Educause Security Discussion mailing list archives

Re: [REMINDER] REN-ISAC Public TechBurst - April 21, 2017 @ Noon EDT - Cyber Security For Title IV Schools: How Being A “Financial Institution” Changes The Paradigm


From: John Reilly <reilly.j () GMERCYU EDU>
Date: Fri, 21 Apr 2017 12:43:50 -0400

Hi Sarah,

 Are we able to get a copy of this presentation & slide deck?

Regards,

jdr

John D. Reilly, CISSP
Director Enterprise Systems & IT Security
Gwynedd  Mercy University
1325 Sumneytown Pike
Gwynedd Valley, Pa. 19437
E-mail:reilly.j () gmercyu edu
Ph: 215-542-4694

-----Original Message-----
From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Sarah Bigham
Sent: Friday, April 21, 2017 11:27 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] [REMINDER] REN-ISAC Public TechBurst - April 21, 2017 @
Noon EDT - Cyber Security For Title IV Schools: How Being A “Financial
Institution” Changes The Paradigm

=====================================================================

***For additional information about becoming a REN-ISAC member, please go to
www.ren-isac.net***

=====================================================================

Date: Friday, April 21st, 2017
Time: Noon (12:00) EDT
Link: https://connect.iu.edu/ren-isac_public

Audience:[1]: Public [Pb]

Title: Cyber Security For Title IV Schools: How Being A “Financial
Institution” Changes The Paradigm

This presentation is intended to inform participants about the role of a
federal OIG, and the specific role and jurisdiction of ED OIG's Technology
Crimes Division within the cyber-security framework of institutions
participating in the Title IV Educational Assistance programs administered
by the U.S. Department of Education.  The presentation will also cover cyber
security requirements mandated under federal law for participating Title IV
institutions, and talk about recent communications regarding these
requirements from the U.S.
Department of Education.  The presentation should inform participants
regarding cyber security event reporting requirements, and anticipated U.S.
Department of Education actions regarding compliance and enforcement in this
area.  Although primarily targeted at a cyber security audience, this
presentation will likely be relevant as well to persons involved in the
administration of federally-based student financial aid.

Speaker:

Tom Harper, Jr. is currently employed as the Assistant Special Agent in
Charge of the Technology Crimes Division in the Office of Inspector General
(OIG) for the U.S. Department of Education (ED). After 14 years of active
military service in the U.S. Marines, he began his law enforcement career as
a Special Agent in the federal OIG community. Tom has been a Special Agent
with the National Archives and Records Administration OIG, Housing and Urban
Development (HUD) OIG, Army CID Computer Crimes Investigative Unit, the
Treasury Inspector General for Tax Administration (TIGTA), and ED OIG.
During his time at ED OIG, Tom has been instrumental in several search
warrant operations, child exploitation investigations, computer intrusion
investigations, and education financial assistance fraud investigations,
which have resulted in criminal convictions in multiple judicial districts.
Tom completed 20 years in the U.S. Marine Reserves in 2009, and was
recruited to be a section commander for one of the first Cyber Warfare units
in the Virginia Army National Guard, where he served until retirement at the
rank of Major in 2013 with 24 years of military service. Between military
and civilian government experience, Tom has completed over 1500 hours of
leadership and management training, and over 3,000 hours of digital
forensics/cyber investigations training. Tom holds a Master of Science
degree in Digital Forensic Science from Champlain College.

-------------------------------

[1] Information Sharing Guidance: TechBursts marked with "MG" are open to
members and hosted trusted guests of members. Because access to MG
TechBursts require authentication with a REN-ISAC userid and password,
guests must view the webcast with the member present. One marked "Pb"
are open to the public (link). Ones not marked with MG or Pb are available
to members only.

Questions may be sent to techburst () ren-isac net or use the Q&A screen within
Connect. Please note that only you and the Presenter will see your question.

-- 

Sarah Bigham

Lead Security Analyst     REN-ISAC
2719 E. 10th Street, Suite 201 /   Bloomington, IN 47408
office: +1(812) 855-2267
sarah () ren-isac net
https://www.linkedin.com/company/ren-isac

Research and Education Networking – Information Sharing and Analysis Center
/ www.ren-isac.net
24x7 Watch Desk:  +1(317) 278-6630, soc () ren-isac net


"Distrust and caution are the parents of security" - Benjamin Franklin


Current thread: