The ever changing and challenging role of the University CISO - Ransomware, Research data and everyone has a question about Artificial Intelligence
Details
Date: Thu November 7, 2024Time: 11:30
Room: A
The rapidly evolving security threat landscape in conjunction with the move to hybrid working and the progress of digital transformation has vastly increased the volume and complexity of demands on cyber security leaders in the higher education sector.
This presentation will address the challenges facing cyber security leaders and operational teams in achieving an optimal cyber security posture in the diverse and ever-changing University environment.
The presentation will be delivered by the Trinity College Dublin Cyber Security manager/CISO Sara McAneney and will cover lessons learned in the Trinity environment throughout.
Sara will outline the key questions and issues for cyber security leaders and detail how those considerations have influenced the Trinity Cyber Security Team in creating their Cyber Security programme of work for 2024/25.
Broadly the issues which will be covered in the presentation include:
- The ever-evolving cyber security threat landscape and its impact on the Higher education sector.
- Applying ‘Security by Design’ to campus infrastructure decisions
- The challenges in engaging with the hybrid workforce around cyber security training and awareness.
- The impact of the progress of digital transformation on the services provided by a cyber security team.
- The success of the HEAnet SIEM/SOC solution in providing monitoring and detection of cyber security incidents in Trinity.
- Evolving requirements for high security storage solutions for Research data and how Trinity is addressing them.
The presentation will conclude with a discussion of the impact of AI in the sector. Including the many questions that are arising daily from faculty and students around the appropriate use of AI in teaching and learning, assessment, and administrative functions.
Will AI add to the CISOs burden, or will it prove the most useful tool yet in resolving some of our most challenging cyber security issues?