335x Filetype PPTX File size 1.25 MB Source: www.isfaa.org
Who We Are
Qumulus Solutions
provides organizations with
access to the people,
expertise, and technology
needed to assist them with
developing and reviewing
their information security
programs.
Jay Hochstetler Kyle Johnson
Chief Information Security Director, Security
Officer (CISO) Operations and Risk
Over 20 years of Management
information security and Former Information
IT experience Security Officer for
Financial, Transportation, Indiana Tech
and IT Sectors IT Sector Chief for Indiana
Indiana Executive Council Infragard
on Cybersecurity (IECC) CISSP, C|EH, GSEC,
CISSP, CISM, ECSA, C|EH Security+, Cybersecurity
Audit Certificate
Overview
Financial Aid Departments in Higher Ed
Why Information Security - Regulatory Compliance
Sensitive Data and Responsibilities
Departmental involvement and security measures
Types of Information Security Controls
What is Sensitive Data / Personal
Information?
State of Indiana - first (initial) and last name AND
CC, SSN, DL#, account #, (PW, security code)
PII – any data that can be used to identify a specific
individual
SSN, TaxID, Passport, account #, DL#, email, personal phone, personal
property info, IP address, Patient ID
Login IDs, biometric, geolocation, digital images, behavior data
PHI – anything used in a medial context that can identify
a patient
Importance of
Safeguarding
Information
Information Security is the practice of
preventing unauthorized access, use,
disclosure, disruption, modification,
inspection, recording or destruction of
information
Protects the organizations ability to
function
Enables safe operation of IT systems
Protects the data the organization
collects
Safeguards the technology
no reviews yet
Please Login to review.