Information Security Management

Strategy Development
Using a standards-based assessment, we analyse current capability/capacity and generate a strategy to reduce any gaps against best business technical and operational practice over time, prioritized by risk and impact.
Implementation Programme Delivery
Implementing the strategy normally involves an experienced programme manager leading a multi-disciplinary hybrid of in-house and consultant SME team members . The programme can cover the technical implementation of new tooling and the development of operational capability.
The Virtual CISO
Many universities can not afford a dedicated CISO who can lead the information security management effort, report progress to the board, and develop & deliver awareness programme to ensure good practice is embedded throughout. The virtual CISO is a great alternative option.
Expede Consulting provided the Programme Management capability to deliver Brunel University London’s Information Security Strategy. The Expede team managed the delivery of a unified capability of technology and supporting operational processes including:
Cisco Email Security
Cisco Stealthwatch
Cisco Umbrella
Cisco Next Generation Firewalls at both the border and within the Datacentre
802.1x Network Access Control delivered via Cisco ISE
Exabeam Next Generation SIEM
Operationalisation of the above, and development of processes and procedures to ensure secure configuration, secure development, patch management, user access control, and privilege access management. Brunel University London continue to be able to maintain their Cyber Essentials accreditation as a consequence.
Management reporting, incident response, playbooks.
Expede Consulting’s Information Security Management services satisfy the following Educause requirements
Information Security Strategy
Developing a risk-based security strategy that effectively detects, responds to, and prevents security threats and challenges.
Privacy
Safeguarding institutional constituents’ privacy rights and maintaining accountability for protecting all types of restricted data.
Sustainable Funding
Developing funding models that can maintain quality and accommodate both new needs and the growing use of IT services in an era of increasing budget constraints .
Digital Integrations
Ensuring system interoperability, scalability, and extensibility, as well as data integrity, security, standards, and governance, across multiple applications and platforms.
Student-Centric Higher Education
Creating a student-services ecosystem to support the entire student life cycle, from prospecting to enrolment, learning, job placement, alumni engagement, and continuing education.
Student Retention & Completion
Developing the capabilities and systems to incorporate artificial intelligence into student services to provide personalized, timely support.
Improved Enrolment
Using technology, data, and analytics to develop an inclusive and financially sustainable enrolment strategy to serve more and new learners by personalizing recruitment, enrolment, and learning experiences
Higher Education Affordability
Aligning IT organizations‚ priorities, and resources with institutional priorities and resources to achieve a sustainable future.
Administrative Simplification
Process improvement, and system reengineering to reduce redundant or unnecessary efforts and improve end-user experiences.
The Integrative CIO
Repositioning or reinforcing the role of IT leadership as an integral strategic partner of institutional leadership in supporting institutional missions.
Expede Consulting’s Information Security Management services satisfy the following Educause requirements
Information Security Strategy
Developing a risk-based security strategy that effectively detects, responds to, and prevents security threats and challenges.
Privacy
Safeguarding institutional constituents’ privacy rights and maintaining accountability for protecting all types of restricted data.