Information Security Office

Report a Cyber Incident

About the ISO

The mission of the Information Security Office (ISO) at Barry University is to mitigate the risk of cyber-incidents by safeguarding the confidentiality, integrity, and availability of our information systems, identities, and data assets. The ISO provides strategic security guidance, incident response, and fosters a culture of security awareness and compliance throughout the organization.

What We Do

Staff

Report a Cyber Incident

The ISO provides a streamlined process for reporting cybersecurity incidents. This process is crucial for ensuring that potential security breaches are addressed promptly and effectively.

The following are examples of cybersecurity incidents:

  • Security Policy Violation
  • Suspicious Behavior
  • Ransomware
  • Viruses
  • Malmare
  • Account Compromise
  • Cyber Harassment

What We Do...

  • The ISO collaborates with various committees across Barry University, such as the Faculty Senate, Clinical Research Electronic Data Committee, HIPAA Steering Committee, Health Information Integrity Committee, Information Technology Leadership Council, Compliance and Risk Managers Council, PCI Steering Committee, and the Academic Computing Advisory Committee. The ISO publishes an annual Strategic Security Plan, guiding strategic planning and budgeting based on risk assessments. 

  • The ISO conducts security reviews and risk assessments for IT-related purchases, projects, vendors, and contracts, coordinating with the procurement process. This includes HIPAA/MU risk assessments and year-end financial audits, producing an annual security assurance audit plan to evaluate controls and procedures protecting critical IT systems and assets. 

  • The ISO ensures adherence to FERPA, GLBA, PCI-DSS, FISMA, HIPAA, and Red Flag regulations. Collaborates with departments to develop system security plans and monitor compliance with policies and procedures. 

  • Works with stakeholders to define, document, publish, and raise awareness of Barry University's IT policies, procedures, and work practices. Manages policy exceptions, verifies compliance, and adheres to update cycles and approval workflows. 

  • Delivers targeted information security knowledge to raise awareness of risks and influence behavior. Methods include computer-based learning modules, CISO messages, IT newsletter articles, departmental and one-on-one in-service training, webinars, and videos. 

  • Ensures a secure IAM program, recognizing it as critical for preventing unauthorized access and safeguarding Barry University’s data and information assets. Manages user identity data and authentication systems, governs exception processes, and prioritizes identity-related projects. The CISO represents Barry University in external identity management initiatives. 

  • Identifies, assesses, and tracks the resolution of security weaknesses through regular vulnerability scanning, penetration testing, SIEM log analysis, risk assessments, and targeted IT security assurance audits. Relevant technical teams are responsible for remediating identified vulnerabilities. 

  • Implements continuous monitoring through SIEM log analysis, vulnerability scanning, and penetration testing to detect and assess potential security threats and weaknesses promptly. 

  • Oversees the incident response program, coordinating from incident declaration through resolution and post-incident review. Identifies incident handlers, coordinates necessary resources, guides best practice responses, and conducts post-incident reviews to identify root causes, evaluate response quality, and determine remedial actions. Coordinates incident response training to develop appropriate skills across the university. 

  • Ensures all BC/DR plans are documented and periodically tested. Monitors and remediates any failures during tests and regularly updates the Business Impact Analysis report. In actual incidents, execution of BC/DR plans is the responsibility of respective operating units within the university. Ensures these plans are aligned with recovery point objective (RPO) and recovery time objective (RTO) for critical applications and services. 

Policies & Procedures

The policies and procedures developed by Barry University establish a structured approach to protecting University data, systems, and identities. These documents enable us to effectively align our security posture with the NIST Cybersecurity Framework (CSF) and support compliance with GLBA, FERPA, FIPA, GDPR, and cyber liability insurance requirements. They define expectations for responsible use, access control, data handling, and security awareness across the University community.

Learn More

Training & Awareness

The ISO offers a variety of programs designed not only to protect the university's data and IT resources but also to instill a culture of security awareness among both employees and students. Our goal is to empower every member of the Barry community with the knowledge and skills needed to recognize and respond to security threats effectively.

For students, in particular, we focus on fostering lifelong security habits that will serve them well beyond their time at Barry, helping them safeguard their personal information in their future professional and personal lives.

Cybersecurity Training for Friends and Family

Training and awareness are central to Barry University’s information security strategy.

Cybersecurity Tips

Tips

Star Check

Maintain Software Updates

Continuous Improvement

Use anti-virus software and a firewall

Phishing

Understand phishing scams

Key

Set your social media privacy settings to "Private" or "Friends Only"

Selected

Authentication should be two-factor or multi-factor

Remote

Backup your data on a regular basis

Wifi

Avoid using public Wi-Fi

Password

Use strong passwords and a password management tool

  • Star Check

    Maintain Software Updates

  • Continuous Improvement

    Use anti-virus software and a firewall

  • Phishing

    Understand phishing scams

  • Key

    Set your social media privacy settings to "Private" or "Friends Only"

  • Selected

    Authentication should be two-factor or multi-factor

  • Remote

    Backup your data on a regular basis

  • Wifi

    Avoid using public Wi-Fi

  • Password

    Use strong passwords and a password management tool

Identify the Types of Phishing

Phishing comes in many forms, and recognizing the differences is key to protecting yourself and your information. From deceptive emails and phone calls to suspicious text messages, cybercriminals use various tactics to trick users into giving up sensitive data. Learn how to identify the most common types of phishing so you can stay alert and secure!

Types of Phishing How to Report Phishing in Outlook

Generative AI Use Cases & Tips

Barry University embraces the responsible use of generative artificial intelligence (GenAI) to drive innovation across academics, operations, research, and student services. This resource outlines practical, vetted use cases and tools that empower faculty, staff, and students to work more efficiently,

create more dynamically, and make informed decisions—while staying aligned with University data governance standards.

Explore real-world applications, discover approved tools, and learn how AI can enhance learning, productivity, and engagement across campus.

Learn More!

Sign in to use the pins