Identity and Access Management: Products Won’t Save You, but They’ll Help
Higher education is facing a pivotal moment where institutions must protect themselves from constantly evolving cybersecurity threats with limited budgets and staffing. Compounding the problem even further, higher education is especially susceptible to marketing that portrays products as the solution to their problems. As with every discipline, technology alone is not the answer. It’s the […]
GLBA Safeguards Rule Compliance Deadline Extension
As most of you know, the Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, was designed to regulate, control, and take affirmative precautions to safeguard sensitive nonpublic personal information (NPI) collected by organizations classified as “financial institutions” from individuals to obtain a financial product or service. The GLBA rules, which […]
Decreasing the Risk to Security Threats Starts with Sound Data Governance
As news breaks on increased cybersecurity threats, CIO leaders often find themselves filling in the gaps and dealing with the most pressing issues regarding data and the possibility of a breach. As noted in a recent article by Inside Higher Ed1, cybersecurity company BlueVoyant published research about the increase in attacks on higher education institutions from […]
Have You Heard What They Are Saying? Listen to The Tambellini Group’s Top of Mind Podcast Series
The Tambellini Group’s Top of Mind Podcast Series continues to keep pace with the education technology landscape by sharing insights and ideas from today’s higher education technology leaders. Each conversation explores the people and the innovations that continue to shape the way campuses operate and the future of learning. Catch-up with these episodes to hear […]
Student Privacy Concerns
Host Katelyn Ilkani talks with Tom Dugas, Assistant Vice President and Chief Information Security Officer at Duquesne University, about securing identities. Dugas explains why identity and access management is critical to higher education. He describes the process of building a solid IAM program and choosing a dependable solution. Dugas also discusses how COVID-19 has affected […]
Cybersecurity Implications of COVID-19
Host Katelyn Ilkani talks with Helen Patton, Associate Vice President and Chief Information Security Officer at The Ohio State University. Patton explains the security challenges Ohio State has faced with staff working remotely. She shares thoughts on the importance of the partnership between security and technology teams within an institution. Hear suggestions for success in […]
A Chief Information Security Officer Discusses Cybersecurity and Identity and Access Management
West Virginia University’s CISO Alex Jalso shares thoughts on information security and identity management in higher education. Tambellini’s Katelyn Ilkani asks Jalso about his security philosophy and the steps he takes to keep WVU’s systems safe. Jalso describes the process of establishing a new identity and access management (IAM) system and shares lessons learned. Learn […]
DIY Information Security Program: It Takes the Full Village to Effectively Steward Our Data
Not able to create a dedicated Chief Information Security Officer or cybersecurity team in your environment? Or are you uncertain about whether such an investment would yield the desired programmatic risk-mitigation results? It didn’t make sense in our context to prioritize creation of a CISO or new dedicated information security roles. We have taken an […]
5 Must-Have Open Source Cybersecurity Tools for Higher Education
When it comes to cybersecurity, higher education has vastly different needs than other types of organizations. From a physical point of view, campuses are comprised of public spaces (areas where literally anyone can go), semi-public spaces (classrooms and faculty offices), and secured areas. At the network layer, the network surface is vast, encompassing everything from […]
Architecting for Security in Higher Education
There’s a saying sometimes attributed to an ancient Japanese proverb (though the origin is most likely apocryphal) stating, “fix the problem, not the blame.” The gist of this is that it’s more important to address an issue than to focus on whose fault it is. There’s wisdom in that—particularly when it comes to cybersecurity. Security […]