterjee:

pros and cons, there is no one perfect approach. Absolutely.

Dr. Dave Chatterjee:

But the extent to which you can strike that balance where there

Dr. Dave Chatterjee:

is independence, yet, there is cohesion, you don't want to

Dr. Dave Chatterjee:

create a situation where the structure is such that you have

Dr. Dave Chatterjee:

a competing relationship where it becomes you know, then then

Dr. Dave Chatterjee:

we have constant have conflicts. And that's what you want to

Dr. Dave Chatterjee:

avoid, because they have to address the different pieces of

Dr. Dave Chatterjee:

the puzzle so that, you know, each has a certain role to play.

Dr. Dave Chatterjee:

I have a couple of follow ups for you. Absolutely. I'm so glad

Dr. Dave Chatterjee:

that you talked about transparency, I feel very

Dr. Dave Chatterjee:

strongly about it, that the keeping the various stakeholders

Dr. Dave Chatterjee:

informed about where the organization is, in terms of

Dr. Dave Chatterjee:

readiness, what are the possibilities? Without, you

Dr. Dave Chatterjee:

know, again, when you are transparent, you're mindful that

Dr. Dave Chatterjee:

any and everybody is not getting the information. But you don't

Dr. Dave Chatterjee:

want the stakeholders to be surprised that what happened? We

Dr. Dave Chatterjee:

never knew anything about this. Why didn't you brief us? So the

Dr. Dave Chatterjee:

fact that you mentioned about transparency and regular

Dr. Dave Chatterjee:

reporting to the board and to the other stakeholders, that is

Dr. Dave Chatterjee:

definitely very reassuring. You wanted to say something I'm

Dr. Dave Chatterjee:

sorry, I didn't mean to,

Tej Patel:

One of the example I was going to share with you in

Tej Patel:

this audience is, is there are ways to craft business cases

Tej Patel:

together that improve user experiences overall, right. And

Tej Patel:

that's the strength when you have CISO and CIO working

Tej Patel:

together, one trying to bring that efficiency or tools or

Tej Patel:

platforms versus one is making sure that the tools and the

Tej Patel:

platforms that that we are we are adding to our ecosystem is

Tej Patel:

being managed securely, data is being protected. And that's the

Tej Patel:

type of environment that that will be very successful in the

Tej Patel:

coming days.

Dr. Dave Chatterjee:

Yeah, yeah, true. The other thing that I

Dr. Dave Chatterjee:

wanted to touch upon was culture. In my book that I

Dr. Dave Chatterjee:

published last year through sage publishing, I talk about the

Dr. Dave Chatterjee:

importance of creating and sustaining a high-performance

Dr. Dave Chatterjee:

information security culture. Commitment, preparedness, and

Dr. Dave Chatterjee:

discipline are the cornerstones of the proposed high-performance

Dr. Dave Chatterjee:

information security culture, in my book. Each of these cultural

Dr. Dave Chatterjee:

dimensions -- commitment, preparedness, and discipline --

Dr. Dave Chatterjee:

are associated with a set of success factors. I don't want to

Dr. Dave Chatterjee:

get into all the details of how to create and sustain such a

Dr. Dave Chatterjee:

security culture, because that's something that one can pick up

Dr. Dave Chatterjee:

from reading the book. However, it would be valuable, if you

Dr. Dave Chatterjee:

could share an example of how you and your team brought about

Dr. Dave Chatterjee:

a change in the security culture at your institution.

Tej Patel:

I think that's, that's a very good question. And

Tej Patel:

we could have conversation about that probably for hours. But at

Tej Patel:

a very high level, I will touch upon a little bit where I talked

Tej Patel:

about Protect Stevens cybersecurity program, part of

Tej Patel:

that program, there are a few things that we did that I'm very

Tej Patel:

proud of. Number one, we made certain tools available to our

Tej Patel:

entire community at no cost, right. For example, our entire

Tej Patel:

faculty, staff, student community enjoys LastPass and

Tej Patel:

and anti-virus that they're able to download at no cost, because

Tej Patel:

we wanted to make sure that no matter what environment they're

Tej Patel:

working from, no matter what devices they're working from,

Tej Patel:

it's safe. So for us, our approach starts from their home

Tej Patel:

security, right? How do we make sure that that our users are

Tej Patel:

fully aware of what's happening? So we wanted to make sure that

Tej Patel:

tools are provided. That's number one. Second, we made sure

Tej Patel:

that they were provided periodic security awareness training,

Tej Patel:

right? There was some gamification and all of that and

Tej Patel:

based on how they did they were rewarded certain things as well.

