Main Nav

Sep 30th, 2014
1:30 PM - 2:30 PM
West Hall A3-4
Eastern Time
Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implement information governance and define roles and responsibilities? Do you split your data into diamonds and paperclips, encrypt the diamonds, and not sweat the paperclips?

OUTCOMES: Outline an information security management program for your university * Define the priority areas you need to address to mitigate security risk and make an appropriate and proportionate response to the threats * Learn from activities under way elsewhere and identify quick wins and the most important initiatives