  {"id":15539,"date":"2021-05-28T12:56:18","date_gmt":"2021-05-28T17:56:18","guid":{"rendered":"https:\/\/www.marshall.edu\/it\/?page_id=15539"},"modified":"2025-08-26T16:03:46","modified_gmt":"2025-08-26T20:03:46","slug":"cybersecurity-program-plan","status":"publish","type":"page","link":"https:\/\/www.marshall.edu\/it\/departments\/information-security\/cybersecurity-program-plan\/","title":{"rendered":"Cybersecurity Program Plan"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>Information assets and technology resources are both valuable and essential to the mission of 福利理伦.\u00a0Administrative, technical, and physical safeguards are required to protect the assets and resources to support that mission; meet legal, regulatory, and contractual obligations; and protect privacy.<\/p>\n<p>The 福利理伦 Cybersecurity Program Plan provides high-level information describing the university Cybersecurity Program and its major components including the appointment of a coordinator, the selection and implementation of safeguards, ongoing risk assessments, training, and the management of service providers.<\/p>\n<p>Specific cybersecurity policies, standards, and guidelines as well as detailed plans and procedures are represented in separate documents.<\/p>\n<h2>Goals<\/h2>\n<ul>\n<li>Align the University\u2019s information security efforts to support its mission while supporting privacy, legal, regulatory, and contractual obligations.<\/li>\n<li>Promote awareness of information security risks and responsibilities.<\/li>\n<li>Collaborate with other organizations and institutions to increase awareness, knowledge, and sharing of information security information.<\/li>\n<li>Maintain an awareness of relevant requirements, technologies, and risks to continuously improve this program.<\/li>\n<\/ul>\n<h2>Roles and Responsibilities<\/h2>\n<h2>Chief Information Security Officer<\/h2>\n<p>The Chief Information Security Officer (CISO) has been appointed to coordinate this program.<\/p>\n<h2>Office of Information Security<\/h2>\n<p>The Office of Information security, under direction of the CISO and reporting to the Chief Information Officer (CIO), maintains a dedicated staff of trained cybersecurity professionals. The Office of Information Security is responsible for organization-wide IT risk management, vulnerability management, security operations, incident management and response, and management of the Information Security Program.<\/p>\n<h2>Departments<\/h2>\n<p>Deans, department heads, and designate contacts assist in implementation of the Information Security Program. Their responsibilities include:<\/p>\n<ul>\n<li>Serve as a point of contact for the Office of Information Security<\/li>\n<li>Annual inventory of sensitive information and covered assets<\/li>\n<li>Performing annual unit-level risk assessments<\/li>\n<li>Assisting with security incident response<\/li>\n<li>Participating in annual awareness training.<\/li>\n<\/ul>\n<h2>Personnel<\/h2>\n<ul>\n<li>Responsible Use &#8211; Each person using University Information Technology resources is required to be familiar and comply with University policies and must comply with those policies as well as all relevant laws, regulations, obligations, standards, and rules. Accounts, access codes, privileges, and IT resources must not be used for unauthorized purposes.<\/li>\n<li>Awareness Training &#8211; All employees and users with access to protected data receive information security awareness training at the time of hiring or orientation and at least annually thereafter.<\/li>\n<\/ul>\n<h2>Covered Assets<\/h2>\n<p>Any institutional data classified as Private or Restricted per the University <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2025\/04\/UPGA-10-Information-Security-Policy.pdf\">Information Security Policy (UPGA-10)<\/a> including\u00a0regulated data (e.g., FERPA, HIPAA, GLBA, etc.) and information governed by specific policies or requirements (e.g., PCI, GDPR, etc.).<\/p>\n<p>Mission critical systems including infrastructure, applications, equipment, etc.<\/p>\n<h2>Data Management Lifecycle<\/h2>\n<p>Collection and management of covered data assets are governed by this plan and associated policies, rules, and standards.