UW System Information Security

Slides:



Advertisements
Similar presentations
Ad Hoc Committee Meeting June 17, Meeting Topics State WIB Examples Brookings Update WIA Reauthorization.
Advertisements

Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
An Intro to Professionalizing Procurement & Strategic Sourcing
1 The role of social work in personalised adult social care and support Social Work and Personalisation: Skills for Care Wednesday 25 th June 2014 Lyn.
Texas Workforce Commission The Texas Workforce Commission (TWC) is a collaborating partner in the economic development processes for the State of Texas.
From the IT Assessment to the IT Roadmap ( )
Company LOGO Leading, Connecting, Transforming UNC… …Through Its People Human Capital Management.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
Collaborative Venture to Drive Economic Development Wisconsin Manufacturing Extension Partnership.
1 Efficient, Transparent and Strategic Management Presented by: Prof. Venansius Baryamureeba Acting Vice Chancellor, Makerere University, Kampala, UGANDA.
Advancing Cooperative Conservation. 4C’s Team An interagency effort established in early 2003 by Department of the Interior Secretary Gale Norton Advance.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Our vision Donetsk Oblast Employment Service will introduce in the next 3-5 years efficient institutional changes and initiate reforms at the regional.
Strategic framework – a framework for change and growth Improve Infrastructure and Organisation Integrated systems and digital capabilities Aligned and.
CENTER FOR JOINT & STRATEGIC LOGISTICS Mr. Randy Helms 31 March 2010 National Defense University Briefing for the Joint Logistics Education and Training.
1 Planning and Programming for Effective Use of External Audit Resources Victor Rezendes Managing Director Strategic Issues U.S. General Accounting Office.
Advancing Government through Collaboration, Education and Action Priority Area Leaders Community Accomplishments Preview May 7, 2015.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
| 1 Weapon System Acquisition Reform- Product Support Assessment DAU SYMPOSIUM 13 April 2010 Presented by: Basil Gray Where Innovation.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Talent Pipeline Management. Goals 1. Introduce USCCF and our work focused on closing the skills 2. Familiarize you with the tools, resources, and supports.
UNCLASSIFIED Lift the living standards and wellbeing of all Victorians by sustainably growing Victoria’s economy and employment and by working with the.
Looking Ahead David Relph, Director. Working with others in our city and city region, Bristol Health Partners exists to support efforts to improve the.
Building Governance for Risk Management
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Updating the Value Proposition:
Challenges and opportunities for the CFO
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Sendai Framework for Disaster Risk Reduction
Chapter 4 Enterprise Systems
Information Technology Sector
Establish Digital Strategy & Plan
CLDMS Conference October 2012 CLD Strategic Guidance
Identify the Risk of Not Doing BA
Betsy Wilson Environmental Update October 29, 2007
This presentation provides:
Advanced Threat Protection
Transforming The Way We Think and Work
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Securing Your Digital Transformation
MTM Measurement Initiative
Get Ready for GDPR Compliance
Using the EFQM Excellence Model to support the role of a trustee
Office of Secretary of Defense
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
Engaging Institutional Leadership
Assistant Vice President and Chief Technology Officer
Reform of State Government Grants to Local Government
Scotland’s Digital Health and Care Strategy
The EDUCAUSE 2019 Top 10 IT Issues
The Case for Change 1.9 million shortage of software engineers
The State of Cybersecurity in State Government NAST March 26, 2019
Employee engagement Delivery guide
MAZARS’ CONSULTING PRACTICE
Managing IT Risk in a digital Transformation AGE
The Australian Government’s role in the Automated Vehicle environment
USACE infrastructure team update
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
Data Security and Privacy Techniques for Modern Databases
EVP Design Presentation
The EDUCAUSE 2019 Top 10 IT Issues
IT Next – Transformation Program
Presentation transcript:

UW System Information Security Brief to Information Technology Management Council Katherine Mayer 15 October 2018

Linkages Administrative Excellence Commitment to Operational Reform and Excellence (CORE): Operational excellence through the transparent standardization, consolidation and streamlining of non-instructional operations where it makes sense

Digital Strategy - Goals Establish a unifying strategic layer to enable 2020FWD in an increasingly digitally-enabled world Provide direction for future digital investments and roadmaps Clarify decision-making authority, scope, and process for digital initiatives Mission 2020FWD Digital Strategy Governance Implementation Why are we here? Where should we put our focus? What are the opportunities? Who has influence and who decides? How do we get there?

Standardized Security Capabilities IS Risk-Based Decision Making Information Security (IS) Strategic Priorities Enterprise Approaches Standardized Security Capabilities Define roles, responsibilities, integration and actions to protect UWS networks in a unified manner Expand collaboration and partnerships Balance prescription with individual institution capability deployment Reduce/eliminate duplication Focus on high priority IS actions Standardized Security Capabilities Enterprise Approaches Workforce Resiliency IS Awareness IS Risk-Based Decision Making Leadership Outreach Communications clarity Define/refine governance structure(s) Leverage/align IS risk focus with ERM IS Risk-Based Decision Making IS Awareness

Workforce Resiliency HDLD High Demand Low Density Employment of IT professionals expected to grow 28% from 2016-2026* Can only fill 1/3 of IT jobs with current IT grads* By 2024, 4.4M unfilled IT jobs* Digital transformation rests on talent development Competitive advantage demands life long learning Soft skills gain prominence amid intelligent machines Human Capital Focus * Bureau of Labor Statistics

Enterprise Investment for Blocking and Tackling Advanced Malware Protection (AMP) Prevention, detection and response to threats at the endpoints CloudLock Detection of cloud data breaches and malware Umbrella Stops phishing and malware earlier (before endpoints) StealthWatch Deep visibility across the network (normal v. anomalous) Piloting an incentive-based enterprise funding model

Additional System-wide Efforts Underway Multi-factor authentication implementation General Data Protection Regulation Assessment (GDPR) complete Cyber liability insurance renewal Assisting institutions with policy implementation Building out an information security team Refining governance structures Dissolution of the Information Assurance Council (IAC) Redefining Technology and Information Security Council (TISC)

What’s Next? Continued Cisco deployments throughout UW System Develop a risk management assessment process focused on information security risk Develop cyber security metrics for reporting to leadership in partnership with Madison Incorporate specific GDPR assessment recommendations into IS work plan Policy development and vetting Existing policy updates Data privacy Asset management Network protection Security monitoring Human capital development

Questions?