CSG Meeting, January 12, 2016. 2016 Top 10 Strategic Technologies.

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

Police Leadership Review Horizon Scanning and Interpretation January 2015 Professor Harry Scarbrough.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Improving Access and Career Opportunities Widening Participation - It matters!
© 2011 EDUCAUSE Identity Management in Higher Education, 2011 Mark Sheehan May 2011.
Today’s Speakers  Diane Dagefoerde, CIO, Arts and Sciences, The Ohio State University  Butch Juelg, Associate Vice Chancellor, Technology Services,
EDUCAUSE Center for Applied Research An Update. New EDUCAUSE Initiatives for 2002 EDUCAUSE Core Data Survey Virtual Communities Initiative Institute for.
Leaders of African-Descent Power of One Mentoring Program Presented by: William Nixon, VP of Operations - Professional Development.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
Outcomes-Based Funding: Design Principles and State Examples Outcomes-Based Funding: The Indiana Experience Teresa Lubbers, Indiana Commissioner for Higher.
All rights reserved © 2005, Alcatel Enhanced Security situational Awareness for (Enterprise) networks  Bertrand Marquet / François Cosquer  Alcatel.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
The Here and Now of Higher Ed IT Governance, Risk, and Compliance Efforts Jacqueline Bichsel, PhD Senior Research Analyst EDUCAUSE AIRI, May 8, 2014.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Health Care Workforce needs for an industry in transformation Katrina M. Lambrecht, JD, MBA Vice President, Institutional Strategic Initiatives Office.
Current Trends in the Geoscience Workforce Heather Houlton Christopher Keane Carolyn Wilson.
Florida Labor Market and Economic Update Workforce Estimating Conference Labor Market Statistics Center September 7, 2012.
SEC835 Database and Web application security Information Security Architecture.
2013 Annual Strategic Action Plan Evaluation. Overview Background Role of SAP Implementation Evaluation process Council feedback Enhancement of SAP.
Information Security Update CTC 18 March 2015 Julianne Tolson.
Slide 1 Making IT a Key Part of the Campus Sustainability Effort Dennis Cromwell and Kristin Hanks Indiana University.
Lifetime Advantages of Degree Completion Presented by: Lauren Hubacheck, Director of Career Services, Salem State University.
Institute for Academic Development University of Edinburgh Doctoral education – the role of skills training Dr. Jon Turner Institute for Academic Development,
Degrees Conferred at Massachusetts Institutions of Higher Education Enhancing and Expanding the Commonwealth’s Workforce.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
Needs assessment to women parliamentarians UNDP Turkey.
The M. S. University of Baroda, Vadodara J OURNEY OF THE M ASTER T RAINERS.
Service Leadership & Innovation Rochester Institute of Technology Master of Science Degree In Zagreb.
The 2005 ResNet Survey Strategic Comprehensive Relevant David Futey, Stanford University Kevin Guidry, ResNet Applied Research Group October 3, 2005 ©
WHY GO TO COLLEGE??? 9 th Grade. WHY SHOULD WE EVEN CONSIDER GOING TO COLLEGE? Going to college is important for securing a quality career after graduation.
Strohl Systems International User Group Conference — April 9-12, 2006 — Orlando, Florida USA Assess Your BC Career Today ~ to Ensure Your Marketability.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
An Overview of the Pennsylvania Action Coalition Fall 2014.
Increasing Educational Opportunities for Working-Age Adults in Greater Louisville.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Transportation Technology Exchange Globally Presented by: Kay Nordstrom U.S. Dept. of Transportation at U.S./East Africa Workshop Arusha, Tanzania August.
IT&MS MAY 2015 ALL STAFF. WELCOME TO THE MIDDLE OF SPRING! Mid Quarter Check-in  Overview  Service Management  Spiceworks  Project Planning and Timelines.
I Source: U.S. Census Bureau Analysis by Kentucky Population Research, State Data Center, University of Louisville.
Digital Education Show “The top two things employers look for, based on a survey conducted with 1800 CEOs: 1. Creativity 2. Adaptability” (Sir Ken Robinson)
Presentation Pennsylvania Coalition for the Advancement of Nursing Education October 14, 2014.
An Engineer that associates with the manufacturing of computers.
COMMERCIALIZATION END - 2 – END Shortened LT Reduced Duty Ability to make the same product in multiple factories Better Optimize & manage capacity.
Klamath County Workforce KCEDA PRESENTATION – APRIL 2015.
Shared Services Initiative Summary of Findings and Next Steps.
Center for Homeland Security Base Realignment and Closure (BRAC) and Homeland Security Future Workforce Development Program Robert E. Price Director, Center.
ECAR, Benchmarking, and More Susan Grajek, Ph. D
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
EDUCAUSE/Internet2 Computer & Network Security Task Force
Higher Education Information Security Council
Teaching Technology Virtually: Beyond the Desktop
© Copyright 1989 – 2013, (ISC)2 All Rights Reserved
Invest in yourself Advanced Level
Student Veterans of America
BOMGAR REMOTE SUPPORT Karl Lankford
IT Development Initiative: Status and Next Steps
General Counsel and Chief Privacy Officer

