This document discusses human and technological aspects of cyber threats facing universities. It notes that while increased data and connectivity enable opportunities, they also present cybersecurity risks that could threaten an organization's existence. The challenges for IT security leaders are to balance security awareness with business needs. Recent attacks have shown blending of new and old techniques, resulting in highly evasive threats. The document also describes the four key steps in security authentication: identification, authentication, authorization, and accountability. It stresses integrating these steps is vital for securing networks against various attacks.