• Skip to primary navigation
  • Skip to main content

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • Accessibility
    • IT Governance Framework
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Cybersecurity

Cybersecurity at the A&M System is an individual and collective efforts of our members. It is necessary for us to work together, sharing resources and information assets.

You are here: Home / Cybersecurity / Information Security Council

Information Security Council

Each member has an Information Security Officer (ISO) responsible for ensuring the security of information and Chief Information Officer (CIO) responsible for the management of the member’s information resources. The CIO’s and ISO’s work together in an Information Security Council to further the interests of all members. It allows us to be aware of what each of the members is experiencing, any open issues and any threats that are active or emerging.

Resources

Common themes and projects we are addressing in include:

  • Security Monitoring and Response saturation of member information
  • Identity Management across the enterprise through the use of a master identity directory for members, including harmonized identities and roles
  • Security Operations Center effectiveness and efficiency along with services for outside (non-A&M) entities
  • International regulations impact on A&M System cybersecurity
  • Current threats, breaches and exposures
  • Current trends and discussion on mitigation
  • Secure Enclaves for research and high-value information processing
  • Litigation Hold
  • Data Security
  • Information Security Policy streamlining
  • Data Classification, including classification with metadata
  • Risk Assessment using the Archer/SPECTRIM platform
  • Cybersecurity Awareness
  • Incident management, response and communication
  • Data Leakage Prevention (DLP)

Contact Danny Miller, the System Chief Information Security Officer, for more information.

RSS Cyber Tactics

  • CISOs of small and medium enterprises need to rethink cybersecurity strategy
    According to a Cynet 2021 CISO survey, which focused on CISOs with five or fewer security staff members, a majority of these organizations are overwhelmed by the volume of cyberattacks.
  • Five key benefits of privileged access management
    One way to achieve higher security in your enterprise is to instill a proper Privileged Access Management (PAM) initiative into the cybersecurity workflow. For a multi-dimensional cybersecurity strategy involving processes, technology, and people to be successful, any such system has to be a part of the entity’s culture. Here’s how to implement PAM at your […]
  • Use threat hunting to anticipate the unknown
    Waiting for a cyber threat to make an appearance is far too dangerous to an enterprise. To combat this, threat hunting is now an essential component of any cybersecurity strategy. But how does threat hunting work in practice, and how can the approach ensure an organization’s data is kept safe?
  • The art of targeted phishing: How not to get hooked
    Threat actors who phish see themselves as businesspeople, even if that business is illegal. They’re always seeking ways to maximize their profits, and with phishing, they know they can do that by better tailoring the email lure to resonate with the intended recipient.
  • Power management: The next frontier in securing your enterprise
    The advancement of interconnectivity and IoT-enabled equipment has brought a variety of new benefits to the enterprise, however, with this enhanced connectivity comes the possibility for risk. Even HVAC systems can be susceptible if they’re not safeguarded. As hackers modify their targets amid IT evolution, the ability to eliminate system vulnerabilities has never been more […]
  • Future-proofing data against hackers
    Despite many companies' best efforts to combat cybercrime, it persists and is increasingly costly. Here’s a look at some of the latest technologies that may be able to turn the tide against malicious hackers because they can still deliver performance and function at the necessary scale.

Copyright © 2021 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System