Information Security Approval Matrix: Bringing Order to Complexity

Wednesday, May 03, 2023 | 9:00AM–9:45AM PT | Regency Ballroom D-G, Second Floor
Session Type: Breakout Session
Delivery Format: Demonstration

Approval authority can be extremely complex. Information security offices are asked daily to view, gather, investigate, retrieve, export, forward, disable, enable, provision, de-provision, delegate, create, remove, block, allow, playback, hide, or redact all kinds of information, accounts, devices, networks, files, applications, email, calendars, video, phones, and door access. The office of authority to approve these actions varies based on the type and sensitivity of the data involved. Approval can be at a department or division level. It may be the data owner, human resources, student affairs, academic integrity, the provost, law enforcement, or even the legal office. In some cases, approval is dictated by compliance requirements. This session introduces and shares a convenient and simple tool that provides direction on the execution of Miami University’s Information Security Approval Matrix (ISAM). The ISAM is based on common or expected cyber-related events or messaging in a clear, concise, and consistent fashion.

Presenters

  • Jake Harrison

    Security Analyst, Miami University
  • Tony Kinne

    Security Analyst, Miami University

Resources & Downloads

  • Information Security Approval Matrix Bringing Order to Complexity Presentation Slides

    Updated on 3/19/2025