Partnering With Internet2 to Identify and Tailor Cloud Solutions
Challenges in technology to meet enterprise needs in 2014
Increasingly, we are using a variety of enterprise and cloud solutions. I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems. This requires the ability to manage group Access Control Lists (ACL) in one place and have it propagate across the enterprise and all cloud systems in use. In a similar vein, we need better ways of managing risk in moving to the cloud. I have been working with higher education groups that are aligned with the cloud security alliance and I am optimistic that this year I will be able to get more visibility into vendor cloud security practices so that we can continue to move more systems to the cloud.
"I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems"
Trends impacting enterprise business environment
For higher education in general, and my campus in particular, I believe that 2014 is the year of that second factor authentication, especially systems that leverage user’s cell phones as second factor authentication take off and become enterprise technology. We have seen where even the best technical organizations have been hit with phishing attacks and we need to be providing additional security beyond text passwords in the enterprise and beyond. UMBC is working closely with other universities on the Internet2 NET+ initiative. This initiative has universities partnering with Internet to identify and tailor cloud solutions that meet higher education needs.
Areas in business environment where solutions do not yet exist
For me, the one thing I would like is a system that is based on my data classification. As we increasingly generate more data I can’t get a comprehensive picture of data across all devices in the enterprise. As a result, I worry that someone has inadvertently put data on a system without the proper data classification necessary to secure that data.
The role of CIOs today
My role is focused on two distinct aspects of technology. First, I am ultimately responsible for balancing the cost/benefit and risk of cyber security. We can’t run our university without taking some calculated risks because open networks are essential to many forms of academic research.
My word for a CIO
My suggestion to my peers is to volunteer in professional or industry associations and focus on building a strong professional network. By providing your expertise you are helping others and at the same time you gain access to their expertise. Higher education is very collaborative and I find that by pushing myself to make the time to volunteer in community building initiatives I gain tremendously in my job.
Check This Out:
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance