Partnering With Internet2 to Identify and Tailor Cloud Solutions
Challenges in technology to meet enterprise needs in 2014
Increasingly, we are using a variety of enterprise and cloud solutions. I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems. This requires the ability to manage group Access Control Lists (ACL) in one place and have it propagate across the enterprise and all cloud systems in use. In a similar vein, we need better ways of managing risk in moving to the cloud. I have been working with higher education groups that are aligned with the cloud security alliance and I am optimistic that this year I will be able to get more visibility into vendor cloud security practices so that we can continue to move more systems to the cloud.
"I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems"
Trends impacting enterprise business environment
For higher education in general, and my campus in particular, I believe that 2014 is the year of that second factor authentication, especially systems that leverage user’s cell phones as second factor authentication take off and become enterprise technology. We have seen where even the best technical organizations have been hit with phishing attacks and we need to be providing additional security beyond text passwords in the enterprise and beyond. UMBC is working closely with other universities on the Internet2 NET+ initiative. This initiative has universities partnering with Internet to identify and tailor cloud solutions that meet higher education needs.
Areas in business environment where solutions do not yet exist
For me, the one thing I would like is a system that is based on my data classification. As we increasingly generate more data I can’t get a comprehensive picture of data across all devices in the enterprise. As a result, I worry that someone has inadvertently put data on a system without the proper data classification necessary to secure that data.
The role of CIOs today
My role is focused on two distinct aspects of technology. First, I am ultimately responsible for balancing the cost/benefit and risk of cyber security. We can’t run our university without taking some calculated risks because open networks are essential to many forms of academic research.
My word for a CIO
My suggestion to my peers is to volunteer in professional or industry associations and focus on building a strong professional network. By providing your expertise you are helping others and at the same time you gain access to their expertise. Higher education is very collaborative and I find that by pushing myself to make the time to volunteer in community building initiatives I gain tremendously in my job.
3 ways to bring technology into any educational environment
Digitization to Modernize Higher Education
Cloud Computing and the CIO-Recasting the Education Sector
Organizational Capacity and the Evolving Role of the CIO in Higher Education
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....