Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

HEISC Town Hall Webinar: Strategic Plan Host: Larry Conrad CIO, UNC-Chapel Hill & HEISC Co-Chair.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
David A. Brown Chief Information Security Officer State of Ohio
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
EDUCAUSE Update CHECO Fall Meeting Catherine Yang,
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
1 Effective Cybersecurity Practices for Higher Education Educause Southeast Regional Conference Seminar 1A June 6, 2005 Mary Dunker Virginia Tech Tammy.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Higher Education-Industry Collaborations to Improve Security Joy Hughes, George Mason University Peter Siegel, University of California, Davis Jack Suess,
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
April 3-5, 2005Security Professionals Conference Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring.
Development of a Customized First Nations Privacy & Security Toolkit
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
HSGP Funding for Security Efforts Presented by Michele Robinson.
A First Course in Information Security
Handling Sensitive Data: Security, Privacy, and Other Considerations Rodney Petersen Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Be Part of Something BIG Volunteer Opportunities American Society of Safety Engineers.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Group. “Your partner in developing future Lifelong Learners” UROWNE UNIVERSITY LIBRARY.
Cyber Security & Fraud – The impact on small businesses.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
October 10, Better Together – The Road to Responsible Information Management Presented by Colleen Pedroza, State Information Security Officer.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
October 25, 2007 Charting the IT Path: Unifying IT Strategic Planning with Central and Decentralized IT Goals EDUCAUSE 2007 Annual Conference October 23-26,
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
ITU Regional Standardization Forum for Asia-Pacific (Jakarta, Indonesia, October 2015) TTA’s activities on bridging standardization gap Kihun Kim.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
Board Assessment Governing Board Online Training Module.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
EDUCAUSE/Internet2 Computer & Network Security Task Force
Information Security Program
Higher Education Information Security Council
Pakistan Cyber Security Association (PCSA)
Copyright Information
Strengthening CIO and CISO Collaboration on Security and Privacy
Overview of the Information Security Guide: Leveraging the Knowledge and Skills of Your Colleagues Cedric Bennett, Emeritus Director, Information Security.
Securing Critical Assets: Arizona’s Security & Privacy Initiatives
California Cybersecurity Integration Center (Cal-CSIC)
General Counsel and Chief Privacy Officer
Information Technology Policy Institutional Data Policy
Larry Conrad, Co-Chair and CIO at UNC-Chapel Hill
ETF/AoC Governance Development Programme
Corporate Forum Presented by
Presentation transcript:

Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of California, Davis

Mission The Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures, both through the work of its community members and through focused partnerships with other government, industry, and academic organizations.

Strategic Plan Theme: Safeguarding Our IT Assets – Protecting Our Community’s Privacy Goals  Strategies Action Items Resources to Build On  Confidential Data Handling Blueprint  Data Incident Notification Toolkit

Working Groups Awareness & Training Effective Practices and Solutions Policies and Legal Issues Risk Assessment SALSa/Internet2 Security Initiatives Security Conference Program Committee

Awareness and Training 3 rd Annual Student Video and Poster Contest Planning for National Cyber Security Awareness Month in October Online Security Training Modules SANS-EDU Partnership

Effective Practices & Solutions Effective IT Security Practices Guide Applications Security Effective Practices Subgroups:  Encryption  PCI DSS  Security Metrics

Policies & Legal Issues Legal Issues  Proposed FERPA Rules  Contracts – e.g., outsourcing Subgroups:  Business Continuity Planning  Contracts with 3 rd Parties Who Handle Data  Data Classification Toolkit  Model Security Policies

Risk Assessment Risk Assessment Framework Risk Assessment Consultants List Risk Assessment Tools Information Security Governance Self- Assessment Tool

Internet2 Security Initiatives SALSa – security advisory group Working Groups  Computer Security Incidents (CSI2)  Disaster Planning and Recovery  NetAuth – network access and abuse issues Middleware Initiative

Getting Involved Subscribe to the Security Discussion Group  Join the REN-ISAC  Submit a Proposal or Attend Security 2009  Volunteer for a Working Group  Awareness and Training  Effective IT Practices and Solutions  Policies and Legal Issues  Risk Assessment  SALSa/Internet2  Security Conference Program Committee

For More Information Visit:  EDUCAUSE/Internet2 Security Task Force Contact:  Mely Tynan, Tuft University, STF Co-Chair  Peter Siegel, UC-Davis, STF Co-Chair  Rodney Petersen, EDUCAUSE, STF Staff