\u00a0Data retention and destruction complies with the University <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPGA-3-Record-Retention-Policy-2012-10-30.pdf\">Records Retention Policy (UPGA-3)<\/a>.<\/p>\n<h2>Risk Assessments<\/h2>\n<p>Risk assessments are conducted at least annually to identify foreseeable risks to covered assets.\u00a0Risk assessments are used to inform the selection and implementation of safeguards. \u00a0Identified risks without mitigating safeguards are documented, appropriately reviewed, approved, and monitored.<\/p>\n<p>Units are responsible for conducting unit-level risk assessments to identify risks that are unique to their area of operation and for implementing appropriate safeguards to address these risks in addition to the common safeguards. Units can perform risk assessments independently, or units can request support from the Office of Information Security to complete unit-level assessments.<\/p>\n<h2>Safeguards<\/h2>\n<p>Program safeguards include physical, administrative, and technical safeguards across five high level functions:\u00a0 identification, protection, detection, response, recovery, and governance.\u00a0\u00a0 Taken together these safeguards constitute a common control environment for university systems.<\/p>\n<h2>Identification\u00a0\u2013 measures for identifying threats and risks<\/h2>\n<ul>\n<li>Annual review of covered data and critical systems<\/li>\n<li>Vulnerability assessment<\/li>\n<li>Risk assessment<\/li>\n<li>Oversight of third-parties<\/li>\n<\/ul>\n<h2>Protection\u00a0&#8211; measures to prevent breaches and associated impacts<\/h2>\n<ul>\n<li>Information security policies, standards, and guidelines<\/li>\n<li>Security awareness training for all new employees<\/li>\n<li>Annual security awareness training for employees<\/li>\n<li>New employee background checks<\/li>\n<li>Identity theft protection<\/li>\n<li>Network perimeter security<\/li>\n<li>Vulnerability management<\/li>\n<li>Critical network services protection<\/li>\n<li>Anti-malware<\/li>\n<li>Multi-Factor-Authentication (MFA)<\/li>\n<li>Regular network security reviews, audits, and penetration tests<\/li>\n<li>Intrusion prevention and data loss prevention<\/li>\n<li>Remote access protection (VPN, VDI, etc.)<\/li>\n<li>Physical security measures<\/li>\n<\/ul>\n<h2>Detection\u00a0&#8211; measures to detect security incidents<\/h2>\n<ul>\n<li>Network security monitoring<\/li>\n<li>Anti-malware monitoring<\/li>\n<li>Account use and access alerts<\/li>\n<li>Security event management<\/li>\n<li>Participation in industry information sharing.<\/li>\n<\/ul>\n<h2>Response\u00a0&#8211; measures for responding to attack or breach conditions<\/h2>\n<ul>\n<li>Incident response steps are defined in Section 9 of the <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2025\/04\/UPGA-10-Information-Security-Policy.pdf\">University Information Security Policy (UPGA-10)<\/a>.<\/li>\n<\/ul>\n<h2>Recovery\u00a0\u2013 measures for ensuring recovery to normal operations<\/h2>\n<ul>\n<li>Business Continuity\/Continuity of Operations Plan<\/li>\n<\/ul>\n<h2>Governance<\/h2>\n<ul>\n<li>All policies and procedures which guide the Cyber Security Program Plan are created, reviewed, and approved through a defined governance process which begins with the 福利理伦 Board of Governors <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2024\/01\/GA-2-Final.pdf\">(GA-2) Policy on Rulemaking by the Board of Governors<\/a> as well as several advisory councils which support the <a href=\"https:\/\/www.marshall.edu\/shared-governance\/\">University Shared Governance process.<\/a><\/li>\n<\/ul>\n<h2>Service Providers<\/h2>\n<p>The Office of Information Security, the Office of Purchasing, and the Office of General Counsel ensure service providers implement appropriate safeguards and that contractual agreements detailing privacy and security requirements are in place. The administrative procedure <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2024\/08\/Marshall-University-ITP-1-Technology-Governance-Process-FINAL-APPROVED.pdf\">(ITP-1) Technology Governance and Procurement<\/a> defines the coordination between the Office of Purchasing and the Office of Information Security to ensure appropriate measures are in place to protect covered information.