Getting IAM right can take some serious planning and analysis plus a commitment to continued evolution over the long term. Here, three universities share their experiences.
The use of data analytics and artificial intelligence, the inevitability of data breaches and six other topical subjects made up the latest "State of Higher Education" report from consultancy firm Grant Thornton.
Malicious cryptomining or cryptojacking, as it's called, describes the theft of computer processing resources — electricity, cloud services and other digital assets — that are then exploited to do cryptocurrency mining without the owner's permission or knowledge.
Stanford University has implemented a "bug bounty" program that pays people for finding vulnerabilities in the university's software systems. Set up by the Information Security office, the program is only open to Stanford students and full-time employees. Rewards range from $50 to $1,000, all paid in Amazon gift cards.
"A delicate balance exists between privacy and security in schools," a recent federal report on school safety noted. "On the one hand, there is the legal requirement to protect the privacy of student education records. On the other hand, it is critical to recognize that some education records may contain information that, if disclosed to appropriate officials, could help prevent students from harming themselves or others."
The federal government is grappling with how to develop policies to curb Chinese economic espionage at American universities without falling into racial or ethnic profiling.
Microsoft has introduced a new series of open access courses on cybersecurity that can be taken for free or, for more formal recognition, as a certificate program for a fee. The Microsoft Professional Program Cybersecurity track includes 12 courses — 10 of which must be completed successfully to earn the certificate. The program is hosted on edX and includes labs, community interaction and quizzes. Content is delivered online through videos.
In the coming year, IT organizations in colleges and universities expect to be grappling with "data-enabling" their institutions, funding, and setting up their units as institutional leaders and change agents. That's what IT leaders told Educause in its latest survey to determine the top 10 IT issues for higher education.
The National Science Foundation’s Secure and Trustworthy Cyberspace program is getting more support from the federal agency in the form of a $78.2 million portfolio of technology projects.
Because registrars and enrollment managers make decisions daily that affect securing data, both roles should be "key members" of the cybersecurity team. According to a new paper on information security in higher education, those individuals should meet regularly with the CIO and chief information security officer to weigh in on incident response plans, risk management and training programs.