Keep an Eye Out for Standards and Policies in Revision
The ITS IT Policy team is focused on ensuring all IT policies and standards are up-to-date and remain credible, implementable, and enforceable over time.
The ITS IT Policy team is focused on ensuring all IT policies and standards are up-to-date and remain credible, implementable, and enforceable over time.
A new Data Classification Self Assessment tool helps identify the classification level of the data you are working with so that you can plan to store or process it securely.
JD Jordan, Desktop Support Manager for the Executive IT team and Security Unit Liaison (SUL), has an office in the Ruthven building and supports the IT needs of the executives located there. In his role as SUL, an important responsibility is ensuring cybersecurity awareness and preparedness against phishing scams.
Creating fantasy realms when running through the backwoods or getting the chance to test-drive heavy machinery can provide an idyllic landscape for a kid growing up. Arthur Gibson has fond memories of his childhood in Alabama, but today, his interests have shifted toward the field of cybersecurity.
We are thrilled to introduce David Savercool, who has recently joined ITS Information Assurance as an Information Security Engineer. David brings a wealth of experience from his previous roles at Barracuda Networks, Ripple Science, American Express, Dart Container, and VMware. His diverse expertise spans security engineering, automation, and infrastructure security, making him a valuable asset to the PROACTIVE team.
The ITS Privacy Office and the Office of the Vice President for Communications (OVPC) released a new consent and preference management integration for U-M websites, replacing the OneTrust Cookie Consent module that had been in use since 2022.
This spring, ITS Identity and Access Management (IAM) will take another step toward improving the security of Duo two-factor authentication at U-M. Phone and SMS (text message) will no longer be available as authentication options for people who are enrolling in Duo for the first time, or for current users who add a device with a new phone number. If you are traveling to a location where data connection is unavailable, the Duo mobile app can provide a Mobile Passcode.
Vulnerability management is the process of discovering and remediating or mitigating security weaknesses in the U-M computing environment. Tenable Vulnerability Management and the Tenable agent are critical to this process.
Tenable provides proactive detection of vulnerabilities on U-M systems, allowing proactive remediation. Benefits include:
Asmat Noori, Interim Chief Information Security Officer, appreciates the ways in which the security community demonstrates commitment to the shared responsibility of protecting U-M’s digital assets. One component of this responsibility is staying informed. Information Assurance (IA) has established a training working group composed of unit representatives who are interested in implementing new ITS-developed data protection training across the university.