Unit Information Security Lead (UISL) Training

Unit Information Security Leads (UISLs) are workforce member(s) assigned responsibility for the implementation and enforcement of security controls in IS-3 Policy. UISLs don't need to be technical people (though they can be). Their primary responsibility is to ensure that units implement the security controls rather than personally executing them. See the UISL Responsibilities and Unit Responsiblities web pages for more information.

This UISL training will provide an understanding of the requirements set forth in the IS-3 Policy, clarify your responsibilities as a UISL, and introduce the range of ITS services available to assist you in achieving compliance.

UISL Training Objectives

  • Align with campus client security needs and responsibilities.
  • Help units meet business objectives and manage cybersecurity risk.
  • Understand the Appendix Data Security (DS) process.
  • Know the data your unit is processing and how to protect it.
  • Understand how to apply a risk-based approach to decision-making.
  • Answer your IS-3 and security questions.

In order to align training content with the diversity of campus units and technical expertise, UISL training has been defined in the following tiers. 

Tier 1 UISL Training

You should take UISL Tier 1 training if you:

  • Process university data (such as student data, health information, financial records, and institutional research) or manage access to this data for others.
  • Manage university resources (such as network, data center systems, databases) or manage access to these resources for others.
  • Obtain (purchased or free) IT goods or services where the Supplier has access to university data or resources, including G-Suite apps and integrations. with university systems. You want to help your unit access ITS services to protect university data.
  • Help, or want to help, your unit apply cybersecurity policies and practices.

To take the Tier 1 training, you must complete the following 4 steps:

  • Watch the UISL IS-3 Security Controls video (1h 10m 11s).
  • Read the UISL prerequisite slides (30 mins).
  • Read the FAQs (15 mins).
  • Complete the training survey (5 mins).
Visit Tier 1 Training page

Once these 4 steps are completed, you will be added to the UISL tracking list and invited to Tier 2 training when it is available.

Tier 2 and Tier 3 UISL Training

UISLs delegated by unit heads will be invited to participate in additional training that dives deeper into IS-3 Policy and Standards and the tools and processes that help you become an effective defender of campus Institutional Information and IT Resources.

Visit Tier 2-3 Training page