The Office of Cybersecurity supports the CIO and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics and good processes and procedures to manage our intellectual property and other sensitive information.
Controlled Unclassified Information
Federal agencies routinely generate, use, store, and share information that requires safeguarding and dissemination controls even though it doesn’t rise to the level of classified national security information. Controlled Unclassified Information (CUI) is unclassified information that meets the standards for safeguarding and dissemination controls.
Governance, risk & compliance
This team focuses on governance and methods to accurately identify and assess IT security risks. Through implementation of a Risk Management Framework, they design and architect security strategy and advise system owners and developers on methods to implement security controls for applications and infrastructure. On behalf of the UW-Madison CIO, this team also establishes, monitors and maintains IT policies and security standards, including the appropriate cybersecurity baselines and plans across campus and in coordination with various advisory groups. Learn about the risk management framework
Security testing & cyberdefense
This team supports implementation of frameworks and processes that pro-actively identify, assess and manage vulnerabilities. They do this by testing systems throughout the systems development lifecycle. They also guide system administration and engineering staff in implementing an appropriate set of IT risk mitigation controls.
Monitoring & incident response
Monitors the network and systems for attacks, respond to incidents and recommend or perform incident remediation.
Enterprise system security
Although currently focused on Enterprise Resource Planning systems, this team performs security assessments and manages account and role access authorizations. These include the spectrum of systems managed by DoIT on behalf of the University and UW System Administration.
Security education, training & awareness (SETA)
This team creates and maintains a portfolio of security awareness efforts for students, staff, faculty and other community groups. Through implementation of these efforts the SETA team builds a community of experts and improves institutional user competence. The SETA Domain Lead works to define group-specific security-awareness programs for IT and security staff, students, administrators and faculty/researchers; to develop campus policy requiring participation in SETA; to improve security awareness through active Phishing campaigns; to provide resources and communications materials in an ongoing effort to promote best security practices, raise awareness about data protection and security standards, and educate campus users about how to become better cyber-citizens; and to develop a list of continuing professional education opportunities using open source materials and in collaboration with the Big Ten Academic Alliance’s Security Working Group.
IT and Cybersecurity Policy
On behalf of the Chief Information Officer (CIO), the IT and Cybersecurity Policy Team develops IT and cybersecurity policy, provides leadership for related program planning and documentation, and coordinates efforts with the Policy Planning Team (PPT). The PPT is an advisory group for IT policy principles and procedures, and overall IT policy planning. The PPT is advisory to the Office of the CIO through the Chief Information Security Officer (CISO).
Keeping your devices safe can appear daunting, but the following 7 steps go a long way toward keeping your devices and personal data safer. Continue Reading 7 simple steps to make your devices more secure
Hackers have dozens of tools at their disposal for cracking passwords. Simple passwords can be cracked in matter of seconds. Learn how to create strong passwords in this guide. Continue Reading How to select, manage & protect your passwords
Guides for professionals
- Specific topics
- General guidelines & compliance
Useful security guides
- How to securely connect to the UW Network
- Get free antivirus software
- Secure your computer
- Secure your mobile device
- Handling sensitive University data
- Media downloads and copyright infringement
- File sharing and RIAA
- Protecting your online identity
- Use a Virtual Private Network (VPN)
- Learn how to recognize and report phishing
- How to select, manage and protect passwords
- Back up your data
- Safe social networking
- Get a personal digital certificate
- Find sensitive data on your computer
- Prevent unauthorized use
- Preventing laptop theft
- The Academic Professional’s Guide to Safe Computing When Traveling Abroad
- Tools & best practices for campus developers
UW System schools reported security concerns around activity on WebLogic web servers on December 29. UW Madison discovered that three servers had cryptocurrency malware (Bit Coin mining) installed through a vulnerability in Oracle WebLogic software. The servers were taken offline… Continue Reading Bitcoin malware removed from UW-Madison serversJanuary 11, 2018
On September 7, the consumer credit reporting agency Equifax announced a large cybersecurity breach impacting 143 million people. According to Equifax the breach includes names, social security numbers, birthdates, addresses, and in some instances, driver’s license… Continue Reading What to do if you’re part of the Equifax hackSeptember 15, 2017
The CISO's Perspective Special Edition | Cyber criminals are constantly devising new and creative ways to scam you and compromise your personal and professional data. This article contains steps you can take to protect yourself and become a better cybercitizen. Continue Reading Cybersecurity Essentials: Keeping Yourself Safe & Secure OnlineAugust 14, 2017
The truth of the matter is that cyber crimes do happen, and they can happen to you, but there are some ways you can protect yourself. Cyber fraud at UW-Madison There are a low number… Continue Reading How often does cyber fraud happen on campus?August 4, 2017
The CISO’s Perspective / 2017 4th Edition Prior to the Renaissance, many mathematicians, theologians and philosophers believed the Earth was the center of a finite universe and that the sun, planets and stars orbited around… Continue Reading What Copernicus knew about cybersecurity operationsJune 27, 2017
- More Cybersecurity News posts