top of page
shutterstock_1037739901.jpg

Cybersecurity for

Academic Institutions

Screenshot (368).png

Cybersecurity in academic institutions is very complex. Keeping all three cohorts protected and safe is critical for the institution's academic reputation, financial health, and future success. 

The risks are numerous and the outcomes can be very damaging

Screenshot (370).png

Losing federal grant awards  because they do not pass  

minimum cyber standards 

Screenshot (371).png

Violating regulatory  

requirements resulting in fines and operational interruption 

Damage to reputation, increasing talent retention issues, and loss of funding 

The causes are many and need to be addressed in a robust security program 

people-2.png

Unsanctioned

Security Ops

Human-centered Deficiencies 

Physical Location Security Deficits

Violating network usage policies 

Unmanaged devices (shadow IT)

Duplicate software outside IT

Lack of staff and faculty training 

Unenforced policy for all cohorts 

Rich data is hidden or unprotected 

Critical research location security

Dormitory control, student safety

Open-to-the-public campuses

noun-open-lock-4459928-FFFFFF.png
Screenshot (372).tif

We have specific approaches to tackling urgent topics in security: 

Artificial Intelligence

Authoring policy & training faculty and staff to recognize threats 

Cybersecurity Insurance

Obtaining correct coverage & compliance to confirm coverage 

 

Enterprise-wide Data Management

Discouraging data siloing & enabling/enforcing secure data sharing 

image.png

We will build a robust security framework across these eight critical areas - safeguarding Students, Faculty, and Staff alike.

Managing Risk

Developing a risk profile for all three stakeholders to support the educational mission 

Measuring Effectiveness

Performing gap analysis on all primary institutional systems

Policy Creation

Authoring internal and external policies and SOPs guided by FERPA, FOIA. HIPAA, etc.

Incidence Response Planning

Identifying, communicating, and reporting research data and other system breaches

Implementing Safeguards

Establishing security controls for infrastructure in support of safetly for all three cohorts

Staff Security Training

Developing awareness training and evaluation programs customized for each cohort

Vendor Management

Executing supplier assessments and building SLAs for all external resouces

Cyber Governance

Effective reporting to institution executives, provosts and board of trustees

OUR PROCESS

fgnxfbzv.png

1. Assessment

2. Buildout

3. Transition

In this initial phase, Security Counsel will conduct research, evaluate current systems and processes and create a strategy framework to guide the execution of subsequent phases.

In Phase 2, we will create the foundation of the security program and implement new SOPs. We will iteratively assess, refine, and report on the security plan until it is running smoothly and is self-sustaining.

Finally, we will transition the program to your organization by helping you hire and train your security team and provide ongoing mentoring & on-call support as needed.

FROM THE LEADERSHIP

"We understand the biggest cybersecurity challenges plaguing Educational Institutions today. We can create and support a security program that solves your most urgent problems in order to prevent security related loss and to continue to support your primary educational mission."

mattt.png

Matt DeChant

CEO, Founder

bottom of page