Universities have a responsibility to numerous agencies of oversight; federal standards for universities may come from commerce or health agencies and from research, education and industry groups. Chief Information Security Officers (CISO) have the unenviable role of meeting all these requirements, while simultaneously keeping systems and information safe.
Author: Beth Varcho
SACM stands for Service Asset and Configuration Management, and the Office of the Chief Information Officer (OCIO) has spent the past couple years working through the process. Specifically, we’ve cataloged what is on each of our servers, how each one is supported, and what interrelationships it has with other applications and services. The key deliverable of this work is a configuration management database (CMDB) that stores all of this information for easy retrieval and updates.
The gender gap is a continuing area of focus for higher education, and with good reason considering industry trends. According to Fortune Magazine, the number of women majoring in computer science has decreased over time from 35% in 1990 to only 26% in 2013.
Accessible software is good for everyone, not just people with disabilities. Keeping that in mind, and to remain true to our commitment to diversity, our approach to accessibility is strongly related to universal design. Universal design means creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations.
On March 31, our Chief Information Security Officer Helen Patton will be a featured speaker at Attorney General Mike DeWine’s CyberOhio Business Summit. Helen’s session is entitled, “Security Frameworks: How to Use Them to Improve Business Outcomes.” It will cover common cybersecurity frameworks, with practical details including:
Meet Security Requirements Using OCIO Offsite Storage and Colocation
If you need to strengthen your data center and disaster recovery posture, the OCIO offers offsite storage and colocation services that can help you achieve your goals.
The Ohio State Information Security Control Requirement (ISCR) outlines best-practice security control requirements that we are all striving to meet. Using OCIO offsite storage and colocation services can accelerate your time table to meet ISCR, give you an immediate risk reduction, improve quality and increase capacity.
Enterprise Security has taken a number of steps to cultivate the cybersecurity professionals of tomorrow. Most recently, the team helped host Cooltechgirls’ “Think Like a Hacker” event in early December.
After a short program explaining the security aspects of geocaching, participants worked through a cybersecurity activity that challenged them to use their newly-gained knowledge to tackle a problem similar to one that a security professional might need to solve in real life.
The university community is incredibly diverse, with every conceivable nationality, race, religion, gender identity, sexual orientation, age, physical capability and socio-economic background imaginable. Numerous studies show that teams with varied backgrounds enjoy more effective problem solving and fewer service gaps.
Ohio State is constantly maintaining and updating its campuses to make a great first impression on incoming and potential students and their families. The impression we make online is equally important.
Cybersecurity offers fun and challenging careers, and shows like Homeland, CSI Cyber and Mr. Robot have made it cool.
But to really captivate the security geniuses of tomorrow, observing isn’t enough. They want to get involved and be challenged. That’s idea behind CoolTechGirls’ Think Like a Hacker event on Dec. 3.