Tej Patel:

Right? We celebrate Cybersecurity Awareness month

Tej Patel:

where the CISO and CIO together provide state of the

Tej Patel:

cybersecurity at the University and it's an open event to

Tej Patel:

faculty, staff and students. Again, this goes back to the

Tej Patel:

creating that culture of fairness and transparency. It

Tej Patel:

begins With CIO and CISO goes all the way to faculty, staff

Tej Patel:

and students. Right. This is how we approach today's

Tej Patel:

cybersecurity at Stevens, Dave. And it has been very successful,

Tej Patel:

it generates a lot of dialogue among the community. And the

Tej Patel:

last one that I should also add is to our student program, we

Tej Patel:

also hire cybersecurity undergrad and grad students as

Tej Patel:

well who work very closely on our CSIS team, right? Whether

Tej Patel:

it's cybersecurity or physical security, because we might

Tej Patel:

monitor and manage both of those system, and they help us improve

Tej Patel:

some of those experience from their own experiences, they come

Tej Patel:

and tell us this, this is working, this is not working,

Tej Patel:

and we try to learn and adopt from them. So these four things,

Tej Patel:

I find that we have done it very well, that builds the culture

Tej Patel:

that we talked about.

Dr. Dave Chatterjee:

Fabulous, I'm so happy to learn that you

Dr. Dave Chatterjee:

are providing students with hands-on experience by involving

Dr. Dave Chatterjee:

them in different cybersecurity projects. Duke University is

Dr. Dave Chatterjee:

another institution that does that. And I'm sure there are

Dr. Dave Chatterjee:

many others doing the same. You also talked about making

Dr. Dave Chatterjee:

available the various security tools for free. So there are no

Dr. Dave Chatterjee:

excuses, excellent! Securing the student population can be a big

Dr. Dave Chatterjee:

challenge, and it's heartening to hear the many concrete steps

Dr. Dave Chatterjee:

you're taking to deal with this challenge. At this time, it

Dr. Dave Chatterjee:

might be a good idea to revisit this important aspect of

Dr. Dave Chatterjee:

securing an academic institution. So what steps do

Dr. Dave Chatterjee:

you all take to secure the student population as best as

Dr. Dave Chatterjee:

possible?

Tej Patel:

The majority of the breaches happen not through any

Tej Patel:

highly sophisticated cyber attacks, right? It happens

Tej Patel:

because of basic controls are lacking. Some fundamentals

Tej Patel:

training haven't been provided, patch management, and and what

Tej Patel:

have you. So at the very minimum, what we try to do is we

Tej Patel:

regularly communicate with our student community. I have a CIO

Tej Patel:

Student Advisory. So we also leverage that advisory committee

Tej Patel:

to make sure the word gets out about phishing, scam, right?

Tej Patel:

Password practices, and all of that. But that's creates a very

Tej Patel:

good, a very aware community. So next time when these phishing

Tej Patel:

attacks are happening, they know that these are not legit, and

Tej Patel:

they know how to report it. Right. So that's the very low

Tej Patel:

hanging fruit for us. But it pays a high dividend, right?

Tej Patel:

That's one thing. Second one is, there are very specific controls

Tej Patel:

that we take in the backend infrastructure side, right?

Tej Patel:

Whether it's bringing a new device on our network, right,

Tej Patel:

how do you authenticate that? Are we using two-step

Tej Patel:

authentication, multifactor authentication, and all of that,

Tej Patel:

are they connecting to wide network or a wireless network

Tej Patel:

and what have you, and we use very specific VLANs and taggings

Tej Patel:

that takes place where if you know, this individual is a user,

Tej Patel:

we put them in a separate network environment where it's

Tej Patel:

completely separate from, from our day to day business

Tej Patel:

operations, for example, right? The same concept applies for

Tej Patel:

gaming consoles and IoT device, we have a complete separate

Tej Patel:

mechanism for onboarding and monitoring that kind of network.

Tej Patel:

And those are some of the the steps that we have taken that

Tej Patel:

that we find that that has been working very well. And also

Tej Patel:

remember, we want to make sure the user experience stays as is

Tej Patel:

where they don't have to contact IT for every day. How do I

Tej Patel:

connect my console versus how do I connect to your wireless

Tej Patel:

network, right, so we also pay very close attention to find

Tej Patel:

that balance between user experiences and maintaining the

Tej Patel:

security.