Annual Professional Development Conference
IT Development Initiative: Status & Next Steps
Part 1. The Data Breach in Higher Education
Leveraging the Power of Geographic Information System
Florida Labor Market Conditions
Plan your journey.
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Fy ‘08 NETWORK PLANNING TASK FORCE
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Presentation transcript:

CSG Meeting, January 12, 2016

2016 Top 10 Strategic Technologies

Enhance ability to detect sensitive data stored on servers not designed to protect sensitive data.

Deploy of full commercial Security Information and Event Management System

2016 Top 10 Strategic Technologies Citation: Grajek, Susan. Higher Education’s Top 10 Strategic Technologies for Research report. Louisville, CO: ECAR, January Available from

Deploy (more) multi-factor authentication for all users

Deploy (more) multi-factor authentication for users who access other people’s sensitive data

Security Metrics Citation: Grama, Joanna L., and Leah Lang. CDS Spotlight: Information Security. Research bulletin. Louisville, CO: ECAR, July 3, Available from

Enhance web application vulnerability scanning

Routine vulnerability scanning of network devices

Training and Awareness Citation: Grama, Joanna L., and Leah Lang. CDS Spotlight: Information Security. Research bulletin. Louisville, CO: ECAR, July 3, Available from

Enhance or make mandatory annual security awareness training

CISO Role Citation: Grama, Joanna L., and Leah Lang. CDS Spotlight: Information Security. Research bulletin. Louisville, CO: ECAR, July 3, Available from

Where Does the Person with Primary Infosec Responsibility Report? Citation EDUCAUSE Center for Analysis and Research, 2015 Strategic Information Security Issues Infographic. Louisville, CO: ECAR, April 24, Available from information-security-issues-infographic

Where does the CISO report?

2016 ECAR CISO Research A sneak peak at demographics from our forthcoming research:  The average age of CISOs is 47.  Three quarters of CISOs are men.  CISOs are employed in nearly equal numbers at private institutions and public institutions.  A majority of CISO positions (87.50%) are located in Central IT units.  Two thirds of CISOs came to their current position from within higher education. Of those that came from higher education, 81% were hired within their current institution.  About one third were hired into a newly created role. Citation: EDUCAUSE Center for Analysis and Research, unpublished data from forthcoming 2016 research on the IT Workforce.

2016 ECAR CISO Research A sneak peak at CISO KSAs from our forthcoming research:  CISO education levels are:  Bachelor’s degree (53%)  Master’s degree (34%)  Doctorate or other terminal degree (8%)  The top three contributors (or potential contributors) to CISO professional growth are 1.attending conferences focused on higher education IT 2.engaging in informal peer networking 3.engaging in formal peer networking.  The top three most important skills for CISO success are 1.the ability to communicate effectively, 2.strategic thinking and planning 3.the ability to manage complex projects and the ability to manage other relationships within one’s own institution (TIE). Citation: EDUCAUSE Center for Analysis and Research, unpublished data from forthcoming 2016 research on the IT Workforce.

Where does the IT Risk Management program report?

Who Leads the IT Risk Management Program? Citation: Bichsel, Jacqueline, and Patrick Feehan. Getting Your Ducks in a Row: IT Governance, Risk, and Compliance in Higher Education. Research report. Louisville, CO: ECAR, June Available from

Where Does the IT Risk Management Lead Report? Citation: Grajek, Susan. Higher Education’s Top 10 Strategic Technologies for Research report. Louisville, CO: ECAR, January Available from