<\/p>\n<h2>Program Monitoring and Maintenance<\/h2>\n<p>This Program is evaluated and adjusted continuously. Feedback from risk assessments, security operations, and incident response activities inform the design and implementation of program components and safeguards by the program coordinator.<\/p>\n<h2>Plan Review and Approval<\/h2>\n<p>This plan is reviewed at least annually.<\/p>\n<h2>Red Flags Rule Compliance and Identity Theft Protection<\/h2>\n<p>Units with data covered by the GLBA policy will also be covered by the University <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPFA-7-Identity-Theft-Prevention-Program-2019-12-3.pdf\">Fair and Accurate Credit Transactions Act Compliance Policy (UPFA-7)<\/a>.<\/p>\n<h2>Questions<\/h2>\n<p>Any questions concerning the content of this Plan and associated Policies, Standards and Guidelines should be addressed to the Chief Information Security Officer, <a href=\"mailto:ciso@marshall.edu\">ciso@marshall.edu<\/a> .<\/p>\n<h2>References<\/h2>\n<ol>\n<li>Information Security Policy &#8211;\u00a0 <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2025\/04\/UPGA-10-Information-Security-Policy.pdf\">https:\/\/www.marshall.edu\/policies\/files\/2025\/04\/UPGA-10-Information-Security-Policy.pdf<\/a><\/li>\n<li>Records Retention Policy &#8211; <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPGA-3-Record-Retention-Policy-2012-10-30.pdf\">https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPGA-3-Record-Retention-Policy-2012-10-30.pdf<\/a><\/li>\n<li>Policy on Rulemaking by the Board of Governors &#8211; <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2024\/01\/GA-2-Final.pdf\">https:\/\/www.marshall.edu\/policies\/files\/2024\/01\/GA-2-Final.pdf<\/a><\/li>\n<li>University Shared Governance process &#8211;\u00a0<a href=\"https:\/\/www.marshall.edu\/shared-governance\/\">https:\/\/www.marshall.edu\/shared-governance\/<\/a><\/li>\n<li>Red Flags Rule &#8211; <a href=\"https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPFA-7-Identity-Theft-Prevention-Program-2019-12-3.pdf\">https:\/\/www.marshall.edu\/policies\/files\/2023\/12\/UPFA-7-Identity-Theft-Prevention-Program-2019-12-3.pdf<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Plan Revision and Review<\/h2>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"108\">Date<\/td>\n<td width=\"108\">Reviewer<\/td>\n<td width=\"307\">Description<\/td>\n<\/tr>\n<tr>\n<td width=\"108\">2021-05<\/td>\n<td width=\"108\">CISO \/ jbc<\/td>\n<td width=\"307\">Submission of initial program plan<\/td>\n<\/tr>\n<tr>\n<td width=\"108\">2022-06<\/td>\n<td width=\"108\">CISO \/ jbc<\/td>\n<td width=\"307\">Annual plan review<\/td>\n<\/tr>\n<tr>\n<td width=\"108\">2023-07<\/td>\n<td width=\"108\">CISO \/ jbc<\/td>\n<td width=\"307\">Edits, annual plan review<\/td>\n<\/tr>\n<tr>\n<td width=\"108\">2024-07<\/td>\n<td width=\"108\">CISO \/ jbc<\/td>\n<td width=\"307\">Edits, annual plan review<\/td>\n<\/tr>\n<tr>\n<td width=\"108\">2025-08<\/td>\n<td width=\"108\">CISO \/ jbc<\/td>\n<td width=\"307\">Edits, annual plan review<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Overview Information assets and technology resources are both valuable and essential to the mission of 福利理伦.\u00a0Administrative, technical, and physical safeguards are required to protect the assets and resources to support that mission; meet legal, regulatory, and contractual obligations; and protect privacy. The 福利理伦 Cybersecurity Program Plan provides high-level information describing the university Cybersecurity<\/p>\n","protected":false},"author":144,"featured_media":0,"parent":127,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sidebar-left.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-15539","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/pages\/15539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/comments?post=15539"}],"version-history":[{"count":14,"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/pages\/15539\/revisions"}],"predecessor-version":[{"id":19412,"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/pages\/15539\/revisions\/19412"}],"up":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/pages\/127"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/it\/wp-json\/wp\/v2\/media?parent=15539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}