Assistant Director, Cybersecurity Operations and Engineering, Technology Services
Assistant Director, Cybersecurity Operations and Engineering, Technology Services
Cybersecurity continues to evolve and change. We have new threats, new regulations, and new risks every day. The team tasked with providing both reactive and proactive cybersecurity support to the university seeks to be more engaged with our community of fellow IT professionals. Cybersecurity is a shared responsibility. In this session we plan to share […]
The Cybersecurity Improvement Initiative (CII) is a multi-year effort supported by Provost, Deans, and CIO to enroll 100% of eligible endpoints into endpoint management and Crowdstrike. Through this effort we will be able to work together to set a baseline secure standard on university owned systems and enhance overall security for campus. The presenters will […]
This presentation will be covering the basics of Email Security 101 and how does email get to your inbox and what protections are there? We will be walking customers through the mail flow of when you click on sending an email/ and or when you receive an email as well educating you on the various […]
Come join us for a peek inside the Cybersecurity team’s activities over the last year. We will discuss some adventures we took, interesting cybersecurity incidents, updates to campus tools, and a bit on plans for the next year that cover the full gamut of our offerings. Join us while we reminisce about the past year, […]
Starting in March the security office in conjunction with partners from IT Council, College of Media, and College of Engineering launched a campus wide vulnerability scanning initiative. We are now 6 months into the process and we will present on how we got here, the lessons learned, some of the insights we gained, and our […]
Open discussion on information security on our campus.
Email is one of the most-used tools at the university, a tool that was invented at a time when security was not a primary consideration for work processes. For that reason, today it is one of the most-used attack vectors to gain illicit access to information. Email can be used to deliver malware, to trick […]
Illini Secure is the information security program at the University of Illinois at Urbana-Champaign. It was created with two aims in mind: 1. Settle the ‘best practices’ question by tying information security requirements to an externally recognized framework of security controls 2. Present information security to senior administration as a business risk item, rather than […]
In the age of Snowden there has been a renewed interest in IT security amongst faculty and students. This presentation will briefly cover tools: PGP, TOR, and Truecrypt. It will also cover lessons learned from presenting this material and look for feedback from IT pros supporting this renewed interest.