Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.

Slides:



Advertisements
Similar presentations
1 September 27 and October 1, Introduction Jenny Hartfelder– Speaker, Rocky Mountain WEA Janet Hurley Cann– Speaker-Elect, WEA of South Carolina.
Advertisements

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
HEISC Town Hall Webinar: Strategic Plan Host: Larry Conrad CIO, UNC-Chapel Hill & HEISC Co-Chair.
Creating Executive Awareness about Information Security Joy Hughes, VP, George Mason Univ. Jack Suess, VP, UMBC EDUCAUSE.
David A. Brown Chief Information Security Officer State of Ohio
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
EDUCAUSE Update CHECO Fall Meeting Catherine Yang,
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
1 Effective Cybersecurity Practices for Higher Education Educause Southeast Regional Conference Seminar 1A June 6, 2005 Mary Dunker Virginia Tech Tammy.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Higher Education-Industry Collaborations to Improve Security Joy Hughes, George Mason University Peter Siegel, University of California, Davis Jack Suess,
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
IT Security Research Briefing: EDUCAUSE Center for Applied Research (ECAR) and ResNet Applied Research Group Moderated by: Rodney Petersen Featured Speakers:
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Relentless in the Pursuit of Excellence Highland Technology Services Inc. 1 Section 508 Business Practices.
April 3-5, 2005Security Professionals Conference Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring.
The 22 nd meeting of the INTOSAI Working Group on IT Audit (WGITA) KPI Project Final Report — Key Performance Indicators Methodology for Auditing IT Programs.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
The Path to Becoming a Security Professional Andrea C. Hoy, CISSP, CISM President, ISSA Orange County CISO Executive Task Force Chief Technology Officer,
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
ERP Risks, Security Checklist, and Priorities for Change Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
Continuity of Operations Planning COOP Overview for Leadership (Date)
Handling Sensitive Data: Security, Privacy, and Other Considerations Rodney Petersen Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Professional Development for IT Professionals Cynthia Golden Executive Director of Professional Development, EDUCAUSE Peter DeBlois Director of Communication.
PROJECT OBJECTIVES Identify, procure, and implement software that provided a common system for students, faculty, and staff to enter and measure.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cyber Security & Fraud – The impact on small businesses.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Appendix C: Designing an Operations Framework to Manage Security.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Educause 2007 CIO Constituent Group Meeting Spurring Innovation and Marshalling Resources.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Discussion What information did you hear today that point to areas of success and accomplishments? Were there survey results that suggest areas where more.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
SunSatFriThursWedTuesMon January
Talking With The Boss About Security Darlene Quackenbush, James Madison University Shirley Payne, University of Virginia EDUCAUSE Security Professionals.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011.
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Mobile Application Security Testing (MAST) project Keng Lee March 2016.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
EDUCAUSE/Internet2 Computer & Network Security Task Force
Information Security Program
Higher Education Information Security Council
Strengthening CIO and CISO Collaboration on Security and Privacy
CMGT 230 Possible Is Everything/tutorialrank.com.
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CMGT 230 Education for Service/tutorialrank
How we’ll prepare for the General Data Protection Regulation (GDPR)
Identity Theft Prevention Program Training
Corporate Forum Presented by
Presentation transcript:

Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason University

Strategic Directions for 2007 Making Progress on Data Protection, Risk Assessment, Incident Response, and Business Continuity 1.Executive Commitment and Action 2.Professional Development for ISOs 3.Awareness of Available Resources 4.Security of Packaged Software 5.New Tools and Technologies

Projects and Initiatives Effective IT Security Practices and Solutions Guide  Risk Assessment Framework ERP Security Checklist Elements of a Model Security Policy Guidelines for Data Sanitization Guidelines for Responding to Compulsory Legal Requests for Information Business Continuity and Disaster Recovery  EDUCAUSE Business Continuity Management Constituent Group  Internet2 Disaster Planning and Recovery Working Group  EDUCAUSE Center for Applied Research (ECAR) Research Study on IT and Business Continuity in Higher Education

Projects and Initiatives (cont’d) Data Incident Notification Toolkit (updated) Blueprint for Handling Confidential Data  Seminars: January 25 th, Los Angeles, California March 19 th, NERCOMP, Worcester, Massachusetts April 10 th, Security 2007, Denver, Colorado May 2 nd, East Lansing, Michigan June 4 th, Columbia, South Carolina Computer Security Awareness Video Contest 

Getting Involved Subscribe to the Security Discussion Group  Join the REN-ISAC  Submit a Proposal or Attend Security 2008  Volunteer for a Working Group  Awareness and Training  Effective IT Practices and Solutions  Policies and Legal Issues  Risk Assessment  SALSa/Internet2

For More Information Visit:  EDUCAUSE/Internet2 Security Task Force Contact:  Joy Hughes, GMU, STF Co-Chair  Peter Siegel, UC-Davis, STF Co-Chair  Rodney Petersen, EDUCAUSE, STF Staff