Information Security

“As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.” – Newton Lee

About

The Information Security (IS) team provides University-wide Information Stewardship and Security services that invite and empower the Tufts community to use Tufts Information and services to support the University’s academic, research, and scholarship mission in appropriate, responsible, and secure manner. In addition, the team provides operational services that continuously improve our collective ability to prevent, detect, respond and recover from incidents increasingly threatening our personal privacy and the sensitive information used within our community. The Information Security team also offers flexible consulting services to support good Information Stewardship at Tufts, working with partners in all departments and schools to cost-effectively understand and manage risk to their sensitive information assets.

Services

IS offers a variety of services including:

  • Information Stewardship, Governance, and IT Compliance
  • IT Security Operations Center and Incident Report
  • Information Security Risk and Vulnerability Identification and Management
  • Information-Oriented Compliance, Policy, and Legal Investigations
  • IT Security Protections, Architecture, and Solution Engineering

Consultation and Support Services

  • Information Stewardship, Data Governance, and IT Security Compliance Consulting
  • Security Awareness Support and Education
  • Security Reviews and Consulting on Business Processes, Projects, and Vendors
  • Security Vulnerability Testing of Software and IT Infrastructure
  • Security Event Detection, Investigations, and Incident Response

Areas/Teams

  • Information Security Engineering & Risk Management Program - Eric Barnes, Associate Director
  • Information Security Application Risk - TBD, Consultant
  • Information Security Operations - Drago Jevtic, Program Manager
  • Information Security Compliance - Beth Knauss, Program Manager

 

See Information Security Org Chart

Did you find what you were looking for on this webpage?