I recently had the honor of working with a global panel of leaders from across the higher education landscape contributing to the 2021 EDUCAUSE Horizon Report | Information Security Edition| Information Security Edition. In this report, the Horizon panelists began with a blank slate and were tasked with identifying the technologies and practices they believed would have a significant impact on the future of higher education information security.
Research security was one of the practices highlighted -and for good reason. We've seen in the news that opportunistic cybercriminals and nation-state actors are targeting COVID-19 vaccine and treatment research. Although these attempts to steal intellectual property or disrupt progress are newsworthy, pandemic-related information is not the only research at risk. According to the NSF, total university-performed R&D surpasses$64 billion a year, and the sad truth is that all such research is increasingly under attack by hackers.
Cyber defense was never easy, but the increased focus by cybercriminals and the nature of higher education make it particularly challenging to protect research environments. Industry and higher education need to partner closely to develop and deploy the right tools and make sure they work together to protect research environments and respond immediately to threats.
What makes research a target? To paraphrase Willie Horton, "That's where the money is." Researchers are developing valuable data that criminals can sell and nation-states can leverage. Several other unique challenges likely also make research institutions attractive to hackers:
Research labs might also be subject to requirements as a condition of receiving grant funding. Given that over$30 billion per year of research funding in the US comes from the federal government, the Cybersecurity Maturity Model Certification (CMMC) is looking like it will be the toughest of those requirements. The Department of Defense is starting to require it for their contracts, and civilian agencies are talking about using it too. It is based upon NIST SP800-172 capabilities but adds requirements from the Federal Acquisition Regulations (FAR) and Defense Federal Acquisition Regulations (DFAR). Moreover, you can no longer self-certify that you meet CMMC requirements: to bid for funding, you must be certified by an approved auditor.
The path to defend research will depend on both institutional goals and the needs of researchers. As your technology solutions partner, our job is to roll up our sleeves and help your institution implement an effective cybersecurity environment that meets your specific requirements.
How can industry and academia partner to prepare for secure research environments?
Protecting your university research data from cybercriminals is critical to success. As your industry partner, we are proud to help you meet your research and innovation goals, while deploying effective, seamless, and integrated security.
>> Facilitate safety and security at your institution