Chief Digital Risk Officer, System Offices
Chief Digital Risk Officer, System Offices
In the ever-evolving digital frontier, Identity and Access Management (IAM) serves as the command protocol for securing systems, planetary databases, and interstellar communications. IAM ensures that the right crew members have the right access to the right systems for the right mission—while maintaining a precise log of who has access to what, and why.This session […]
Starfleet Command is initiating a new systems enhancement: the deployment of SailPoint, a SaaS-based Identity Governance and Administration (IGA) tool, across all Federation outposts and academic starbases. This operation is critical to fortifying our Identity & Access Management (IAM) infrastructure. By integrating SailPoint into our systems, we aim to boldly go where no IAM framework […]
The Privacy office facilitates unleashing data in support of student success, innovative research, operational excellence, and use of data to benefit our community and society. Learn about the roadmap for building a culture of Privacy capabilities at Illinois and share some of the challenges and opportunities you face in your daily work. Learn about the […]
Data can be a valuable asset for any organization. There are challenges around harnessing the power of data and using it to help the organization fulfill its goals. As a university we have many diverse ways that data can be created and used. We will be discussing data, the hows and whys we should be […]
Companion to Transforming data into an asset. This is intended to provide a space for more discussion and engagement between community members on what a data ecosystem could and should look like at the university. If you are interested in data, and how the future data ecosystem at the university might help you do your […]
2-Step Authentication provides identification of users with the combination of two different components. Something you know (password) with something you have (phone/portable device). It adds an extra layer of protection to the standard password method being used. 2-Step Authentication is currently installed at the University of Illinois and is being looked at to be installed […]
Looking for some extra time in the day to enjoy a cup of java, instead of spending that time patching Java? Has managing your endpoints become a never ending process or are you an endpoint management superstar? Whatever group you belong to come see what solutions campus has to offer and leave some feedback to […]
Hackers, rogue machines, and spam? Yeah, we’ve got all that and more. If you’ve ever wondered what kind of attacks happen on the campus network, wonder no more. We’ll highlight some notable incidents of the past year, including the ECE Hacker and phishing activities. Learn not only what we see, but how to avoid becoming […]
Caught in a bind between security, accessibility, usability, legal requirements, and deadlines? We can’t help with the deadlines, but this panel of campus security, usability, and accessibility experts can help you resolve the conflicts that arise when a project needs to become more accessible AND more secure.