Dr. Dave Chatterjee:

And you know, that brings up a thought

Dr. Dave Chatterjee:

here. One of my previous guests he talked about in his

Dr. Dave Chatterjee:

organization, which is also an academic institution, they

Dr. Dave Chatterjee:

created what is called a Champions Network. And the

Dr. Dave Chatterjee:

Champions Network comprised of students, faculty, staff, and

Dr. Dave Chatterjee:

these were the folks who were enthusiastic about securing the

Dr. Dave Chatterjee:

institution, enthusiastic about enhancing awareness. And they

Dr. Dave Chatterjee:

would serve as ambassadors, liaisons, evangelists, in their

Dr. Dave Chatterjee:

respective domains, areas. So you know, to your point, it's

Dr. Dave Chatterjee:

not possible for you to have somebody from your unit embedded

Dr. Dave Chatterjee:

everywhere. You have to find a way of getting the word out by

Dr. Dave Chatterjee:

creating those ambassadors, who can who will serve the interests

Dr. Dave Chatterjee:

of your department, of your unit as well. So I thought that that

Dr. Dave Chatterjee:

structure of creating a champions network and rewarding

Dr. Dave Chatterjee:

them and again, rewards doesn't have to be expensive, but just

Dr. Dave Chatterjee:

the recognition goes goes a long way. I just thought of putting

Dr. Dave Chatterjee:

it out there.

Tej Patel:

I think that's a fantastic way to engage with

Tej Patel:

with all all the constituents within your organization, and we

Tej Patel:

also benefit from being a technological university Dave.

Tej Patel:

So we have a lot of awareness, generally speaking, and, and the

Tej Patel:

students are sophisticated, technically sophisticated

Tej Patel:

students, right. And they are demanding. They have

Tej Patel:

expectations when they show it show up on campus. So we don't

Tej Patel:

have a champion network like that. But I feel that the

Tej Patel:

culture that we instill early on, that's, that's our

Tej Patel:

champions. So it's a community effort. It's a team sport. So

Tej Patel:

everyone's part of this Cybersecurity Awareness Campaign

Tej Patel:

for us. And they all play their their individual roles. And then

Tej Patel:

the IT team and the Security team provides innovative,

Tej Patel:

easy-to-use solution, right? 'Report a Spam' button, for

Tej Patel:

example, in your Outlook, right, that makes it easier, right? How

Tej Patel:

do you report some of the phishing attempts and all of

Tej Patel:

that. So we have also created into an intuitive environment

Tej Patel:

where they don't have to spend a lot of time to go through the

Tej Patel:

hoops to report an incident, right. So, we made it easy for

Tej Patel:

them as well. So these are the things that probably could work.

Tej Patel:

But the champion network, it's a fantastic idea.

Dr. Dave Chatterjee:

Fantastic. On a related note, I recall a

Dr. Dave Chatterjee:

discussion with the Chief Information Security Officer of

Dr. Dave Chatterjee:

another organization. He said that there is an expectation in

Dr. Dave Chatterjee:

his organization, that members will help by diligently going

Dr. Dave Chatterjee:

through their emails, and flagging the ones that deserve

Dr. Dave Chatterjee:

attention, I can totally see from where he's coming. There is

Dr. Dave Chatterjee:

no disagreement there. But it's also true that people are busy,

Dr. Dave Chatterjee:

they have to deal with so many things. So that becomes another

Dr. Dave Chatterjee:

chore for the user trying to diligently look through every

Dr. Dave Chatterjee:

email and identify the ones that are worth reporting. Where are

Dr. Dave Chatterjee:

you on this? What's your perspective?

Tej Patel:

I think it's a very complex situation where how do

Tej Patel:

we find the balance between being productive versus making

Tej Patel:

sure we are contributing towards the cybersecurity right, and I

Tej Patel:

think that's where the, it's important for the for the IT

Tej Patel:

folks to, to do a lot of things on the backend side before even

Tej Patel:

the message arrives in the inbox, right. So for example, we

Tej Patel:

use something called mail tip, I believe that's the right term,

Tej Patel:

pardon me, I'm not a CISO for example. I'm an accidental CISO

Tej Patel:

again, but so we have enabled certain mechanism to our email

Tej Patel:

platform. So if a message is coming in, it will say message

Tej Patel:

from external sender or something that automatically

Tej Patel:

alerts the user, right. The second thing is, we have

Tej Patel:

adjusted and continue to adjust our spam filtering, right, where

Tej Patel:

where we have enabled a lot of built in encryptions, or DLP, or

Tej Patel:

data loss prevention type of a policies upfront at that level

Tej Patel:

as well. And and we continue to partner with our vendors to make

Tej Patel:

sure that we remain up to date in terms of those signatures,

Tej Patel:

and all of that. So there are a lot of things we do also in the

Tej Patel:

back end to mitigate this particular risk and still be

Tej Patel:

able to manage the expectations of users. But again, if you are

Tej Patel:

so right, 90% of the emails that you get, it's either spam, sales

Tej Patel:

call, or marketing emails. Only 10% or less than of 10% are, are

Tej Patel:

legit emails that you will read, open, open, read and respond to,

Dr. Dave Chatterjee:

