1 / 8

2005 Campus Memo “Securing Sensitive Data Initiative” Phase I: UGA Auditor/CISO high ri

2007 Senior VP Campus Memo “Role/Accountability” Campus-wide Plan …accountability for implementation of University security standards, policies, processes and procedures based on individual position and level of responsibility.

jam
Télécharger la présentation

2005 Campus Memo “Securing Sensitive Data Initiative” Phase I: UGA Auditor/CISO high ri

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2007 Senior VP Campus Memo “Role/Accountability” Campus-wide Plan …accountability for implementation of Universitysecurity standards, policies, processes and procedures based on individual position and level of responsibility 2006-2007 Securing Sensitive Data “Defense-in-Depth” Processes, People, Core Technology Tools 2006 President’s Retreat “Securing UGA Sensitive Data: Current Status, Challenges and Future Directions” Atten: Issue #5 — Acceptance of shared responsibility for institutional data and information security…campus-wide 2005 Campus Memo “Securing Sensitive Data Initiative” Phase I: UGA Auditor/CISO high risk Assessment (19 campus units) Phase II: Inventory of all assets (i.e., servers, databases, personnel) through ASSETs Online software application, Version 1 (350 campus units)

  2. Defense-in-Depth Strategy Policy/Process - a document that states in writing how an institution plans to protect physical and information or information technology assets Technology - HW or SW used to deliver information and/or communications Awareness, training and education (SATE) – focus attention on security and produce relevant and needed security skills and competency UGA Effort based on Industry Standard….

  3. “Learning is a continuum; it starts with awareness, builds to training, and evolves into education.” • Education: • IT Directors, Managers, Specialists • Training: • Functional roles and responsibilities relative to • IT systems • All users involved with IT systems • Awareness: • All user (students, faculty and staff)

  4. SECUREUGA Awareness Training • Four Awareness Sessions will be available on March 31 via the SecureUGA website. • Your Role in SECUREUGA • Security in the Workplace • What is Sensitive Data? • Securing Portable Electronic Devices • Presentations are approx. 3 minutes in length • Participation will be tracked and reported to unit/department leadership in November, 2008. • Sample of two modules….

  5. Different Role? Security Liaison Your staff responsible for systems, network, and security will be required to take additional training. For example… Assets Training.

  6. For information about SECUREUGA… visit the model web site and http://secure.uga.edu.

More Related