What you will learn:
- Complexities of inter-connectivity
- Assets that need to be protected by department
- How to optimize network defense
- Best practices that can increase the overall security of your university
The range of potential access vectors in a university’s IT environment can provide cyber criminals and cyber spies with many entry points to your network.
From personal, financial, and alumni information to valuable IP and research, your network is as enticing as an “eat all you want” buffet.