I Have an Information Security Program, What Am I Missing?

Tuesday, April 19 | 9:15AM–9:45AM
Session Type: Professional Development
Ever wonder if your security program is complete or missing components? In this interactive session, you will learn the fundamentals for setting up a multilayered, service-based approach to information security based on Loyola University Chicago's information security program. The session will cover areas of governance; policies, procedures, and guidelines; incident response; cyberthreat protection; vulnerability assessments; a risk assessment program; awareness; education and training; audit; compliance and regulations; security operations center; data identification; analysis and forensics; secure access; and ERP security services. Learn how to create a program that fits the information security needs of your institution.

OUTCOMES: Learn the 12 components of a well-rounded information security program * Identify gaps and corresponding improvements that are needed to bolster your information security posture * Create the "right fit" services for your institution's information security program


  • Jim Pardonek

    Information Security Officer, Loyola University Chicago
  • Jim Sibenaller

    AVP, Data, Security & Architecture, ITS, Loyola University Chicago

Resources & Downloads