Who are our information security professionals?

The arrival of October hails the start of Cyber Security Awareness Month (CSAM). The University of Toronto’s (U of T) Information Technology Services’ (ITS) Information Security (IS) team supported by Education and Awareness is participating by hosting educational activities throughout the month, promoting the theme: ‘One team. One goal.’

During this campaign, ITS will engage the U of T tri-campus community, sharing information and answering questions related to information security.

This week’s questions

Who are the University’s information security professionals?

U of T’s information security community are teams of highly skilled individuals across the St. George, Mississauga and Scarborough campuses. They are dedicated to safeguarding the institutional and personal data of its tri-campus staff, students and faculty members.

The teams are comprised of information security architects, analysts, project managers, administrators and coordinators who specialize in risk assessment, identity and access management, privacy analysis, incident response, cloud security, authentication and more!

What do the University’s information security professionals do?

The University’s information security professionals deal with everything and anything relating to the security of U of T’s data. These dealings include:

  • Providing information security services: They provide essential services that maintain the security of University accounts. These services include multi-factor authentication (MFA), UTORauth, UTORvpn, Remote Desktop Gateway, network vulnerability scanning and much more.
  • Informing University policies and guidelines: Our information security teams provide the University as a whole with essential information security and privacy guidelines. The guidelines inform numerous aspects of the management of U of T’s digital assets, from the U of T password policy to the procedure required when a security incident is reported (including phishing emails).
  • Supplying information security tools: They also offer a comprehensive list of information security tools.

These dealings are, of course, just the tip of the iceberg: the scope of information security at U of T is as wide and varied as the community that it protects and is constantly evolving. To learn more about these developments stay tuned to this blog throughout October and visit our resource section for updates.