You make a lot of sense, when you say that

Dr. Dave Chatterjee:

it's important to do that work at the backend, use relevant

Dr. Dave Chatterjee:

tools to automate the filtering process. Through such process

Dr. Dave Chatterjee:

automation, one can take the load off the user, freeing them

Dr. Dave Chatterjee:

up to focus on their core expertise. Reminds me of a

Dr. Dave Chatterjee:

discussion that I was having with the CISO of another

Dr. Dave Chatterjee:

academic institution. When I asked him, what were some

Dr. Dave Chatterjee:

principles that guided his day to day activities, he said

Dr. Dave Chatterjee:

something very interesting. He said, Dave, we are not in the

Dr. Dave Chatterjee:

business of saying No. The first thing that I always think about

Dr. Dave Chatterjee:

is that the job of security is not to stop the institution from

Dr. Dave Chatterjee:

doing what they are formed to do. The job of security is to

Dr. Dave Chatterjee:

enable those functions, those activities, and that stayed with

Dr. Dave Chatterjee:

me, a very compelling statement. You also emphasized the

Dr. Dave Chatterjee:

importance of creating a culture of enablement, where the role of

Dr. Dave Chatterjee:

the CISO is recognized to be much more than just a security

Dr. Dave Chatterjee:

officer. They are strategic enablers, business enablers, and

Dr. Dave Chatterjee:

that's exactly how the CISO role needs to be perceived and

Dr. Dave Chatterjee:

operationalized. CIOs and CISOs must have a seat at the table

Dr. Dave Chatterjee:

when strategic decisions are being made. They can provide

Dr. Dave Chatterjee:

valuable feedback on how technology can be an enabler, on

Dr. Dave Chatterjee:

the security implications of the proposed strategic initiatives.

Dr. Dave Chatterjee:

So, treating the CIO, the CISO as strategic partners, as

Dr. Dave Chatterjee:

opposed to seeing those functions, IT and Information

Dr. Dave Chatterjee:

Security as hurdles or stumbling blocks can go a long way, in

Dr. Dave Chatterjee:

creating and sustaining a high-performance information

Dr. Dave Chatterjee:

security culture.

Tej Patel:

Dave, you're so spot on on that observation Dave. And

Tej Patel:

as I said earlier, it's about building and fostering that

Tej Patel:

trust and relationships, right, that allows the community to

Tej Patel:

come together and have this type of conversation and discussions

Tej Patel:

that will enable folks, right to make sure that they provide a

Tej Patel:

solid, secure, robust environment for them to

Tej Patel:

flourish.

Dr. Dave Chatterjee:

Awesome, awesome. Well, like you said

Dr. Dave Chatterjee:

that we can have this discussion forever. But we don't want to go

Dr. Dave Chatterjee:

too long. For the sake of the listeners, we want to keep it

Dr. Dave Chatterjee:

short and sweet. So as we wrap up the session, I want you to,

Dr. Dave Chatterjee:

of course, you know, talk about anything you want. But also

Dr. Dave Chatterjee:

think about anything that you'd like to share from the

Dr. Dave Chatterjee:

standpoint of how organizations should prepare for cyber

Dr. Dave Chatterjee:

attacks. And what does it take to effectively execute plans on

Dr. Dave Chatterjee:

a sustained manner? As you know, we have plans, we're always

Dr. Dave Chatterjee:

planning, strategizing, but everybody is not good at

Dr. Dave Chatterjee:

executing when the time comes. So I'll leave it. I'll leave it

Dr. Dave Chatterjee:

at that. I'll let you take over from here.

Tej Patel:

I think that's that's a really, really great question.

