The Office of Cybersecurity supports the CIO and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics and good processes and procedures to manage our intellectual property and other sensitive information.
A recent UW System initiative includes a two-year work plan to bring all campuses in alignment around cybersecurity.
Multi-Factor Authentication adds an extra layer of security that requires an individual to verify their identity using something that only they possess—for example, a smartphone or token.
The federal government requires cybersecurity controls on certain types of protected data often used or gathered in research. Here’s a step-by-step process to help researchers and staff comply with requirements.
The European Union’s GDPR signals a comprehensive, consumer-oriented approach to data privacy. Here are details about the GDPR compliance program for the UW-Madison campus community.
Governance, risk & compliance
This team focuses on governance and methods to accurately identify and assess IT security risks. Through implementation of a Risk Management Framework, they design and architect security strategy and advise system owners and developers on methods to implement security controls for applications and infrastructure. On behalf of the UW-Madison CIO, this team also establishes, monitors and maintains IT policies and security standards, including the appropriate cybersecurity baselines and plans across campus and in coordination with various advisory groups. Learn about the risk management framework
Security testing & cyberdefense
This team supports implementation of frameworks and processes that pro-actively identify, assess and manage vulnerabilities. They do this by testing systems throughout the systems development lifecycle. They also guide system administration and engineering staff in implementing an appropriate set of IT risk mitigation controls.
Monitoring & incident response
Monitors the network and systems for attacks, respond to incidents and recommend or perform incident remediation.
Enterprise system security
Although currently focused on Enterprise Resource Planning systems, this team performs security assessments and manages account and role access authorizations. These include the spectrum of systems managed by DoIT on behalf of the University and UW System Administration.
Security education, training & awareness (SETA)
This team creates and maintains a portfolio of security awareness efforts for students, staff, faculty and other community groups. Through implementation of these efforts the SETA team builds a community of experts and improves institutional user competence. The SETA Domain Lead works to define group-specific security-awareness programs for IT and security staff, students, administrators and faculty/researchers; to develop campus policy requiring participation in SETA; to improve security awareness through active Phishing campaigns; to provide resources and communications materials in an ongoing effort to promote best security practices, raise awareness about data protection and security standards, and educate campus users about how to become better cyber-citizens; and to develop a list of continuing professional education opportunities using open source materials and in collaboration with the Big Ten Academic Alliance’s Security Working Group.
IT and Cybersecurity Policy
On behalf of the Chief Information Officer (CIO), the IT and Cybersecurity Policy Team develops IT and cybersecurity policy, provides leadership for related program planning and documentation, and coordinates efforts with the Policy Planning Team (PPT). The PPT is an advisory group for IT policy principles and procedures, and overall IT policy planning. The PPT is advisory to the Office of the CIO through the Chief Information Security Officer (CISO).
Every UW-Madison student and employee is encouraged to install the free security software, which includes Symantec AntiVirus and Virtual Private Network (VPN) desktop software.
UW-Madison’s Electronic Devices Policy requires all campus users to run anti-virus software, keep security patches updated and, whenever possible, maintain a dedicated firewall. This guide will help you.
Hackers have dozens of tools at their disposal for cracking passwords. Simple passwords can be cracked in matter of seconds. Learn how to create strong passwords in this guide.
Email poses a security risk, as the default use transmits the data as plain text and is vulnerable to interception between the sender and recipient. Encryption reduces this risk significantly.
Guides for professionals
- Specific topics
- General guidelines & compliance
Useful security guides
- How to securely connect to the UW Network
- Get free antivirus software
- Secure your computer
- Secure your mobile device
- Handling sensitive University data
- Media downloads and copyright infringement
- File sharing and RIAA
- Protecting your online identity
- Use a Virtual Private Network (VPN)
- Learn how to recognize and report phishing
- How to select, manage and protect passwords
- Back up your data
- Safe social networking
- Get a personal digital certificate
- Find sensitive data on your computer
- Prevent unauthorized use
- Preventing laptop theft
- The Academic Professional’s Guide to Safe Computing When Traveling Abroad
- Tools & best practices for campus developers
Imagine how much safer you and your data could be if the campus added 13 more cybersecurity professionals to its force. That’s the immediate plan. Continue Reading UW Cybersecurity is hiring to boost campus serviceDecember 11, 2018
Free movies and music are great perks. But we put ourselves at risk when we download or use this material illegally on campus networks. Continue Reading About downloading legally on campus networksOctober 22, 2018
We’ve selected the most useful cybersecurity guides from our trove of best practices. Take small steps today to protect your privacy and subvert attacks in the future. Scams to avoid: Protecting your online identity (4… Continue Reading Cybersecurity made easy in 5 waysOctober 21, 2018
Compliance Processes panel event on October 24, Union South You may need to comply with federal regulations if you work in areas that are impacted by these categories: Controlled Unclassified Information (CUI) General Data Protection… Continue Reading Manage sensitive data? Attend this campus event on October 24October 12, 2018
As far back as the Confirmation classes I took when I was in middle school (which I remember being called Junior High School), I’ve always thought of the first five books of the Bible as setting the baseline for how people should act. Our pastors and teachers called these books The Pentateuch... Continue Reading The Pentateuch (well, sort of)…October 12, 2018
- More Cybersecurity News posts