One moment, processing...

Message Image  

Thursday, 11/7/13

Cyber and Intellectual Property Risk

Webinar: "How Can YOU Protect Your Institution's Data in Your Daily Activities?"

Date and Time: Thursday, 11/7/13, 12-1 pm Eastern - Register Today (for FREE!)

Description:
As the number of computing devices continues to grow, so does the ease of access to an ever increasing amount of data that is pervasive in our day to day lives. Also growing are the methods used by "hackers" to access that data. As a result, the risk to our business and personal data continues to grow, and we need to be aware of what "data" is, where it resides, and what we can do as individuals to boost our institution's and our own personal data security.

This webinar will provide a brief explanation of what is meant by "data", where we might encounter it, and what we can do to protect it. We'll attempt to present this information in layman's terms, making a point to avoid the "techno-speak" so often used by IT professionals. It will provide clear, simple and effective measures that you can implement to better safeguard data, whether it be on your college or university computer systems or your personal computer.  


Speaker:
Christopher Croad
Director of Information Security
Syracuse University

Christopher Croad is the director of information security at Syracuse University (SU), as well as a member of the faculty at SU's School of Information Studies, where he teaches undergraduate courses in computer security. Mr. Croad has been a self-proclaimed "security geek" for the past 18 years. Starting his career as an electrical engineer for a defense contractor in the 1980s, Mr. Croad became interested in this newfangled thing called "The Internet" and started learning about computers and networks. A computer break in at the Air Force base where he was employed piqued his interest, and he began a career in IT and information security and never looked back. Mr. Croad left the defense contractor world five years ago for the more challenging world of securing a higher education institution's data.

Resources to Share

Here are just a few resources for higher education administrators, students, faculty, and staff:

Cyber Risk:

  • Fighting Phishing, Pharming, and Other Cyber-Attacks: Coverage for High Tech Liabilities, Jerold Oshinsky, Lorelie S. Masters, Kenneth K. Lee, and Cherylyn J. Briggs, Jenner & Block, LLP, 2010 URMIA Journal. Much like any other business or organization, as universities rely more and more on electronic resources, they open themselves up to a new set of unique risks. This article focuses on risks related to usage of the Internet, e-mail, and electronic devices, as well as the potential impacts of cyber-crimes and data breaches. It also explores what professionals should look for in their insurance coverage and how the courts have interpreted whether the business or organization was liable when faced with a variety of different breaches or cyber-crimes.
  • Cyber Liability and Higher Education: Professional Risk Solutions, Sarah Stephens and Shannan Fort, Aon Risk Solutions, 2009 URMIA Journal. Institutions of higher education face many different threats and exposures related to the internet and the security and privacy of electronically stored information, while also operating within a culture that values complete open communication and exchange of ideas. This article provides a thorough description of the risk profile and various exposures that colleges and universities may face, the liability and regulatory environment, descriptions of specific education-related incidents, what strategies institutions can implement, and how to ensure they have proper insurance coverage to protect the institution in the event of such an information breach.
  • Information Technology Trends and Implications for Privacy, Security, and Risk Management, Cathy Hubbs, American University; Brian Nichols, Louisiana State University; Rodney Petersen, EDUCAUSE, URMIA's 2011 Annual Conference. Advances in information technology, including the adoption of cloud computing services and access to information via mobile devices, are transforming how colleges and universities conduct business and achieve their academic and research missions. Information privacy and security in higher education are emerging as critical areas of risk where appropriate controls and mitigation methods are necessary to prevent loss and minimize financial and legal exposure. This session explored a number of technology developments and policy issues that must be on every risk manager's agenda and will provide you with a set of tools and resources so you do not have to blaze the trail alone.
  • Brave New World of Cyber Risks: Don't Take This Trail Without a Map, Rodney Petersen, EDUCAUSE; Shannon Fort, Aon Risk Solutions; Holly Towle, K&L Gates, LLC; Steven Pacheco, ACE Professional Services, URMIA's 2011 Annual Conference. While cyber liability and social media risks affect every industry, how are their potential impacts on higher education unique? Web 2.0 has led to increased communication and data sharing across the net, bringing with it both greater liability and responsibilities. This session will provided recommendations on how higher education risk managers can evaluate and manage cyber risks, including transferring liability through insurance coverage with specific examples of policy language and claim scenarios.
  • Navigating the Cloud: What Risk Managers Need to Know, Kay Rhodes, Texas Tech University System, and Sam Segran, Texas Tech University, URMIA's 2013 Southwestern Regional Conference. Cloud computing is one of the fastest growing services today, providing benefits such as scalable on demand services, some increased efficiencies, and changes in the dynamics of operational expense for infrastructure and staffing. However, cloud services come with inherent risks, such as loss of control, uncertainty of data security, and issues of losing services. What are the risk controls that need to be in place for benefits to be gained by institutions? This session provided an overview of the cloud landscape, definitions, issues, and strategies to help customers navigate the maze of opportunities and concerns that come with cloud services.

Intellectual Property Risk:

  • WEBINAR: The Production and Consumption of Intellectual Property: What's the Risk?, Tim Flanagan, University of Notre Dame, and John Brosnan, AON Financial and Professional Risk Services Group, URMIA Webinar. This webinar focused on IP risk exposure, current litigation, and regulatory compliance. Mitigation strategies, including insurance solutions, were also addressed.
  • Intellectual Property and Technology Transfer, National Association of College and University Attorneys (NACUA), Higher Educational Compliance Alliance. Intellectual property and technology transfers significantly impact college and universities in their research and development of new ideas, products and methods. Legislation like the Bayh-Dole Act and the America Invents Act affect how intellectual property is managed at higher education institutions. Officials must know the rules that apply to intellectual property to protect inventions and permit further research and development. This website provides a number of resources on the topic of intellectual property from a wide variety of higher education associations.