Virtual
Join the Zoom Event
“Navigate the intricacies of Software as a Service (SaaS) cybersecurity at UW Madison and discover Plan of Action and Milestones (POA&M) risk remediation strategies to achieve a low-risk score while maintaining compliance. Explore the crucial role of principal investigators (PIs) and other essential stakeholders in data stewardship and discuss the challenges they encounter. Gain insights from the Research Data Governance common solution group discussion and identify ways to support PIs in safeguarding research data, improving risk management, and ensuring compliance.
Attendees will:
- Learn the fundamentals of the SaaS cybersecurity review process for the LabArchives ELN
- Understand the importance of defining and documenting roles and responsibilities at various levels and categories of security
- Hear key takeaways from the common solutions group held two weeks ago (May 15-17)
- Identify methods to better support PIs in expanding human knowledge while responsibly managing data
Presenter
Virtual
Join the Zoom Event
As more data, applications and business components move from on-premises environments to the cloud, it’s crucial to understand and address the unique security challenges that arise. This session provides a concise overview of cloud security, starting from the basics and progressing to advanced topics. Attendees will gain a foundational understanding of cloud security principles and learn how to implement robust security measures in their cloud environments.
Attendees will:
- Learn the foundational concepts of cloud security, including common threats and best practices for mitigation
- Discover how to use automation for secure configuration in the cloud
-
- Understand the risk assessment process at UW Madison
- Recognize the importance of establishing security baselines in a cloud environment and learn how to implement them<
Presenters
Virtual
Join the Zoom Event
Join us for an informative session that will provide an overview of the upcoming federal requirements for UW–Madison’s research security program. As federal agencies implement new regulations, our institution must understand and adapt to these changes. This presentation will cover key areas such as cybersecurity, export control and other IT-related aspects of the research security landscape.
Attendees will:
- Gain a comprehensive understanding of the new federal requirements and their implications for UW–Madison
- Learn about the university’s response plan and how it will be implemented across campus
- Discover how these changes will specifically impact the IT sector and its role in maintaining research security
- Have the opportunity to ask questions and engage in discussions about the upcoming changes
Participants will leave the session with a clear understanding of the new federal requirements, the university’s response, and how these developments will affect the campus community, particularly within the IT domain. This knowledge will help attendees navigate the evolving research security landscape and contribute to successfully implementing the new program.
Presenters
Room 313
Note: Presenters will be virtual for this session.
Join the Zoom Event
Discover the latest enhancements to Cybersecurity Appscanner, the user-friendly web application vulnerability scanner developed by DoIT’s Web and Mobile Solutions (WaMS) team and the Office of Cybersecurity. Check out new features they developed based on community feedback, including API setup, GitLab integration, and Manifest groups access control. Learn best practices for secure web application development and see a real-time application portfolio management dashboard in action.
Attendees will:
- Explore new features of Cybersecurity Appscanner
- Learn best practices for secure web application development
- Discover application portfolio management strategies
- Gain insights to strengthen web application security posture
Presenters
Room 313
Join the Zoom Event
Discover how the School of Medicine and Public Health (SMPH) implemented a secure data enclave using DevOps, Azure cloud computing and Microsoft’s suite of security tools. SMPH’s platform enables researchers, data engineers and data scientists to utilize resources like virtual machines, databases, OpenAI, data lakes and Power BI, all while protecting patient privacy. Gain insights into creating and scaling a secure computing environment in the cloud and learn about the platform’s capabilities.
Attendees will:
- Learn about the approach SMPH took in creating their secure enclave
- Hear about the various resources available within the platform
- Discover how the platform maintains patient privacy while providing access to powerful tools for research and analysis
- Gain practical tips about how to create and scale your own secure computing enclave in your IT environment
Presenter