Tej Patel:

Do you know, and I think we can write a dissertation paper on

Tej Patel:

that together, actually, when you specifically talk about

Tej Patel:

operational excellence and change management, right. But,

Tej Patel:

let me let me take a different approach to answer this

Tej Patel:

question, right. Let's look at it from a strategic side. And

Tej Patel:

then from an operational side, right. From a strategic

Tej Patel:

perspective, right, I think the organization must spend

Tej Patel:

sufficient time effort and resources to build a

Tej Patel:

security-centric culture, right? They need to look at security

Tej Patel:

from business lenses, period, they must be involved at a top

Tej Patel:

level, whether it's Board or CEO for corporate or President at a

Tej Patel:

higher level, right? They need to implement frameworks and

Tej Patel:

architectures, right, that are well aligned with particular

Tej Patel:

business needs. And more importantly, I'll take it to the

Tej Patel:

next level where it must be aligned with cloud-smart

Tej Patel:

initiatives. Right? Those are certain things, I would look at

Tej Patel:

it from a strategic perspective. And the last one I would add is

Tej Patel:

find the talent that will help you achieve what I'm about to

Tej Patel:

talk about next. Right. So that's from from more of a

Tej Patel:

strategic perspective. And in that you would have a

Tej Patel:

cybersecurity program that you will work with engage with the

Tej Patel:

community to come up with a program that addresses certain

Tej Patel:

things, right. And this is something from my own learning

Tej Patel:

from Protect Stevens and the IAM program that we launched, right?

Tej Patel:

Implement solid plans for training and phishing awareness,

Tej Patel:

implement some controls for endpoint device management.

Tej Patel:

That's a big challenge. I didn't talk about that earlier on

Tej Patel:

there. Every faculty staff students have multiple devices,

Tej Patel:

grant issued personal what have you. Have a solid 24/7 SOC

Tej Patel:

center monitoring that allows you that extended detection and

Tej Patel:

response that you need, right. We talked a little bit about

Tej Patel:

network segmentations, and then make sure that there are certain

Tej Patel:

things that we want to also focus on within that program, is

Tej Patel:

make sure you have a return incident response plan, right.

Tej Patel:

This is more operational, but it's needed, right? Make sure

Tej Patel:

you you you draft confidentially agreements for employees,

Tej Patel:

vendors and visitors. Many folks still don't pay close attention

Tej Patel:

to visitors. And this goes back to like, you know, having low

Tej Patel:

hanging fruit and attack surfaces, right. Regularly

Tej Patel:

perform data discovery and privacy reviews for risk

Tej Patel:

assessment, right. We perform at least two penetration testing.

Tej Patel:

We also include social engineering aspect of it. So,

Tej Patel:

make sure we do that. And one last topic is review your

Tej Patel:

onboarding and offboarding processes. So important, so

Tej Patel:

critical. And for all the folks who are listening from an IT

Tej Patel:

perspective, adopt these four basic practices. If he can't do

Tej Patel:

all of that for for financial resources or otherwise, make

Tej Patel:

sure you have a solid password management practices, implement

Tej Patel:

multifactor authentication, provide solid user awareness

Tej Patel:

training and timely update systems. I hope it covers your

Tej Patel:

question.

Dr. Dave Chatterjee:

Oh, brilliant, absolutely brilliant.

Dr. Dave Chatterjee:

You know, there's a reason why you do what you do. And you do

Dr. Dave Chatterjee:

it so well. I think you addressed it brilliantly. And as

Dr. Dave Chatterjee:

you were talking, I was just thinking about the vastness of

Dr. Dave Chatterjee:

the attack surfaces and the various ways that these surfaces

Dr. Dave Chatterjee:

can be compromised. For lack of a better word, organizations,

Dr. Dave Chatterjee:

individuals, are sitting ducks. Despite your best efforts, there

Dr. Dave Chatterjee:

could still be a loophole that somebody could find and drive

Dr. Dave Chatterjee:

right through. But having said that, just like you said, you

Dr. Dave Chatterjee:

have to do the basics, right. Do the fundamentals, right. I'm

Dr. Dave Chatterjee:

sure you might agree that there's also some wisdom in

Dr. Dave Chatterjee:

prioritizing what you want to secure, at what level. Because

Dr. Dave Chatterjee:

it's impossible to secure everything. And so you have to

Dr. Dave Chatterjee:

prioritize and then focus your security strategy, your

Dr. Dave Chatterjee:

defense-in-depth strategy accordingly. So this way, it's a

Dr. Dave Chatterjee:

more of a manageable, feasible kind of plan. And finally, from

Dr. Dave Chatterjee:

my standpoint, finally, I'm a big fan of, make sure that you

Dr. Dave Chatterjee:

