Partnering With Internet2 to Identify and Tailor Cloud Solutions
Challenges in technology to meet enterprise needs in 2014
Increasingly, we are using a variety of enterprise and cloud solutions. I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems. This requires the ability to manage group Access Control Lists (ACL) in one place and have it propagate across the enterprise and all cloud systems in use. In a similar vein, we need better ways of managing risk in moving to the cloud. I have been working with higher education groups that are aligned with the cloud security alliance and I am optimistic that this year I will be able to get more visibility into vendor cloud security practices so that we can continue to move more systems to the cloud.
"I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems"
Trends impacting enterprise business environment
For higher education in general, and my campus in particular, I believe that 2014 is the year of that second factor authentication, especially systems that leverage user’s cell phones as second factor authentication take off and become enterprise technology. We have seen where even the best technical organizations have been hit with phishing attacks and we need to be providing additional security beyond text passwords in the enterprise and beyond. UMBC is working closely with other universities on the Internet2 NET+ initiative. This initiative has universities partnering with Internet to identify and tailor cloud solutions that meet higher education needs.
Areas in business environment where solutions do not yet exist
For me, the one thing I would like is a system that is based on my data classification. As we increasingly generate more data I can’t get a comprehensive picture of data across all devices in the enterprise. As a result, I worry that someone has inadvertently put data on a system without the proper data classification necessary to secure that data.
The role of CIOs today
My role is focused on two distinct aspects of technology. First, I am ultimately responsible for balancing the cost/benefit and risk of cyber security. We can’t run our university without taking some calculated risks because open networks are essential to many forms of academic research.
My word for a CIO
My suggestion to my peers is to volunteer in professional or industry associations and focus on building a strong professional network. By providing your expertise you are helping others and at the same time you gain access to their expertise. Higher education is very collaborative and I find that by pushing myself to make the time to volunteer in community building initiatives I gain tremendously in my job.
3 ways to bring technology into any educational environment
Digitization to Modernize Higher Education
Cloud Computing and the CIO-Recasting the Education Sector
Organizational Capacity and the Evolving Role of the CIO in Higher Education
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment