Cybersecurity for
Academic Institutions
Cybersecurity in academic institutions is complex. Keeping all three cohorts protected and safe is critical for the institution's academic reputation, financial health, and future success.
The risks are numerous, and the outcomes can be very damaging
Losing federal grant awards because they do not pass
minimum cyber standards
Violating regulatory
requirements resulting in fines and operational interruption
Damage to reputation, increasing talent retention issues, and loss of funding
The causes are many and need to be addressed in a robust security program
Unsanctioned
Security Ops
Human-centered Deficiencies
Physical Location Security Deficits
Violating network usage policies
Unmanaged devices (shadow IT)
Duplicate software outside IT
Lack of staff and faculty training
Unenforced policy for all cohorts
Rich data is hidden or unprotected
Critical research location security
Dormitory control, student safety
Open-to-the-public campuses
We have specific approaches to tackling urgent topics in security:
Artificial Intelligence
Authoring policy & training faculty and staff to recognize threats
​
Cybersecurity Insurance
Obtaining correct coverage & compliance to confirm coverage
Enterprise-wide Data Management
Discouraging data siloing & enabling/enforcing secure data sharing
We will build a robust security framework across these eight critical areas - safeguarding Students, Faculty, and Staff alike.
Managing Risk
Developing a risk profile for all three stakeholders to support the educational mission
Measuring Effectiveness
Performing gap analysis on all primary institutional systems
Policy Creation
Authoring internal and external policies and SOPs guided by FERPA, FOIA, HIPAA, etc.
Incident Response Planning
Identifying, communicating, and reporting research data and other system breaches
Implementing Safeguards
Establishing security controls for infrastructure in support of safely for all three cohorts
Staff Security Training
Developing awareness training and evaluation programs customized for each cohort
Vendor Management
Executing supplier assessments and building SLAs for all external resources
Cyber Governance
Effective reporting to institution executives, provosts and board of trustees
OUR PROCESS
1. Assessment
2. Buildout
3. Transition
In this initial phase, Security Counsel will conduct research, evaluate current systems and processes and create a strategy framework to guide the execution of subsequent phases.
In Phase 2, we will create the foundation of the security program and implement new SOPs. We will iteratively assess, refine, and report on the security plan until it is running smoothly and is self-sustaining.
Finally, we will transition the program to your organization by helping you hire and train your security team and provide ongoing mentoring & on-call support as needed.
FROM THE LEADERSHIP
"We understand the biggest cybersecurity challenges plaguing Educational Institutions today. We can create and support a security program that solves your most urgent problems in order to prevent security related loss and to continue to support your primary educational mission."
Matt DeChant
CEO, Founder