Main Nav

Sep 29th, 2014
12:30 PM - 4:00 PM
Meeting Room W107
Eastern Time

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implement information governance and define roles and responsibilities? Do you split your data into diamonds and paper clips—encrypt the diamonds and not sweat the paper clips?

OUTCOMES Develop an information security management program for your university * Determine the priority areas that you need to address to mitigate security risk and make an appropriate and proportionate response to the threats that you face * Identify quick wins and the most important initiatives