SlideShare a Scribd company logo
1 of 8
Role of the CISO in Higher Education
University of Edinburgh
1/11/2016
Role of the CISO in Higher
Education
Experiences from University of Edinburgh
PrincipalPrincipal
Information
Services Group
Information
Services Group
Corporate Services
Group
Corporate Services
Group
University
Secretary’s Group
University
Secretary’s Group
College of Science
and Engineering
College of Science
and Engineering
College of Art,
Humanities and
Social Sciences
College of Art,
Humanities and
Social Sciences
College of
Medicine and
Veterinary
Medicine
College of
Medicine and
Veterinary
Medicine
Background to Appointment of CISO
• Structure of University allows for high degree of local
prioritisation of information security risk profile, with
limited central direction.
• Senior Academic review (eg Kenway Report)
recognised benefits of central senior focus.
• Appointment of new CIO brought renewed focus to
requirement for CISO to cover all aspects of
information security risk rather than previous
alignment to IT security.
• Risk and Audit Committee, and senior staff, buy-in
and support crucial to success – mandate from the
top.
Recruitment
• Selection process supported by external
recruitment agency to broaden
candidate pool.
• Interview panel included senior
academics and directors from within ISG
– adds to broad engagement.
• Appointment in early 2016, took up post
in February 2016.
CISO – Main Responsibilities
• Leads and owns the information security strategy for the
university.
• Drives and owns the information security risk posture, taking a
risk-based, holistic approach to managing information security
risk.
• Leads pan-University information security activities, managing
the information security risk to IT facilities from internal and
external threats.
• Advices the University on strategic existing and emerging
information security threats.
• Owns, manages and develops appropriate information security
policies, procedures, controls and the overall information
security governance framework.
Initial Priorities
• Recruitment of team with necessary skills –
challenge of competing against private sector.
• Increased focus on user.
• Overhaul of information security risk
governance to focus on risk based approach.
• Support to strategic/key projects (Service
Excellence Programme, Data Safe Haven,
Network Refresh, Data Sciences, Alan Turing
Institute, Student analytics, distance learning
and eExams.)
Keys to Success
• Alignment to University 2016 Strategy – supporting
plans for Digital Transformation and Data and
Partnerships with Industry.
• Buy-in from individual Colleges and Support Groups –
need to recognise requirement for ‘individual’ solutions
– outcome based.
• Ensure that business areas know their responsibilities –
won’t do security ‘to’ or ‘for’ them – they own the risks.
• Provision of supporting services and not about saying
‘No’.
• External and internal collaboration and information
sharing.

More Related Content

What's hot

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendationsJisc
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyJisc
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterJisc
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Jisc
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Jisc
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationJisc
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateJisc
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Jisc
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44Jisc
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively onlineJisc
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analyticsJisc
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Jisc
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayJisc
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Jisc
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Jisc
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...Jisc
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Jisc
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreJisc
 

What's hot (20)

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendations
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul Bailey
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall Sclater
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for education
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and update
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively online
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analytics
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, Norway
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick Moore
 

Viewers also liked

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Jisc
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts nowJisc
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT securityJisc
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001Jisc
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinJisc
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning JanetJisc
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMINJisc
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at ImperialJisc
 
Science DMZ
Science DMZScience DMZ
Science DMZJisc
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceJisc
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment JourneyJisc
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionJisc
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2Jisc
 

Viewers also liked (20)

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT security
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager Weinstein
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning Janet
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMIN
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at Imperial
 
Science DMZ
Science DMZScience DMZ
Science DMZ
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light Source
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment Journey
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusion
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2
 

Similar to Role of the CISO in Higher Education

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Association for Project Management
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...National Center for Campus Public Safety
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - PosterAndrew Kerr
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptxTRIGGER16
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman360 BSI
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352llh67aggie
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities surveyJisc
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 

Similar to Role of the CISO in Higher Education (20)

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptx
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352
 
9 mahmood shah risk 4 3
9 mahmood shah risk 4 39 mahmood shah risk 4 3
9 mahmood shah risk 4 3
 
JNCanhietUALIT
JNCanhietUALITJNCanhietUALIT
JNCanhietUALIT
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities survey
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Role of the CISO in Higher Education

  • 1. Role of the CISO in Higher Education University of Edinburgh 1/11/2016
  • 2. Role of the CISO in Higher Education Experiences from University of Edinburgh
  • 3. PrincipalPrincipal Information Services Group Information Services Group Corporate Services Group Corporate Services Group University Secretary’s Group University Secretary’s Group College of Science and Engineering College of Science and Engineering College of Art, Humanities and Social Sciences College of Art, Humanities and Social Sciences College of Medicine and Veterinary Medicine College of Medicine and Veterinary Medicine
  • 4. Background to Appointment of CISO • Structure of University allows for high degree of local prioritisation of information security risk profile, with limited central direction. • Senior Academic review (eg Kenway Report) recognised benefits of central senior focus. • Appointment of new CIO brought renewed focus to requirement for CISO to cover all aspects of information security risk rather than previous alignment to IT security. • Risk and Audit Committee, and senior staff, buy-in and support crucial to success – mandate from the top.
  • 5. Recruitment • Selection process supported by external recruitment agency to broaden candidate pool. • Interview panel included senior academics and directors from within ISG – adds to broad engagement. • Appointment in early 2016, took up post in February 2016.
  • 6. CISO – Main Responsibilities • Leads and owns the information security strategy for the university. • Drives and owns the information security risk posture, taking a risk-based, holistic approach to managing information security risk. • Leads pan-University information security activities, managing the information security risk to IT facilities from internal and external threats. • Advices the University on strategic existing and emerging information security threats. • Owns, manages and develops appropriate information security policies, procedures, controls and the overall information security governance framework.
  • 7. Initial Priorities • Recruitment of team with necessary skills – challenge of competing against private sector. • Increased focus on user. • Overhaul of information security risk governance to focus on risk based approach. • Support to strategic/key projects (Service Excellence Programme, Data Safe Haven, Network Refresh, Data Sciences, Alan Turing Institute, Student analytics, distance learning and eExams.)
  • 8. Keys to Success • Alignment to University 2016 Strategy – supporting plans for Digital Transformation and Data and Partnerships with Industry. • Buy-in from individual Colleges and Support Groups – need to recognise requirement for ‘individual’ solutions – outcome based. • Ensure that business areas know their responsibilities – won’t do security ‘to’ or ‘for’ them – they own the risks. • Provision of supporting services and not about saying ‘No’. • External and internal collaboration and information sharing.