The cybersecurity function at The Texas A&M University System (TAMUS) represents both individual efforts at the member institutions and a collective one. As each of the members collaborates more closely together, sharing resources and information assets, it is incumbent on each of us to work together.
Each of the members has an Information Security Officer (ISO) that is responsible to that member to ensure the security of information. Collectively, each of the ISO’s work together in an ISO Working Group (ISOWG) to further the interests of all members. It allows us to be aware of what each of the members is experiencing, any open issues and any threats that are active or emerging.
As a group, we have 21 members, mostly ISO professionals who work full-time to help keep a good security posture.
Common themes and projects we are addressing in 2016 include:
- Enhanced Security Monitoring and Response
- The status of the Security Operations Center (SOC) owned and managed by the System and its members
- Current threats, breaches and exposures
- Current trends and discussion on mitigation
- Secure Enclaves for Research and high-value information processing
- Litigation Hold
- Data Security
- Information Security Policy streamlining
- Data Classification, including classification with meta data
- Risk Assessment using the Archer/SPECTRIM platform
- Cybersecurity Awareness
- Incident Management & Communication
- Data Leakage Prevention (DLP)
For inquiries, please contact Danny Miller, the System Chief Information Security Officer here.
There are communities with stakeholders, strategies, emotions, policies and solutions.
Nearly three-quarters of U.S. school teachers oppose the idea of training certain teachers and staff to carry guns in school buildings.
With the recent tragedies that have occurred on campuses as a result of domestic violence, now is a good time for schools to evaluate or re-evaluate their institution’s readiness and response capabilities to threats and incidents of domestic violence.
Iowa leads the nation in efforts to bring ultra-fast internet access to every city block and every rural acre.
Cleveland State University and Case Western Reserve University have formed a partnership to expand research and educational opportunities with IoT.
New York University's Tandon School of Engineering has launched the New York Cyber Fellows, an online master’s program for cybersecurity education.
In a survey by PwC of people across the UK, Germany, China, India and the US, 69% of workers agreed or strongly agreed that they possess digital skills.
Roughly two-thirds of the highest-paying and fastest-growing jobs in fields like design and marketing now demand computer science skills, according to a new report from labor market analytics firm Burning Glass Technologies and Oracle Academy.
University of Wisconsin schools are getting free Narcan to combat opiate overdoses on campus.
CyberDegrees.org, a Washington, D.C.-based publisher of informational websites on higher education, has ranked the top 20 schools for cybersecurity, based on subject expertise, scholarship opportunities and designation as a national security agency national center of academic excellence in cyber defense.
The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) had opened its Sport Security Research, Training and Operations Center at the National Sport Security Laboratory (NSSL) for addressing sport safety and security risks and threats.
Under a new NCAA policy, college coaches, athletes and athletic administrators will be required to undergo annual training in sexual-violence prevention.
A new report examines top safety concerns at college campuses and ranks them on campus crime rates.
Regent University is building a state-of-the-art cyber range training facility.
The University of New Haven has created a digital forensic evidence archive to revolutionize how investigators around the world analyze cyber forensic evidence and share data.
Crime in the nation's schools and college campuses has declined over the past two decades.
The same secure chip technology that’s been rolled out in the banking world for ATM and credit card transactions is sweeping across sectors throughout the American economy.
After an incident is not the time to review your bomb threat preparedness plan. Work with local law enforcement and first responders, as well as internal stakeholders and partners, to develop a more comprehensive, confidential bomb threat response plan.