work closely with with legal because the unfortunate

Dr. Dave Chatterjee:

consequences often result in the courtroom where you're having,

Dr. Dave Chatterjee:

you're being sued, and you having to defend yourself. So

Dr. Dave Chatterjee:

make sure you're totally familiar with the laws, the

Dr. Dave Chatterjee:

regulations, the standards, and you're in compliance, so that

Dr. Dave Chatterjee:

when unfortunate events happen, and when you have to present how

Dr. Dave Chatterjee:

you have been governing, managing security, you look good

Dr. Dave Chatterjee:

out there that you did your best, and despite your best

Dr. Dave Chatterjee:

efforts, things went wrong. As opposed to, it was sloppy, or it

Dr. Dave Chatterjee:

was negligent, which is something I'm sure everybody

Dr. Dave Chatterjee:

would like to avoid. But again, I'd like to give you the final

Dr. Dave Chatterjee:

word. So please.

Tej Patel:

Absolutely, I think I think you're so spot on that.

Tej Patel:

And I will take it to a further as well, right, that the

Tej Patel:

incident response plan that I briefly touched upon, that

Tej Patel:

should also include your cyber insurance provider as well,

Tej Patel:

right. And they will bring in all the legal help. And because

Tej Patel:

different states have different regulations nowadays in terms of

Tej Patel:

what you report and what you don't write. But I think someone

Tej Patel:

recently shared some statistics about cyber attacks, right? It

Tej Patel:

was something around like it happens every 39 seconds, the

Tej Patel:

ransomware attacks are targeted every 14 seconds, and only 10%

Tej Patel:

gets reported. Right. And to make it even this this whole

Tej Patel:

cybersecurity economy, they're expecting it will grow to $10

Tej Patel:

trillion by 2025. Right? I mean, this is fascinating numbers,

Tej Patel:

like, you know, how do you keep up with all of this Dave? So,

Tej Patel:

again, you have to go back to the basics, do the basics,

Tej Patel:

right. Make sure you're transparent. Make sure you you

Tej Patel:

find good people on your team who are stewards of good

Tej Patel:

security, hygiene and, and and do your your best efforts on a

Tej Patel:

daily basis. Right.

Dr. Dave Chatterjee:

Fantastic. Well, with that we'll conclude

Dr. Dave Chatterjee:

our discussion for today. Thanks again Tej, for the wonderful

Dr. Dave Chatterjee:

insights. I so appreciate it. I know listeners are also very

Dr. Dave Chatterjee:

grateful.

Tej Patel:

Dave, thanks for having me. And I really enjoyed

Tej Patel:

our conversation. Thanks again.

Dr. Dave Chatterjee:

A special thanks to Tej Patel for his time

Dr. Dave Chatterjee:

and insights. If you like what you heard, please leave the

Dr. Dave Chatterjee:

podcast a rating and share it with your network. Also,

Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.

Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next

Dr. Dave Chatterjee:

episode.

Introducer:

The information contained in this podcast is for

Introducer:

general guidance only. The discussants assume no

Introducer:

responsibility or liability for any errors or omissions in the

Introducer:

content of this podcast. The information contained in this

Introducer:

podcast is provided on an as-is basis with no guarantee of

Introducer:

completeness, accuracy, usefulness, or timeliness. The

Introducer:

opinions and recommendations expressed in this podcast are

Introducer:

those of the discussants and not of any organization.

About the Podcast

Show artwork for The Cybersecurity Readiness Podcast Series
The Cybersecurity Readiness Podcast Series
with Dr. Dave Chatterjee

About your host

Profile picture for Dave Chatterjee

Dave Chatterjee

Dr. Debabroto 'Dave' Chatterjee is tenured professor in the Management Information Systems (MIS) department, at the Terry College of Business, The University of Georgia (UGA). He is also a Visiting Scholar at Duke University, affiliated with the Master of Engineering in Cybersecurity program in the Pratt School of Engineering. An accomplished scholar and technology thought leader, Dr. Chatterjee’s interest and expertise lie in the various facets of information technology management – from technology sense-making to implementation and change management, data governance, internal controls, information security, and performance measurement. His work has been accepted and published in prestigious outlets such as The Wall Street Journal, MIT Sloan Management Review, California Management Review, Business Horizons, MIS Quarterly, and Journal of Management Information Systems. Dr. Chatterjee’s research has been sponsored by industry and cited over two thousand times. His book Cybersecurity Readiness: A Holistic and High-Performance Approach was published by SAGE Publishing in March 2021.