184x Filetype PPTX File size 1.25 MB Source: www.isfaa.org
Who We Are Qumulus Solutions provides organizations with access to the people, expertise, and technology needed to assist them with developing and reviewing their information security programs. Jay Hochstetler Kyle Johnson Chief Information Security Director, Security Officer (CISO) Operations and Risk Over 20 years of Management information security and Former Information IT experience Security Officer for Financial, Transportation, Indiana Tech and IT Sectors IT Sector Chief for Indiana Indiana Executive Council Infragard on Cybersecurity (IECC) CISSP, C|EH, GSEC, CISSP, CISM, ECSA, C|EH Security+, Cybersecurity Audit Certificate Overview Financial Aid Departments in Higher Ed Why Information Security - Regulatory Compliance Sensitive Data and Responsibilities Departmental involvement and security measures Types of Information Security Controls What is Sensitive Data / Personal Information? State of Indiana - first (initial) and last name AND CC, SSN, DL#, account #, (PW, security code) PII – any data that can be used to identify a specific individual SSN, TaxID, Passport, account #, DL#, email, personal phone, personal property info, IP address, Patient ID Login IDs, biometric, geolocation, digital images, behavior data PHI – anything used in a medial context that can identify a patient Importance of Safeguarding Information Information Security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information Protects the organizations ability to function Enables safe operation of IT systems Protects the data the organization collects Safeguards the technology
no reviews yet
Please Login to review.