iTnews

University of Melbourne to upgrade endpoint security as five-year program progresses

By Ry Crozier on Jan 12, 2021 6:55AM
University of Melbourne to upgrade endpoint security as five-year program progresses

Brings in consultancy, ACSC to bolster protections.

The University of Melbourne will deploy endpoint detection and response technology across its IT environment this year and improve its access to threat intelligence as part of a broader five-year cyber security uplift.

Details of the uplift - which is currently in its second year - are contained in a submission [pdf] by the University to a federal inquiry into national security risks affecting the Australian higher education and research sector.

The first year of the uplift had focused on reducing the university’s “vulnerability to cyber threats while balancing a practical need for platforms that support academic autonomy and collaboration,” it said.

“In line with the experience of tertiary education providers around the world, the university routinely encounters and defends against cyber security threats, including sophisticated attacks that cannot be attributed to any known threat actors.

“The university is cognisant of the fact that advanced persistent threat (APT) actors regularly test [our] defences.”

The university said it had recently run a threat modelling exercise with an external consultancy to “provide a better understanding of the threats the university faces, but will also generate a controls library that will be mapped to an industry standard framework (NIST).”

“This project will additionally generate a list of risks, associated threats, and clarify the university’s effectiveness of response, all leading to a stronger cybersecurity ecosystem,” it noted.

In addition, with biomedical researchers at the university conducting various Covid-19 work, the university said it had collaborated with the Australian Cyber Security Centre (ACSC) “to run a cyber hygiene improvement programs (CHIPs) scan to provide the university with information for the purpose of visibility, analysis and risk management.”

As the university moves into the second year of its five-year uplift, it intends to introduce “an endpoint detection and response (EDR) capability into its IT environment.”

“This will enhance the cyber security team’s ability to rapidly respond to threats even in remotely located university assets,” the university said.

“[The EDR] will be augmented by consuming a commercial threat intelligence feed to identify TTPs [tactics, techniques and procedures] for advanced threat actors and risk conditions. 

“In addition, a proactive threat hunting program will also be introduced to provide additional visibility into the environment.”

The university said it had doubled the size of its cyber security team over the past two years.

It has also rolled out multifactor authentication (MFA) for all staff accounts, and will do the same for student accounts sometime this year.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
edreducationitendpointsecuritythreatuniversity of melbourne

Partner Content

Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
Vast majority of surveyed firms still rely on password authentication
Promoted Content Vast majority of surveyed firms still rely on password authentication
DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Ry Crozier
Jan 12 2021
6:55AM
0 Comments

Related Articles

  • Swinburne gets funding for cyber security teaching
  • CBA staff mastering cyber security in UNSW pilot
  • ANU to go passwordless
  • NSW Education had unknown vulnerability in breached system
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.