SlideShare a Scribd company logo
1 of 8
Role of the CISO in Higher Education
University of Edinburgh
1/11/2016
Role of the CISO in Higher
Education
Experiences from University of Edinburgh
PrincipalPrincipal
Information
Services Group
Information
Services Group
Corporate Services
Group
Corporate Services
Group
University
Secretary’s Group
University
Secretary’s Group
College of Science
and Engineering
College of Science
and Engineering
College of Art,
Humanities and
Social Sciences
College of Art,
Humanities and
Social Sciences
College of
Medicine and
Veterinary
Medicine
College of
Medicine and
Veterinary
Medicine
Background to Appointment of CISO
• Structure of University allows for high degree of local
prioritisation of information security risk profile, with
limited central direction.
• Senior Academic review (eg Kenway Report)
recognised benefits of central senior focus.
• Appointment of new CIO brought renewed focus to
requirement for CISO to cover all aspects of
information security risk rather than previous
alignment to IT security.
• Risk and Audit Committee, and senior staff, buy-in
and support crucial to success – mandate from the
top.
Recruitment
• Selection process supported by external
recruitment agency to broaden
candidate pool.
• Interview panel included senior
academics and directors from within ISG
– adds to broad engagement.
• Appointment in early 2016, took up post
in February 2016.
CISO – Main Responsibilities
• Leads and owns the information security strategy for the
university.
• Drives and owns the information security risk posture, taking a
risk-based, holistic approach to managing information security
risk.
• Leads pan-University information security activities, managing
the information security risk to IT facilities from internal and
external threats.
• Advices the University on strategic existing and emerging
information security threats.
• Owns, manages and develops appropriate information security
policies, procedures, controls and the overall information
security governance framework.
Initial Priorities
• Recruitment of team with necessary skills –
challenge of competing against private sector.
• Increased focus on user.
• Overhaul of information security risk
governance to focus on risk based approach.
• Support to strategic/key projects (Service
Excellence Programme, Data Safe Haven,
Network Refresh, Data Sciences, Alan Turing
Institute, Student analytics, distance learning
and eExams.)
Keys to Success
• Alignment to University 2016 Strategy – supporting
plans for Digital Transformation and Data and
Partnerships with Industry.
• Buy-in from individual Colleges and Support Groups –
need to recognise requirement for ‘individual’ solutions
– outcome based.
• Ensure that business areas know their responsibilities –
won’t do security ‘to’ or ‘for’ them – they own the risks.
• Provision of supporting services and not about saying
‘No’.
• External and internal collaboration and information
sharing.

More Related Content

What's hot

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendationsJisc
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyJisc
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterJisc
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Jisc
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Jisc
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationJisc
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateJisc
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Jisc
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44Jisc
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively onlineJisc
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analyticsJisc
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Jisc
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayJisc
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Jisc
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Jisc
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...Jisc
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Jisc
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreJisc
 

What's hot (20)

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendations
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul Bailey
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall Sclater
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for education
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and update
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively online
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analytics
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, Norway
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick Moore
 

Viewers also liked

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Jisc
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts nowJisc
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT securityJisc
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001Jisc
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinJisc
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning JanetJisc
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMINJisc
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at ImperialJisc
 
Science DMZ
Science DMZScience DMZ
Science DMZJisc
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceJisc
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment JourneyJisc
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionJisc
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2Jisc
 

Viewers also liked (20)

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT security
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager Weinstein
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning Janet
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMIN
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at Imperial
 
Science DMZ
Science DMZScience DMZ
Science DMZ
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light Source
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment Journey
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusion
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2
 

Similar to Role of the CISO in Higher Education

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Association for Project Management
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...National Center for Campus Public Safety
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - PosterAndrew Kerr
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptxTRIGGER16
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman360 BSI
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352llh67aggie
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities surveyJisc
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 

Similar to Role of the CISO in Higher Education (20)

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptx
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352
 
9 mahmood shah risk 4 3
9 mahmood shah risk 4 39 mahmood shah risk 4 3
9 mahmood shah risk 4 3
 
JNCanhietUALIT
JNCanhietUALITJNCanhietUALIT
JNCanhietUALIT
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities survey
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 

More from Jisc

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

More from Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Role of the CISO in Higher Education

  • 1. Role of the CISO in Higher Education University of Edinburgh 1/11/2016
  • 2. Role of the CISO in Higher Education Experiences from University of Edinburgh
  • 3. PrincipalPrincipal Information Services Group Information Services Group Corporate Services Group Corporate Services Group University Secretary’s Group University Secretary’s Group College of Science and Engineering College of Science and Engineering College of Art, Humanities and Social Sciences College of Art, Humanities and Social Sciences College of Medicine and Veterinary Medicine College of Medicine and Veterinary Medicine
  • 4. Background to Appointment of CISO • Structure of University allows for high degree of local prioritisation of information security risk profile, with limited central direction. • Senior Academic review (eg Kenway Report) recognised benefits of central senior focus. • Appointment of new CIO brought renewed focus to requirement for CISO to cover all aspects of information security risk rather than previous alignment to IT security. • Risk and Audit Committee, and senior staff, buy-in and support crucial to success – mandate from the top.
  • 5. Recruitment • Selection process supported by external recruitment agency to broaden candidate pool. • Interview panel included senior academics and directors from within ISG – adds to broad engagement. • Appointment in early 2016, took up post in February 2016.
  • 6. CISO – Main Responsibilities • Leads and owns the information security strategy for the university. • Drives and owns the information security risk posture, taking a risk-based, holistic approach to managing information security risk. • Leads pan-University information security activities, managing the information security risk to IT facilities from internal and external threats. • Advices the University on strategic existing and emerging information security threats. • Owns, manages and develops appropriate information security policies, procedures, controls and the overall information security governance framework.
  • 7. Initial Priorities • Recruitment of team with necessary skills – challenge of competing against private sector. • Increased focus on user. • Overhaul of information security risk governance to focus on risk based approach. • Support to strategic/key projects (Service Excellence Programme, Data Safe Haven, Network Refresh, Data Sciences, Alan Turing Institute, Student analytics, distance learning and eExams.)
  • 8. Keys to Success • Alignment to University 2016 Strategy – supporting plans for Digital Transformation and Data and Partnerships with Industry. • Buy-in from individual Colleges and Support Groups – need to recognise requirement for ‘individual’ solutions – outcome based. • Ensure that business areas know their responsibilities – won’t do security ‘to’ or ‘for’ them – they own the risks. • Provision of supporting services and not about saying ‘No’. • External and internal collaboration and information sharing.