Information Security & Assurance (ISA)
ISA supports the following activities:
-
Safeguarding UA's digital assets, data, and networks from potential cyber threats and attacks.
-
Implement and maintain robust security measures to protect against unauthorized access, data breaches, malware, and other security risks.
-
Conduct regular assessments to identify vulnerabilities in systems, applications, and infrastructure and then develop and deploy appropriate solutions to address these weaknesses.
-
Educate staff, faculty, and students about cybersecurity best practices and ensuring compliance with relevant security policies and regulations.
-
Maintain the confidentiality, integrity, and availability of UA's sensitive information and technology infrastructure.
Our Portfolio
Information Security and Assurance has a broad responsibility in support of UA.
The UA Software Security Review Process is in place to make sure all of the policies and standards are met surrounding where UA data is stored, processed, and shared.
Provides system-wide guidance on records retention and disposition for both physical and electronic records, supports enterprise content management platform, etc.
Monitors, detects, responds to, and provides oversight of security events across UA’s systems and network.
Governance, Risk, and Compliance, or GRC, works to make sure the University of Alaska is not vulnerable to cyberattacks.