Introduction to Information Security at Georgia Tech

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Thursday June 16, 2011
      9:00 am - 11:30 am
  • Location: Room 308, Savant Building
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    None
  • Extras:
Contact

Herb Baines
Office of Information Technology 

Summaries

Summary Sentence: No summary sentence submitted.

Full Summary: This class is intended for users who want to learn more about the over-arching guiding principles for Information Security at Georgia Tech. The class is a core component of the Information Security Certificate program. During the session, we will cover several topics related to Information Security and how they specifically relate to Georgia Tech

This class is intended for users who want to learn more about the over-arching guiding principles for Information Security at Georgia Tech. The class is a core component of the Information Security Certificate program. During the session, we will cover several topics related to Information Security and how they specifically relate to Georgia Tech including:

  • The information security concepts of C I A (Confidentiality, Integrity, Availability) and risk management and how they apply here at Tech. 
  • Overview of the various regulatory requirements that Tech must adhere to (FERPA, GLBA, HIPAA, PCI). 
  • Overview of the CNUSP and DAP and what they mean to the Georgia Tech community 
  • Overview of the Georgia Tech Security Plan & how the Plan addresses protection of people, data, and resources 

 The instructors will draw from real world case studies that have occurred at Georgia Tech.

Objectives:

At the end of the class, students will:

  1. Have an understanding of the C-I-A triad  
  2. Have an understanding of the regulatory requirements Georgia Tech is obligated to meet 
  3. Have an understanding of the two key Institute Information Security policies & how they apply to the Georgia Tech community  
  4. Have an understanding of the Georgia Tech Security Plan and the approach taken to mitigate risk to campus IT resources

Related Links

Additional Information

In Campus Calendar
No
Groups

General

Invited Audience
No audiences were selected.
Categories
Career/Professional development
Keywords
CNUSP, information security, oit, training
Status
  • Created By: Michael Hagearty
  • Workflow Status: Published
  • Created On: May 26, 2011 - 9:41am
  • Last Updated: Oct 7, 2016 - 9:55pm