Skip to Content

Threat Management


Policy Development and Compliance Service

Our team is responsible for maintaining and developing Information Security-related policies and procedures on campus. The Information Security Office also measures compliance with existing policies through the annual risk assessment process.

Implementation and Support

  • Consulting and advising on existing Information Security policies
  • Maintenance of existing Information Security-related policies
  • Development of new Information Security-related policies
  • University Information Security compliance measurement and evaluation

Options

  • Information Security focused policy development and maintenance
  • Policy and compliance advisement
  • Policy and compliance assessments

Customer Responsibilities

  • Become aware of existing Information Security policies and be alert for updates
  • Comply with these policies and notify Information Security when policy violations are observed

Top


Security Awareness Training and Consulting Service

The Information Security Office provides this service to the Texas State University campus using a variety of outreach efforts. This service includes basic and advanced security training and workshops offered every semester, customized security awareness programs, annual Cyber Security Awareness month activities, a comprehensive Information Security website, security-specific brochures and publications, and many other awareness and compliance programs.

Implementation and Support

  • Ongoing security awareness programs across campus
  • Specialized and general Information Security training classes
  • Individualized consulting and training
  • Online awareness programs
  • Comprehensive Information Security website

Options

  • Group, department, or individual on-demand training options
  • Training classes offered through Professional Development and Technology Resources
  • Customized group or one-on-one training or hands-on workshops
  • Customized security-specific presentations for your department on a variety of topics
  • Subject Matter Expert Speakers for your events
  • Information Security email discussion list management

Customer Responsibilities

  • Be attuned to announcements of available training and awareness workshops and activities
  • Proactively seek guidance from the Information Security Office re: security and privacy concerns
  • Join an Information Security email discussion list

Top

Risk Management Service

This service includes centralized support for all departmental Information Security risk assessments. The Information Security Office provides regular vulnerability scanning, penetration testing, and confidential information discovery through this service. This service also includes annual risk assessment and device registration guidance for Technical Support Professionals (TSPs) as well as comprehensive mitigation strategies for the campus.

Implementation and Support

  • Scheduling and implementing vulnerability assessments and penetration tests
  • Support and training for device registration and risk assessment tools
  • Support for conducting annual state-mandated risk assessments

Options

  • System security assessments (for individual or groups of systems)
  • Network vulnerability assessments
  • Security and penetration tests
  • Physical security assessments
  • Tools for device registration and risk assessments
  • Confidential information discovery tools
  • Self-assessment open-source tools

Customer Responsibilities

  • Comply with all Texas State University policies and procedures
  • Perform annual security risk assessments
  • Register servers and perform registration updates as needed
  • Work with the Information Security Office to mitigate identified risks

Top