{"id":22,"date":"2021-05-11T22:05:47","date_gmt":"2021-05-11T22:05:47","guid":{"rendered":"https:\/\/rto.asu.edu\/information-security\/?page_id=22"},"modified":"2024-06-21T20:12:29","modified_gmt":"2024-06-21T20:12:29","slug":"information-security","status":"publish","type":"page","link":"https:\/\/rto.asu.edu\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row mb-6 mt-6\">\n\t\n\n<div class=\"col-12 col-md-9 col-lg-7\">\n\t\t\t\n\n<p>The RTO Information Security team supports data privacy and the protection of research assets, including the security requirements for regulated research. The team supports research through general regulation awareness, consultation with researchers and compliance teams, direct involvement in projects, coordination and mediation with the Enterprise Technology Office Information Security teams, and contract terms review for security requirements.<\/p>\n\n\n\n<p>Additionally, the team provides representation within ET for increased researcher support in data governance and applicable interests to provide effective university solutions to researchers, including the following:<\/p>\n\n\n<div class=\"wp-bootstrap-blocks-row row mt-6\">\n\t\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\n\n<ul class=\"uds-list py-1 wp-block-list\">\n<li>Direct support for research network classifications and categories.<\/li>\n\n\n\n<li>Coordinating classified research security requirements with ASURE.<\/li>\n\n\n\n<li>Dissemination of security news impacting research.<\/li>\n\n\n\n<li>HIPAA and ePHI data security controls consultations and architecture review.<\/li>\n\n\n\n<li>Security controls review for regulated research.<\/li>\n\n\n\n<li>Security review for acquired IoT supporting research operations.<\/li>\n\n\n\n<li>Reviewing security requirements for ORSPA.<\/li>\n\n\n\n<li>KE security analytics, searching and alert support.<\/li>\n\n\n\n<li>KE representation for security tooling and support from ET.<\/li>\n<\/ul>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\n\n<ul class=\"uds-list py-1 wp-block-list\">\n<li>Consulting for application and server security, DevSecOps and secure development pipelines.<\/li>\n\n\n\n<li>Facilitation of the Controlled Research Working Group, a collaborative effort for alignment of secure research.<\/li>\n\n\n\n<li>Direct security support for vulnerability scanning, review, remediation, incident response and triage for KE\/ASURE research projects.<\/li>\n\n\n\n<li>Exploit validation testing.<\/li>\n\n\n\n<li>Incident response assistance, including review, remediation and mediation with the ASU SOC.<\/li>\n\n\n\n<li>Website security best practices review and consultation.<\/li>\n\n\n\n<li>Security services for the Arizona Secure Research Environment.<\/li>\n<\/ul>\n\n\t<\/div>\n\n<\/div>\n\n\n\n\t<div class=\"uds-button mt-6\">\n\n\t\t\t\n\t\t\t<a href=\"mailto:askrto@asu.edu\" class=\"btn  btn-maroon \"   >Contact us <\/a>\n\t\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-22","page","type-page","status-publish","hentry"],"uds_featured_image":null,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security - Research Technology Office<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rto.asu.edu\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - Research Technology Office\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rto.asu.edu\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Technology Office\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-21T20:12:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/\",\"name\":\"Information Security - Research Technology Office\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/#website\"},\"datePublished\":\"2021-05-11T22:05:47+00:00\",\"dateModified\":\"2024-06-21T20:12:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/#website\",\"url\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/\",\"name\":\"Research Technology Office\",\"description\":\"Just another Research Technology Office Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rto.asu.edu\\\/information-security\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security - Research Technology Office","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rto.asu.edu\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security - Research Technology Office","og_url":"https:\/\/rto.asu.edu\/information-security\/","og_site_name":"Research Technology Office","article_modified_time":"2024-06-21T20:12:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rto.asu.edu\/information-security\/","url":"https:\/\/rto.asu.edu\/information-security\/","name":"Information Security - Research Technology Office","isPartOf":{"@id":"https:\/\/rto.asu.edu\/information-security\/#website"},"datePublished":"2021-05-11T22:05:47+00:00","dateModified":"2024-06-21T20:12:29+00:00","breadcrumb":{"@id":"https:\/\/rto.asu.edu\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rto.asu.edu\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rto.asu.edu\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rto.asu.edu\/information-security\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/rto.asu.edu\/information-security\/#website","url":"https:\/\/rto.asu.edu\/information-security\/","name":"Research Technology Office","description":"Just another Research Technology Office Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rto.asu.edu\/information-security\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":0,"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"wp:attachment":[{"href":"https:\/\/rto.asu.edu\/information-security\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}