Skip Main Navigation

Community College of Rhode Island

Secrets on how to build a security program

Presenter: Larry Wilson, Information Security Lead, UMass President's Office

Part I

Session 1 will examine some of the recent data breaches and focus on some of the common themes (internet of things, cloud computing, consumerization of IT, etc.). We will discuss the different threats and vulnerabilities that could lead to a potential high risk situation. We will then investigate at a high level some of the safeguards that organizations can use to reduce the risk.

Part II

Session 2 will focus on some of the best practices, technologies and tools that are available to corporations to prevent or detect / respond to a potential security breach. We will discuss how a company can design security controls, get executive approval, purchase and implement technologies and align IT resources to protect their critical IT resources and information assets.

This page developed and maintained by Web Services. Send comments and suggestions to bbarrett@ccri.edu.


Last Updated: 7/1/15