Higher Education Information Security Council

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

MRC Strategic Plan. Strategic Planning MRC first Strategic Plan for Revised in 2000: Current Strategic Plan Vision and Mission remain.
Establishing a Healthcare Special Interest Group (HC-SIG) in ASQ Sections.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
HEISC Town Hall Webinar: Strategic Plan Host: Larry Conrad CIO, UNC-Chapel Hill & HEISC Co-Chair.
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Is IT Compliance A Profession? A Workshop on Refining Our Common Body of Knowledge, Skills and Ethics Peter T. Davis Principal Peter Davis+Associates.
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
April 3-5, 2005Security Professionals Conference Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College.
Evolving IT Framework Standards (Compliance and IT)
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
©SHRM 2008 Pennsylvania State Leadership Conference Phyllis Shurn-Hannah NE Field Services Director (DE, MD, NJ, PA)
WELCOME TO Volunteer Orientation Webinar. Webinar Agenda  TCHRA Member Benefits  TCHRA Volunteer Benefits  About TCHRA  Resources and Tools 2.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
FMDG FMDG at Virginia Tech: A Synergestic Approach Virginia Tech Facilities Managers' Development Group : A Synergistic Approach Dawn Maxey, Facilities.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Introduction to ACT-IAC Advancing Government through Collaboration, Education and Action.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Advancing Government through Collaboration, Education and Action Maximizing Your IAC Membership Investment Maximizing Your IAC Membership Investment.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011.
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
May 2010Your Partner for Successful Solutions 1 Cash Handling and Management Guideline # 4.1 – Cash Handling and Management
Sister Societies are Proudly Sponsored by The Global Women’s Leadership Network is a World Council Program The Global Women’s Leadership Network is Chaired.
RCSLT STUDENT DAY Sheffield April 2014 Bryony Simpson Chair of RCSLT Council.
10/04/2016 David LaPlante, CISO Information Security & Cybersecurity Program Planning Critical Infrastructure Cyber Security Framework.
First Things First Grantee Overview.
Chief Information Security and Privacy Officer King County, Washington
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
EDUCAUSE/Internet2 Computer & Network Security Task Force
Presenter: Mohammed Jalaluddin
Strengthening CIO and CISO Collaboration on Security and Privacy
Overview of the Information Security Guide: Leveraging the Knowledge and Skills of Your Colleagues Cedric Bennett, Emeritus Director, Information Security.
CIO Constituent Group Meeting
Greater Des Moines Partnership Staff
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Work of the Quality Committee Venessa James
Community Engagement & Collaboration.
A Practical Risk-Based Approach
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Interoperability of Data Systems Administration for Children & Families Office of Planning, Research & Evaluation Robert (Bob) Garcia Regional Administrator,
Mission: To improve the health of New Haven residents through community engagement, collaborative community-based research, and dissemination of findings.
Michael Nawrocki, Vice President of Technology and Solutions ATIS
CRITICAL SUCCESS FACTORS GOALS Effective Communication
ACS Users Group Gregg Bell, PhD SDC Steering Committee Alexandria, VA
Information and Communications Technology, Knowledge Management & Enterprise Data and Records Management.
Enterprise/Security Alignment Review
Larry Conrad, Co-Chair and CIO at UNC-Chapel Hill
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Disaster Epidemiology Subcommittee Strategic Plan
ECM Step Program Report November 2012
October is National Cybersecurity Awareness Month
Infragard national 2019 Strategic direction & plans
Presentation transcript:

Higher Education Information Security Council David Swartz Chief Information Officer American University

HEISC Background Hosts: EDUCAUSE and Internet2 History: Serving higher education since 2000 Mission: to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.

Activities Security Discussion Group Working Groups People: awareness and training Process: compliance, policies, risk, governance Technology: effective practices and solutions Professional Development Annual Security Professionals Conference SANS-EDU Partner Series Collaborations and Partnerships Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) Center for Internet Security . . . and more

HEISC Strategic Plan Theme: Safeguarding Our IT Assets, Protecting Our Community’s Privacy Goals: Obtain Executive Commitment and Action Manage Data to Enhance Privacy and Security Protections Develop and Promote Effective Practices and Solutions Explore New Tools and Technologies Establish and Promote Information-Sharing Mechanisms

Special Projects Confidential Data Handling Blueprint Guidelines for Data and Media Sanitization Toolkit for Electronic Records Management, Data Retention, and e-Discovery Information Security Governance Risk Management Framework Security Awareness Poster/Video Contest National Cybersecurity Awareness Month Security Metrics

Effective Security Practices Guide Risk Management Compliance Security Policy Organization of Information Security Asset Management Human Resources Security Physical and Environmental Security Communications and Operations Management Access Controls Information Systems Acquisition, Development, and Maintenance Incident Management Business Continuity Management

Call to Action Attend Contribute Join Volunteer Security Professionals Conference April 12-14, 2010, Atlanta, Georgia net.educause.edu/conference/security Contribute Submit an Effective Practice and Solution www.educause.edu/security/guide Join Discussion Group: www.educause.edu/groups/security REN-ISAC: www.ren-isac.net Volunteer Send an email to security-volunteer@educause.edu

For More Information Visit: Contact: Higher Education Information Security Council http://www.educause.edu/security Contact: David Swartz, American University, HEISC Co-Chair dswartz@american.edu Brian Voss, LSU, HEISC Co-Chair bvoss@lsu.edu Peter Siegel, UC-Davis, HEISC Co-Chair pmsiegel@ucdavis.edu Rodney Petersen, EDUCAUSE, HEISC Staff rpetersen@educause.edu