Data Security for the Research Administrator

(90 minutes)  Protecting research information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction is a critical component to safeguarding research information and preventing financial loss or damage to the university's reputation. Protecting confidential information is not only a legal and business requirement, but is also an ethical requirement.

Due to increased cybersecurity concerns throughout the world, research sponsors are including more stringent requirements for working with restricted data. There is a notable increase in the number of grants and contracts requiring the university to implement specific privacy and security safeguards for data and information systems as mandated by federal (HIPAA, FISMA, NIST, CMMC, FERPA, GLBA, ITAR, Privacy Act), state and/or local law, industry sanctioned (PCI-DSS), university policies (i.e. UF Privacy Office, Security Office) or agreements (i.e. Data Use Agreement, Business Associate Agreement, etc.).

This session will describe the basis of the requirements and offer best practices in creating compliant environments, with a special emphasis on the Department of Defense Cybersecurity Maturity Model Certification (CMMC).

Prerequisites:
None

Speakers:

Steven Lovaas, University Information Security Officer, Colorado State University
Erik Deumens, Research Computing Director, Information Technology, University of Florida
Stephanie Gray, Assistant Vice President, Office of Research, University of Florida

Handouts will be available 24 hours before the live webinar. 

Closed Captioning for the live presentation is available at no additional fee. Sign in and click on the "Closed Captioning" link in the handouts tab or in the links box in the meeting room to access this feature. 

Member Price: $105.00
Non-Member Price: $125.00


Your registration includes one log-in. We are pleased to provide the opportunity for you to register additional sites.  We know many of your team members are working from home right now. NCURA will be offering additional logins for this webinar at no cost for all registered institutions so your full team can participate…together. Has your institution already paid for an additional login? We will be reaching out to offer you a refund or a credit towards a future program. 

When you are checking out, click the "Add" button and type in the email address of your colleague that you would like to register. If they already have a profile in the registration system, their name will pop up and you can add them to your registration.  If that person does not already have an NCURA profile, please have them go to the NCURA website to create a profile, and log into the registration site. After that, you will be able to register them with your registration. 

If you add at least one registration with yours, you will be able to change or add more registrations by clicking “My Registrations” in the menu at the top left of the home page, then clicking the “Purchases for Others” button. 

If you have any questions about this option, please email ncura@commpartners.com.

Gain an understanding of the federal regulations governing research data and identify best practices in creating policies and environments to protect research data, with a special emphasis on the Department of Defense Cybersecurity Maturity Model Certification (CMMC).

Steven Lovaas

University Information Security Officer

Colorado State University

Erik Deumens

Research Computing Director, Information Technology

University of Florida

Stephanie Gray

Assistant Vice President, Office of Research

University of Florida

Participants receive 1.5 hours of continuing education credits = .2 CEU's for each webinar.

You can access your certificate from the box on the right side of the screen, after filling out the webinar evaluation.

Watching in a group? Everyone watching the presentation can request a CEU certificate by writing down the verification code at the end of the webinar. Please make a note of the verification code as it will not be available after the webinar.

The main registrant can access instructions on the Group CEU tab for group participants to receive CEU certificates.

We recommend testing your browser as soon as possible in case you need to contact your IT department for help.
  • It is recommended that you use a PC or MAC with an updated Internet Browser.
  • Make sure you have pop-ups blockers disabled in your Internet browser settings.
  • Make sure that your internet browser is Active X enabled.
  • Wifi is not recommended. The problem with WiFi is signal strength can vary causing bandwidth to increase or decrease.
  • We recommend a wired connection. A wired connection gives a consistent signal and consistent bandwidth. A wired connection provides a better experience.
  • It's better for organizations with low bandwidth to only have the webinar running on 1 computer in a conference room than having 10 individual people running the session on 10 computers at their desks.
  • Audio (sound) is projected through your computer speakers. Be sure your computer is equipped with speakers so you can hear the presenters.

For additional recommendations on your computer set up for the webinar, please click here.