Unit Information Security Lead Training

UISL Training Objectives

  • Align with campus client security needs and responsibilities.
  • Help units meet business objectives and manage cybersecurity risk.
  • Understand the Appendix Data Security (DS) process.
  • Know the data your unit is processing and how to protect it.
  • Understand how to apply a risk-based approach to decision-making.
  • Answer your IS-3 and security questions.

In order to align training content with the diversity of campus units and technical expertise, UISL training has been defined in the following tiers. 

Tier 1 UISL Training

You should take UISL Tier 1 training if you:

  • Process university data (such as student data, health information, financial records, and institutional research) or manage access to this data for others.
  • Manage university resources (such as network, data center systems, databases) or manage access to these resources for others.
  • Obtain (purchased or free) IT goods or services where the Supplier has access to university data or resources, including G-Suite apps and integrations. with university systems. You want to help your unit access ITS services to protect university data.
  • Help, or want to help, your unit apply cybersecurity policies and practices.

To take the Tier 1 training, you must complete the following 4 steps:

  • Watch the UISL IS-3 Security Controls video (1h 10m 11s).
  • Read the UISL prerequisite slides (30 mins).
  • Read the FAQs (15 mins).
  • Complete the training survey (5 mins).
Visit Tier 1 Training page

Once these 4 steps are completed, you will be added to the UISL tracking list and invited to Tier 2 training when it is available.

Tier 2 and Tier 3 UISL Training

UISLs delegated by unit heads will be invited to participate in additional training that dives deeper into IS-3 Policy and Standards and the tools and processes that help you become an effective defender of campus Institutional Information and IT Resources.

Visit Tier 2-3 Training page