Apogee Inc was acquired by Boldyn Networks and rebranded on 1 November 2024. Marking a pivotal moment in our service to the higher education sector and elevating our work to enhance the student technology experience. Learn more.

Skip to Main Content
Cancel
On-Demand Webinar

How GLBA and NIST Help Strengthen Higher Ed Security Posture

Faced with many competing priorities and limited in-house security expertise, many higher education institutions struggle to maintain a robust security posture amid rapidly evolving cyberthreats. Compliance and security frameworks like the Gramm-Leach-Bliley Act (GLBA) or NIST-800-171 are complex and difficult to manage under normal circumstances yet are essential to addressing vulnerabilities and managing cybersecurity insurance costs.

Meanwhile, the costs of maintaining the status quo can be significant. Recent research suggests nearly 75% of ransomware attacks on higher education institutions were successful, with an average cost to remediate of $1.4 million (2021).

With the acceleration of bad actors targeting colleges and universities, institutions without comprehensive oversight of their security posture can be especially vulnerable. And with tight budgets and an even tighter supply of information security experts available, campus IT teams must look for innovative ways to take control of their security posture, ensure comprehensive compliance, and protect their institutions from financial and reputational harm.

In this on-demand webinar, IT security experts Jacob Picart and Craig Oberlin and San Joaquin Delta College’s Assistant Director of Systems Development, Chris Kirschenman discuss the security and compliance-related challenges confronting higher education, and the importance of finding innovative solutions to protecting infrastructure, systems, and data.

You’ll learn about:

  • The costs and operational consequences of a piecemeal approach to security posture
  • Common security frameworks important to higher education and their value in comprehensively strengthening security posture and ensuring compliance
  • The process and steps vCISO experts utilize to determine relevant security frameworks, assess cybersecurity risk, identify vulnerabilities, and isolate tasks for remediation