Presentation is loading. Please wait.

Presentation is loading. Please wait.

PBA.

Similar presentations


Presentation on theme: "PBA."— Presentation transcript:

1 PBA

2 Observations Growth, projects, busy-ness Great Quality of work
Doing an incredible amount of work Great Quality of work Concern about being perfect Attitudes Tight financial times Salaries No magic solution

3 Security Protecting data/resources through security is important!
18,625 attacks per hour, 34% of network traffic Layer 7 firewall is blocking 447,000 attacks a day 24 hour period. Top 5 concerns of CIOs in higher education Second biggest concern is cleaning up old data from desktops and laptops and protecting them. Concern of Board of Trustee’s Audit Committee Best practices for a University our size Utah Schools U USU Weber

4 Security Need Positions
Backup to ISO on all Systems such as firewalls, IDS, IPS, Incident Handling, PCI, etc. Desktop security

5 Positions Hourly Plan Full time Plan Spider scans on desktops
Spider scans of laptops Vulnerability scans of the network End user encryption Desktop audits Web security tips and how to Full time Plan Backup to ISO on all Systems such as firewalls, IDS, IPS, Incident Handling, PCI, etc. Malware, McAfee Antivirus, EPO, HIPS Security awareness training Integration of EPO , Foundstone and Intrushield products. Vulnerability assessments, penetration tests and security audits Windows update server/policies, Desktop Audits, Desktop Encryption, Backup & Recovery (Disaster Recovery, Business Continuity) Password Strength, management, and expiration, Manage VPN access and monitor, Manage Web filtering solution, Deploy and manage a central logging system Microsoft active directory security , Deploy, manage and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software. Investigates complaints of non-compliance as well as any foreseeable internal and external information security risks and reports on noted irregularities and risks. Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity. Interpret activity and make recommendations for resolution.

6 Security Requests IT Security Analysis (Desktop security specialist) $80,000? Hourly money for security $25,000 Web filter - $75,000 one-time $15,000 on-going

7 DBA Oracle 11g Upgrade Oracle masking Identity Vault

8 DBA Requests Oracle Tools (Data Masking Pack) RAC
Support Disaster Recovery of Banner etc. DBA trainee

9 OIT Accreditation – Standard 5

10 OIT Priorities for This Year
Updated Master Plan with New executive team ODS/EDW & Webfocus reports/dashboards Portfolio/Projects Office IT Security, Compliance, Policies IT Training, Communications, Metrics Disaster Recovery Plan Web 2.0 & Cloud Computing Directions Academic Computing SRIs, data, scheduling, faculty workload, ePortfolio

11 Other Projects R-25 web-based Virtual Lab Wimba in Portal FSAAtlas
iTunes Time/Leave Entry SRITS Computer Rental Programs

12 Continued GroupWise vs Exchange discussion – plan Wasatch campus
(Also Novell vs Microsoft) Wasatch campus Alpha shut-off Remote Classroom Demo Mobile Computing Campus-wide sustainable MEC GroupWise 8 ?

13 Requests Projects Office (accountability) FTE
Growth funding (people & systems) catch up (extremely thin) model for future Risk mitigation (new environment & rules) Support – apple, mobile, other Development vs Maintenance (Projects vs Services)


Download ppt "PBA."

Similar presentations


Ads by Google