Cyber security – it’s up to you!
In today’s modern world we depend on Information Technology for most aspects of our daily lives. Our jobs, our homes, our vehicles, and our communication devices all use information technology in new and exciting ways. At our work place, in particular, we are made more productive through our IT tools and applications.
Sadly, however, with this new power and capability, an entirely new set of risks and challenges arise. Meeting these challenges requires everyone to increase their awareness and do their part in keeping vital IT resources secure.
It is important to understand what we’re trying to do in cybersecurity. At its foundation, it’s about the protection of information.
Information protection is the management and control of information assets – beginning with strategy and finding its completion with implementing the strategy to protect the enterprise’s information. Information protection is not a one-time event or activity. It is a continuous effort to be vigilant in protecting the enterprise. Organizations benefit from a good information protection program in a number of ways, including:
- Increasing the confidence that an organization’s customers have in protecting their information
- Enhancing the organization’s ability to use innovative technology and processes without fear that using cutting-edge technology will expose them to additional risk
- Creating an environment that preserves confidentiality and privacy of information
- Reduce the risk exposure for security breaches which in turn become a cost avoidance measure
- Helping to ensure the integrity of information no matter where it is, providing business innovation and value through better and more accurate information
Here are just a few points of concern for the cybersecurity function here at TAMUS:
- State & Federal Requirements (security + breach) – Texas Bus & Comm code ¶ 521.053, TAC 202, TAC 206, FERPA, FISMA, etc.
- Security through a shared-service model or Security Operations Center (SOC)
- Monitoring our networks and the state of our network
- International Requirements (TAMUS overseas)
- Legal matters when there is an investigation or forensic review
- Privacy issues
- Business issues (PCI, research granting, private donations, etc.)
- Intellectual Property (identification, valuation, security)
- Key personnel security (fraud, blackmail, extortion)
- Student information security
- Third Parties
- Physical Security