Unit Information Security Lead Training
UISL Training Objectives
- Align with campus client security needs and responsibilities.
- Help units meet business objectives and manage cybersecurity risk.
- Understand the Appendix Data Security (DS) process.
- Know the data your unit is processing and how to protect it.
- Understand how to apply a risk-based approach to decision-making.
- Answer your IS-3 and security questions.
In order to align training content with the diversity of campus units and technical expertise, UISL training has been defined in the following tiers.
Tier 1 UISL Training
You should take UISL Tier 1 training if you:
- Process university data (such as student data, health information, financial records, and institutional research) or manage access to this data for others.
- Manage university resources (such as network, data center systems, databases) or manage access to these resources for others.
- Obtain (purchased or free) IT goods or services where the Supplier has access to university data or resources, including G-Suite apps and integrations. with university systems. You want to help your unit access ITS services to protect university data.
- Help, or want to help, your unit apply cybersecurity policies and practices.
To take the Tier 1 training, you must complete the following 4 steps:
- Watch the UISL IS-3 Security Controls video (1h 10m 11s).
- Read the UISL prerequisite slides (30 mins).
- Read the FAQs (15 mins).
- Complete the training survey (5 mins).
Once these 4 steps are completed, you will be added to the UISL tracking list and invited to Tier 2 training when it is available.
Tier 2 and Tier 3 UISL Training
UISLs delegated by unit heads will be invited to participate in additional training that dives deeper into IS-3 Policy and Standards and the tools and processes that help you become an effective defender of campus Institutional Information and IT Resources.