Partnering With Internet2 to Identify and Tailor Cloud Solutions

Jack Seuss, VP IT, UMBC
1170
1963
392
Jack Seuss, VP IT, UMBC

Jack Seuss, VP IT, UMBC

Challenges in technology to meet enterprise needs in 2014

Increasingly, we are using a variety of enterprise and cloud solutions. I need ways that my identity management system can manage both authentication and  access across both enterprise and cloud systems. This requires the ability to manage group Access Control Lists (ACL) in one place and have it propagate  across the enterprise and all cloud systems in use. In a similar vein, we need better ways of managing risk in moving to the cloud. I have been working with  higher education groups that are aligned with the cloud security alliance and I am optimistic that this year I will be able to get more visibility into vendor cloud  security practices so that we can continue to move more systems to the cloud.

"I need ways that my identity management system can manage both authentication and access across both enterprise and cloud systems"

Trends impacting enterprise business environment

For higher education in general, and my campus in particular, I believe that 2014 is the year of that second factor authentication, especially systems that  leverage user’s cell phones as second factor authentication take off and become enterprise technology. We have seen where even the best technical  organizations have been hit with phishing attacks and we need to be providing additional security beyond text passwords in the enterprise and beyond. UMBC  is working closely with other universities on the Internet2 NET+ initiative. This initiative has universities partnering with Internet to identify and tailor cloud  solutions that meet higher education needs.

Areas in business environment where solutions do not yet exist

For me, the one thing I would like is a system that is based on my data classification. As we increasingly generate more data I can’t get a comprehensive  picture of data across all devices in the enterprise. As a result, I worry that someone has inadvertently put data on a system without the proper data  classification necessary to secure that data.

The role of CIOs today

My role is focused on two distinct aspects of technology. First, I am ultimately responsible for balancing the cost/benefit and risk of cyber security. We can’t  run our university without taking some calculated risks because open networks are essential to many forms of academic research.

My word for a CIO

My suggestion to my peers is to volunteer in professional or industry associations and focus on building a strong professional network. By providing your  expertise you are helping others and at the same time you gain access to their expertise. Higher education is very collaborative and I find that by pushing  myself to make the time to volunteer in community building initiatives I gain tremendously in my job.

Read Also

Digitization to Modernize Higher Education

Digitization to Modernize Higher Education

Tom Ryan, Director of IT, Rutgers University–Camden
Cloud Computing and the CIO-Recasting the Education Sector

Cloud Computing and the CIO-Recasting the Education Sector

Dr. Dave Robinson, Chief Information Technology Officer, Grinnell College
Organizational Capacity and the Evolving Role of the CIO in Higher Education

Organizational Capacity and the Evolving Role of the CIO in Higher Education

David Waldron, VP for Information Technology, St. Edward's University