SlideShare a Scribd company logo
1 of 8
Role of the CISO in Higher Education
University of Edinburgh
1/11/2016
Role of the CISO in Higher
Education
Experiences from University of Edinburgh
PrincipalPrincipal
Information
Services Group
Information
Services Group
Corporate Services
Group
Corporate Services
Group
University
Secretary’s Group
University
Secretary’s Group
College of Science
and Engineering
College of Science
and Engineering
College of Art,
Humanities and
Social Sciences
College of Art,
Humanities and
Social Sciences
College of
Medicine and
Veterinary
Medicine
College of
Medicine and
Veterinary
Medicine
Background to Appointment of CISO
• Structure of University allows for high degree of local
prioritisation of information security risk profile, with
limited central direction.
• Senior Academic review (eg Kenway Report)
recognised benefits of central senior focus.
• Appointment of new CIO brought renewed focus to
requirement for CISO to cover all aspects of
information security risk rather than previous
alignment to IT security.
• Risk and Audit Committee, and senior staff, buy-in
and support crucial to success – mandate from the
top.
Recruitment
• Selection process supported by external
recruitment agency to broaden
candidate pool.
• Interview panel included senior
academics and directors from within ISG
– adds to broad engagement.
• Appointment in early 2016, took up post
in February 2016.
CISO – Main Responsibilities
• Leads and owns the information security strategy for the
university.
• Drives and owns the information security risk posture, taking a
risk-based, holistic approach to managing information security
risk.
• Leads pan-University information security activities, managing
the information security risk to IT facilities from internal and
external threats.
• Advices the University on strategic existing and emerging
information security threats.
• Owns, manages and develops appropriate information security
policies, procedures, controls and the overall information
security governance framework.
Initial Priorities
• Recruitment of team with necessary skills –
challenge of competing against private sector.
• Increased focus on user.
• Overhaul of information security risk
governance to focus on risk based approach.
• Support to strategic/key projects (Service
Excellence Programme, Data Safe Haven,
Network Refresh, Data Sciences, Alan Turing
Institute, Student analytics, distance learning
and eExams.)
Keys to Success
• Alignment to University 2016 Strategy – supporting
plans for Digital Transformation and Data and
Partnerships with Industry.
• Buy-in from individual Colleges and Support Groups –
need to recognise requirement for ‘individual’ solutions
– outcome based.
• Ensure that business areas know their responsibilities –
won’t do security ‘to’ or ‘for’ them – they own the risks.
• Provision of supporting services and not about saying
‘No’.
• External and internal collaboration and information
sharing.

More Related Content

What's hot

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendationsJisc
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyJisc
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterJisc
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Jisc
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Jisc
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationJisc
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateJisc
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Jisc
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44Jisc
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively onlineJisc
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analyticsJisc
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Jisc
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayJisc
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Jisc
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Jisc
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...Jisc
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Jisc
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreJisc
 

What's hot (20)

FE digital student findings and recommendations
FE digital student findings and recommendationsFE digital student findings and recommendations
FE digital student findings and recommendations
 
Implementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul BaileyImplementing analytics part 1 - George Munroe and Paul Bailey
Implementing analytics part 1 - George Munroe and Paul Bailey
 
Implemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall SclaterImplemententing analytics part 1 - Niall Sclater
Implemententing analytics part 1 - Niall Sclater
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
Closing plenary - Connect more with the future - Andy McGregor and Rebecca Fe...
 
Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...Roundtable: How can education providers improve the employability prospects o...
Roundtable: How can education providers improve the employability prospects o...
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for education
 
Student experience experts meet up - introduction and update
Student experience experts meet up - introduction and updateStudent experience experts meet up - introduction and update
Student experience experts meet up - introduction and update
 
Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...Identifying and driving change in partnership with students - Simon walker, M...
Identifying and driving change in partnership with students - Simon walker, M...
 
Finding vulnerabilities - networkshop44
Finding vulnerabilities  - networkshop44Finding vulnerabilities  - networkshop44
Finding vulnerabilities - networkshop44
 
Supporting staff to teach effectively online
Supporting staff to teach effectively onlineSupporting staff to teach effectively online
Supporting staff to teach effectively online
 
Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?Jisc learning analytics network meeting - why are we here?
Jisc learning analytics network meeting - why are we here?
 
Transforming the student experience using learning analytics
Transforming the student experience using learning analyticsTransforming the student experience using learning analytics
Transforming the student experience using learning analytics
 
Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...Making a difference with technology enhanced learning - Esther Barrett, Andre...
Making a difference with technology enhanced learning - Esther Barrett, Andre...
 
Learning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, NorwayLearning analytics research and development work at University of Oslo, Norway
Learning analytics research and development work at University of Oslo, Norway
 
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
Learning Design Cross-Institutional Network (LD-CIN): a social place for bash...
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016
 
The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...The changing face of assessment and feedback: how technology can make a diffe...
The changing face of assessment and feedback: how technology can make a diffe...
 
Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016Working with students to make the most of digital - Jisc Digifest 2016
Working with students to make the most of digital - Jisc Digifest 2016
 
Implementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick MooreImplementing analytics - Paul Bailey and Dr Nick Moore
Implementing analytics - Paul Bailey and Dr Nick Moore
 

Viewers also liked

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Jisc
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts nowJisc
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT securityJisc
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001Jisc
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinJisc
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning JanetJisc
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Jisc
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMINJisc
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Jisc
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at ImperialJisc
 
Science DMZ
Science DMZScience DMZ
Science DMZJisc
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceJisc
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment JourneyJisc
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionJisc
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2Jisc
 

Viewers also liked (20)

Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...Data and information governance: getting this right to support an information...
Data and information governance: getting this right to support an information...
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
Protecting our customers - BT security
Protecting our customers - BT securityProtecting our customers - BT security
Protecting our customers - BT security
 
Working with students and ISO27001
Working with students and ISO27001Working with students and ISO27001
Working with students and ISO27001
 
Closing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager WeinsteinClosing plenary and keynote from Lauren Sager Weinstein
Closing plenary and keynote from Lauren Sager Weinstein
 
Provisioning Janet
Provisioning JanetProvisioning Janet
Provisioning Janet
 
Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)Archiving data from Durham to RAL using the File Transfer Service (FTS)
Archiving data from Durham to RAL using the File Transfer Service (FTS)
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
110G networking within JASMIN
110G networking within JASMIN110G networking within JASMIN
110G networking within JASMIN
 
Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...Enabling efficient movement of data into & out of a high-performance analysis...
Enabling efficient movement of data into & out of a high-performance analysis...
 
Science DMZ at Imperial
Science DMZ at ImperialScience DMZ at Imperial
Science DMZ at Imperial
 
Science DMZ
Science DMZScience DMZ
Science DMZ
 
Solving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light SourceSolving Network Throughput Problems at the Diamond Light Source
Solving Network Throughput Problems at the Diamond Light Source
 
The Assessment Journey
The Assessment JourneyThe Assessment Journey
The Assessment Journey
 
Data and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusionData and disadvantaged students - using learning analytics for inclusion
Data and disadvantaged students - using learning analytics for inclusion
 
The Jisc UK ORCID consortium : Workshop 2
The Jisc UK ORCID consortium: Workshop 2The Jisc UK ORCID consortium: Workshop 2
The Jisc UK ORCID consortium : Workshop 2
 

Similar to Role of the CISO in Higher Education

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Martin Lawrence
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Association for Project Management
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...National Center for Campus Public Safety
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - PosterAndrew Kerr
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptxTRIGGER16
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman360 BSI
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352llh67aggie
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities surveyJisc
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 

Similar to Role of the CISO in Higher Education (20)

Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016Swansea University - Integrated Assurance Case Study, 17 May 2016
Swansea University - Integrated Assurance Case Study, 17 May 2016
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
WP3 workshop_employability .pptx
WP3 workshop_employability .pptxWP3 workshop_employability .pptx
WP3 workshop_employability .pptx
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
 
Action Research EDLD 5352
Action Research EDLD 5352Action Research EDLD 5352
Action Research EDLD 5352
 
9 mahmood shah risk 4 3
9 mahmood shah risk 4 39 mahmood shah risk 4 3
9 mahmood shah risk 4 3
 
JNCanhietUALIT
JNCanhietUALITJNCanhietUALIT
JNCanhietUALIT
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
UCISA digital capabilities survey
UCISA digital capabilities surveyUCISA digital capabilities survey
UCISA digital capabilities survey
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Role of the CISO in Higher Education

  • 1. Role of the CISO in Higher Education University of Edinburgh 1/11/2016
  • 2. Role of the CISO in Higher Education Experiences from University of Edinburgh
  • 3. PrincipalPrincipal Information Services Group Information Services Group Corporate Services Group Corporate Services Group University Secretary’s Group University Secretary’s Group College of Science and Engineering College of Science and Engineering College of Art, Humanities and Social Sciences College of Art, Humanities and Social Sciences College of Medicine and Veterinary Medicine College of Medicine and Veterinary Medicine
  • 4. Background to Appointment of CISO • Structure of University allows for high degree of local prioritisation of information security risk profile, with limited central direction. • Senior Academic review (eg Kenway Report) recognised benefits of central senior focus. • Appointment of new CIO brought renewed focus to requirement for CISO to cover all aspects of information security risk rather than previous alignment to IT security. • Risk and Audit Committee, and senior staff, buy-in and support crucial to success – mandate from the top.
  • 5. Recruitment • Selection process supported by external recruitment agency to broaden candidate pool. • Interview panel included senior academics and directors from within ISG – adds to broad engagement. • Appointment in early 2016, took up post in February 2016.
  • 6. CISO – Main Responsibilities • Leads and owns the information security strategy for the university. • Drives and owns the information security risk posture, taking a risk-based, holistic approach to managing information security risk. • Leads pan-University information security activities, managing the information security risk to IT facilities from internal and external threats. • Advices the University on strategic existing and emerging information security threats. • Owns, manages and develops appropriate information security policies, procedures, controls and the overall information security governance framework.
  • 7. Initial Priorities • Recruitment of team with necessary skills – challenge of competing against private sector. • Increased focus on user. • Overhaul of information security risk governance to focus on risk based approach. • Support to strategic/key projects (Service Excellence Programme, Data Safe Haven, Network Refresh, Data Sciences, Alan Turing Institute, Student analytics, distance learning and eExams.)
  • 8. Keys to Success • Alignment to University 2016 Strategy – supporting plans for Digital Transformation and Data and Partnerships with Industry. • Buy-in from individual Colleges and Support Groups – need to recognise requirement for ‘individual’ solutions – outcome based. • Ensure that business areas know their responsibilities – won’t do security ‘to’ or ‘for’ them – they own the risks. • Provision of supporting services and not about saying ‘No’. • External and internal collaboration and information sharing.