Educause Security Discussion mailing list archives
Re: Integrating security in IT processes
From: Bob Bayn <bob.bayn () USU EDU>
Date: Wed, 14 Nov 2012 15:22:46 +0000
All public higher ed schools in Utah use the 20 critical controls to some degree or another, if only because the 20 critical controls are the basis for the annual security audit that is performed by a roving technical audit team under the auspices of the state Board of Regents. It remains to be seen how well that top-down endorsement of the 20 controls works to promote a penetration of the principles into all IT processes. We are taking baby steps here. Bob Bayn SER 301 (435)797-2396 IT Security Team Office of Information Technology, Utah State University three common hazardous email scams to watch out for: 1) unfamiliar transaction report from familiar business 2) attachment with no explanation in message body 3) "phishing" for your email password
Current thread:
- Integrating security in IT processes Andy Scott (Nov 13)
- Re: Integrating security in IT processes McCrary, Barbara (Nov 13)
- Re: Integrating security in IT processes randy (Nov 13)
- Re: Integrating security in IT processes Bob Bayn (Nov 14)
- Re: Integrating security in IT processes randy (Nov 13)
- Re: Integrating security in IT processes Brian J Smith-Sweeney (Nov 15)
- Re: Integrating security in IT processes Manjak, Martin (Nov 15)
- Re: Integrating security in IT processes McCrary, Barbara (Nov 13)