Tag Archives: Consultants

  • 0

A Techcomm Bestiary–My Next Lightning Talk

Category:Infosec Communicator,techcomm Tags : 

Manticore

I’m developing a new lightning talk using the concept of a medieval bestiary.

A bestiary is an illustrated compendium of beasts, popular in the middle ages. Bestiaries introduced people to real and fantastical creatures that they would never encounter.

This Lightning Talk will provide a bestiary of techcomm practitioners, many of which you WILL encounter in the course of your career. Join me for an enjoyable look at today’s techcomm beasts.

Attendees will enjoy seeing to which beasts they and their colleagues are most similar. Note that any resemblance to actual techcomm practitioners is purely coincidental. No actual techcomm practitioners will be harmed in the production of this lightning talk.

I’m planning on tieing medieval images to techcomm careers and/or individuals. What do you all think about that?

I’ll be presenting this Lightning Talk at the STC Summit 14 in Phoenix in May.


  • 2

Infosec Strategies: Creating Centralized Efficiencies in a Decentralized IT Environment

Category:Higher Education,Information Security,Infosec Communicator,Leadchange,Risk,Uncategorized Tags : 

Information Security Wordle: RFC2196 - Site Se...

My thoughts on one of the challenges facing infosec offices in higher education. It reflects my thoughts, and not necessarily those of my employer.

The institutional challenge of creating centralized cost-effective efficiencies in an environment with a strong tradition of localized, decentralized IT solutions and personnel is normative in higher education.

An Information Security Office can create centralized efficiencies by:

  • Modeling an effective centralized service organization that is responsive to the individual needs of specific departments. (One way to accomplish this is by regular meetings with stakeholders to ensure that the Information Security Office can enable their business, rather than create barriers with unreasonable requirements.)
  • Providing centralized security services such as vulnerability scanning of web and servers and security reviews of proposed solutions.
  • Managing compliance initiatives such as private information remediation centrally, leveraging an extended team composed of empowered college and division representatives.
    Read More

  • 0

New Resources for Security Awareness

Category:Higher Education,Information Security,Infosec Communicator,Internet Safety,Uncategorized Tags : 

Having trouble with security awareness at your university or college? Need some new ideas? Trying to figure out what to do for National Cyber Security Awareness Month?

The members of the EDUCAUSE Higher Education Information Security Council (HEISC) Awareness and Training Working Group have created some wiki-based resources to help you with your security awareness initiatives.

We’ve created two main resources.

  • The Quick Start Guide (https://wiki.internet2.edu:443/confluence/x/sRpG) provides ideas and resources for launching a security awareness program. Topics range from establishing an Information Security Awareness Program to different techniques and vehicles for “getting the message out.” The Quick Start Guide is useful for both beginning and advanced security awareness programs.
  • The Detailed Instruction Manual (https://wiki.internet2.edu:443/confluence/x/yBpG) provides additional topics around selected security awareness initiatives including campus-specific efforts and tips on communicating specific issues.

Check out these resources. The A&T Working Group is delighted to share their ideas with you and they’re there to help you be successful. They have a wide range of expertise and they believe you’ll find these materials valuable.

Enhanced by Zemanta

Site Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,772 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner