The Office of Information Security provides CSU students, faculty, and staff with timely information as it relates to data security.
The Office of Information Security is responsible for assuring information confidentiality, data integrity, and systems availability. We accomplish this by:
- Educating the campus community about security related issues
- Developing and enforcing policies and routinely reviewing those policies
- Utilizing the strongest technical measures possible to protect campus resources
- Developing measures to react to incidents and events that endanger the institution's information assets
The Office of Information Security team are proud to display our accomplishments
CISSP Certified Lean Six Sigma certified sigma Hosted The 2015 USG Information Security Officers Conference
A tabletop exercise is a discussion-based event in which participants address actions they would take in response to an incident. These exercises are designed for personnel to discuss the full range of issues related to an incident scenario. These exercises provide a forum to examine roles and responsibilities, unearth interdependencies, and evaluate plans.
Participants will be presented with a real-world scenario that would strain personnel and resources, and cause numerous critical decisions that affect both the information technology function, and business processes.
TAG Members: $25 | Students: $0-$10 | Non-members: $50
Register At: http://bit.ly/cybersimulation
• Stanton Gatewood, CISO, Georgia Technology Authority
• FBI, Atlanta Field Office
• Tera N. Ladner, JD, IGP, CRM, Director of Information Governance, Aflac Inc.
• Stephen McCamy, Sr. Threat Management Consultant, Aflac Inc.
Alerts & News
Spam/Phishing emails sent to the CSU Community
Spam Email: Help Desk Requires you to upgrade webmail
Scam Email: Membership in FMA
Spam Email: "Locky" ransomware
Spam Email: IRS tax notification scam
Spam Email: Upgrade of your account to our new FTKH4 anti-virus (11/2/2015)
TA16-144A : WPAD Name Collision Vulnerability
TA16-132A : Exploitation of SAP Business Applications
Alert (TA16-105A): Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
TA16-091A : Ransomware and Recent Variants
TA15-337A : Dorkbot
TA15-314A: Compromised Web Servers and Web Shells- Threat awareness and Guidance
Tips & Awareness
TE(A)M:uL8! is a first of its kind, action-packed Spring STE(A)M festival in the greater Chattahoochee Valley, Columbus, Georgia and Phenix City, Alabama areas.
STE(A)M is the infusion of Art and Music to the STEM fields of Science, Technology, Engineering and Mathematics.
The Office of Information Security – Dee Spivey & Loretta Marshall along with colleagues from UITS participated in this year's expo. In addition to presenting to students the importance of having a secure password, we also showcased the Google glass and 3D printers.
Cyber Security Newsletters
October: Four Steps to Staying Secure
September: Email Do's and Don'ts
July: CEO Fraud
April: I'm Hacked, Now What?
March: What is Malware?
February: Securing your Home Network
SANS - 2015 Archived Newsletters
June: Travelling Securely
April: Phishing Emails and You
February: Avoiding Online Tax Scams
MS-ISAC - 2015 Archived Newsletters
Glossary of Terms