The Office of Cybersecurity supports the CIO and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics and good processes and procedures to manage our intellectual property and other sensitive information.
The federal government requires cybersecurity controls on certain types of protected data often used or gathered in research. Here’s a step-by-step process to help researchers and staff comply with requirements.
The European Union’s GDPR signals a comprehensive, consumer-oriented approach to data privacy. Here are details about the GDPR compliance program for the UW-Madison campus community.
Governance, risk & compliance
This team focuses on governance and methods to accurately identify and assess IT security risks. Through implementation of a Risk Management Framework, they design and architect security strategy and advise system owners and developers on methods to implement security controls for applications and infrastructure. On behalf of the UW-Madison CIO, this team also establishes, monitors and maintains IT policies and security standards, including the appropriate cybersecurity baselines and plans across campus and in coordination with various advisory groups. Learn about the risk management framework
Security testing & cyberdefense
This team supports implementation of frameworks and processes that pro-actively identify, assess and manage vulnerabilities. They do this by testing systems throughout the systems development lifecycle. They also guide system administration and engineering staff in implementing an appropriate set of IT risk mitigation controls.
Monitoring & incident response
Monitors the network and systems for attacks, respond to incidents and recommend or perform incident remediation.
Enterprise system security
Although currently focused on Enterprise Resource Planning systems, this team performs security assessments and manages account and role access authorizations. These include the spectrum of systems managed by DoIT on behalf of the University and UW System Administration.
Security education, training & awareness (SETA)
This team creates and maintains a portfolio of security awareness efforts for students, staff, faculty and other community groups. Through implementation of these efforts the SETA team builds a community of experts and improves institutional user competence. The SETA Domain Lead works to define group-specific security-awareness programs for IT and security staff, students, administrators and faculty/researchers; to develop campus policy requiring participation in SETA; to improve security awareness through active Phishing campaigns; to provide resources and communications materials in an ongoing effort to promote best security practices, raise awareness about data protection and security standards, and educate campus users about how to become better cyber-citizens; and to develop a list of continuing professional education opportunities using open source materials and in collaboration with the Big Ten Academic Alliance’s Security Working Group.
IT and Cybersecurity Policy
On behalf of the Chief Information Officer (CIO), the IT and Cybersecurity Policy Team develops IT and cybersecurity policy, provides leadership for related program planning and documentation, and coordinates efforts with the Policy Planning Team (PPT). The PPT is an advisory group for IT policy principles and procedures, and overall IT policy planning. The PPT is advisory to the Office of the CIO through the Chief Information Security Officer (CISO).
Every UW-Madison student and employee is encouraged to install the free security software, which includes Symantec AntiVirus and Virtual Private Network (VPN) desktop software.
UW-Madison’s Electronic Devices Policy requires all campus users to run anti-virus software, keep security patches updated and, whenever possible, maintain a dedicated firewall. This guide will help you.
Hackers have dozens of tools at their disposal for cracking passwords. Simple passwords can be cracked in matter of seconds. Learn how to create strong passwords in this guide.
Guides for professionals
- Specific topics
- General guidelines & compliance
Useful security guides
- How to securely connect to the UW Network
- Get free antivirus software
- Secure your computer
- Secure your mobile device
- Handling sensitive University data
- Media downloads and copyright infringement
- File sharing and RIAA
- Protecting your online identity
- Use a Virtual Private Network (VPN)
- Learn how to recognize and report phishing
- How to select, manage and protect passwords
- Back up your data
- Safe social networking
- Get a personal digital certificate
- Find sensitive data on your computer
- Prevent unauthorized use
- Preventing laptop theft
- The Academic Professional’s Guide to Safe Computing When Traveling Abroad
- Tools & best practices for campus developers
Watch the Life Hack Panel
Date: Tuesday, October 2, 2018 Location: The Marquee Theater, Union South Time: 5:30 p.m. doors open; 5:45 – 7:30 p.m. film screening Cost: Free to attend; plus pizza, popcorn and beverages In case you missed… Continue Reading Life Hack: A cautionary tale about our digital privacySeptember 19, 2018
The CISO’s Perspective 2018 – June At the University of Wisconsin-Madison, we know the higher education and research communities are, in practice and by necessity, an open and collaborative society driven by the need to… Continue Reading Moving beyond FUD, Part IJuly 19, 2018
The 18th annual UW-Madison Lockdown Technology & Cybersecurity Conference took place on July 16, with nearly 320 attendees. Hosted for the first time at the Monona Terrace Convention Center in downtown Madison, the event featured… Continue Reading Lockdown 2018 concludesJuly 19, 2018
Ben Hagen, is the current head of corporate information security at Facebook and former head of security for President Obama’s re-election campaign tech program. He and Dr. Rebecca Wynn, 2017 Cybersecurity Professional of the Year… Continue Reading What do Facebook and the 2012 U.S. presidential election have in common?June 11, 2018
- More Cybersecurity News posts