Information Security & Assurance (ISA)

ISA supports the following activities:

  • Safeguarding UA's digital assets, data, and networks from potential cyber threats and attacks.

  • Implement and maintain robust security measures to protect against unauthorized access, data breaches, malware, and other security risks.

  • Conduct regular assessments to identify vulnerabilities in systems, applications, and infrastructure and then develop and deploy appropriate solutions to address these weaknesses.

  • Educate staff, faculty, and students about cybersecurity best practices and ensuring compliance with relevant security policies and regulations. 

  • Maintain the confidentiality, integrity, and availability of UA's sensitive information and technology infrastructure.

Security Matters

Information and Guidance for Safer Computing

IT Security Standards

Standards, Program Information, and Supporting Content

Our Services

View and Request Services from our Interactive Service Catalog

Our Portfolio

Information Security and Assurance has a broad responsibility in support of UA. 

 

  Software Security Review Process

The UA Software Security Review Process is in place to make sure all of the policies and standards are met surrounding where UA data is stored, processed, and shared.

 

  Records & Information Management

Provides system-wide guidance on records retention and disposition for both physical and electronic records, supports enterprise content management platform, etc.



 

  Security Operations
 
Monitors, detects, responds to, and provides oversight of security events across UA’s systems and network.
 
  Governance, Risk, and Compliance


Governance, Risk, and Compliance, or GRC, works to make sure the University of Alaska is not vulnerable to cyberattacks.