<node id="680963">
  <nid>680963</nid>
  <type>news</type>
  <uid>
    <user id="36236"><![CDATA[36236]]></user>
  </uid>
  <created>1741273357</created>
  <changed>1741274846</changed>
  <title><![CDATA[OIT Spotlight: Georgia Tech Cybersecurity ]]></title>
  <body><![CDATA[<div><div><p>As cyber threats grow more sophisticated, Georgia Tech’s Office of Information Technology (OIT) Cybersecurity department works to protect the Institute’s digital infrastructure. Through proactive risk management, collaboration, and security initiatives, the team ensures a secure environment that supports research, education, and daily operations across campus.&nbsp;</p><p>&nbsp;</p></div><div><p><strong>A Strategic Approach to Cybersecurity</strong>&nbsp;</p></div><div><p>The OIT Cybersecurity team takes a service-oriented approach, prioritizing risk-based strategies to strengthen security while supporting Georgia Tech’s mission. “We continuously seek the most effective ways to respond to threats while also preparing for known risks through tabletop exercises and incident response drills,” said Sherman Lofton, senior director of Cybersecurity Operations.&nbsp;</p></div><div><p>Georgia Tech’s cybersecurity team thrives on collaboration and expertise, ensuring that security measures support rather than hinder the Institute’s mission. “This is accomplished by having strong teams with diverse experiences and expertise and allowing them the room to grow but also realizing that we are here to provide a service to the campus community,” said Sherman.&nbsp;&nbsp;</p></div><div><p>&nbsp;</p></div><div><p><strong>Addressing Emerging Threats</strong>&nbsp;</p></div><div><p>As cyber threats evolve, the team remains focused on mitigating the most pressing risks:&nbsp;</p></div><div><ul><li><strong>Phishing and Social Engineering Attacks</strong> – Deceptive tactics designed to manipulate individuals into divulging sensitive information.&nbsp;</li></ul></div><div><ul><li><strong>Data Breaches and Ransomware</strong> – Heightened risks due to the Institute’s expansive digital landscape.&nbsp;</li></ul></div><div><ul><li><strong>Distributed Denial of Service (DDoS) Attacks</strong> – Disruptions targeting critical services across campus.&nbsp;</li></ul></div><div><p>&nbsp;</p></div><div><p><strong>Future Trends in Cybersecurity</strong>&nbsp;</p></div><div><p>Georgia Tech stays ahead of cybersecurity challenges by adopting innovative security strategies. Key trends shaping the future of cybersecurity in higher education include:&nbsp;</p></div><div><ul><li><strong>Zero Trust Architecture</strong> – Implementing continuous verification for system access.&nbsp;</li></ul></div><div><ul><li><strong>Cloud Security Enhancements</strong> – Strengthening protection for cloud-based applications and research data.&nbsp;</li></ul></div><div><ul><li><strong>AI-Driven Threat Detection</strong> – Leveraging artificial intelligence to improve response times and threat remediation.&nbsp;</li></ul></div><div><ul><li><strong>Internet of Things (IoT) and Operational Technology (OT) Security</strong> – Securing network-connected devices and infrastructure.&nbsp;</li></ul></div><div><p>&nbsp;</p></div></div><div><div><p><strong>Cybersecurity and Business Continuity: A Unified Approach</strong>&nbsp;</p></div><div><p>The cybersecurity team works closely with OIT’s business continuity and disaster recovery program, led by IT Disaster Recovery Lead Mudeet Mathur. “Preparation is at the center of any disaster recovery program,” said Mathur. “Operational resilience ensures we can respond quickly and efficiently to security incidents.”&nbsp;</p></div><div><p>To strengthen preparedness, the team conducts regular business continuity tabletop exercises, such as a recent simulation addressing how Georgia Tech would continue operations in the event of a Microsoft Teams outage. These exercises help departments refine their communication strategies and disaster response plans.&nbsp;</p></div><div><p>&nbsp;</p></div><div><p><strong>Key Accomplishments</strong>&nbsp;</p></div><div><p>The cybersecurity team has achieved significant milestones over the past year, including:&nbsp;</p></div><div><ul><li><strong>Virtual Southeastern Cyber Cup 2024</strong> – A national-level cybersecurity competition attracting nearly (x) participants from (x) colleges and universities.&nbsp;</li></ul></div><div><ul><li><strong>Georgia Tech Payroll Fraud Incident Response</strong> – Rapid containment and mitigation of a high-impact fraud attempt.&nbsp;</li></ul></div><div><ul><li><strong>Security Certifications</strong> – Multiple team members earning Certified Information Systems Security Professional (CISSP) credentials.&nbsp;</li></ul></div><div><ul><li><strong>Log Management Optimization</strong> – A 50% reduction in daily log ingestion, improving system efficiency.&nbsp;</li></ul></div><div><ul><li><strong>Business Continuity Plan Development</strong> – Successfully creating and testing business continuity plans for OIT, ensuring compliance with the Office of Emergency Management’s policy mandates.&nbsp;</li></ul></div><div><ul><li><strong>Crisis Management Team Establishment</strong> – Implementing a Senior Leadership Team (SLT) Crisis Management Team to support Georgia Tech’s centralized response efforts.&nbsp;</li></ul></div><div><p>&nbsp;</p></div><div><p><strong>Key Initiatives and Upcoming Projects</strong>&nbsp;</p></div><div><p>The Cybersecurity department is actively working on several projects to enhance security across the Institute:&nbsp;</p></div><div><ul><li><strong>Network Access Control (NAC) Pilot</strong>&nbsp;</li></ul></div><div><ul><li><strong>Web Application Firewall Implementation</strong>&nbsp;</li></ul></div><div><ul><li><strong>Azure Data Lake Security Enhancements</strong>&nbsp;</li></ul></div><div><ul><li><strong>Migration from Qualys to Tenable for Vulnerability Management</strong>&nbsp;</li></ul></div><div><ul><li><strong>Proof of Concept (POC) for Palo Alto XSIAM and IronScales</strong>&nbsp;</li></ul></div></div><div><div><ul><li><strong>Creation and Enhancement of a Master List of Technology Dependencies</strong> – Establishing a comprehensive, standardized technology dependency list for all business continuity plans across Georgia Tech.&nbsp;</li></ul><p>&nbsp;</p><div><p><strong>Empowering the Georgia Tech Community</strong>&nbsp;</p></div><div><p>Cybersecurity is a shared responsibility, and education remains a key component of Georgia Tech’s approach. Lofton shares, “The cybersecurity team’s goal is to empower the campus community with the knowledge and tools they need to stay safe online,” said Lofton.&nbsp;</p></div><div><p>OIT provides mandatory biannual compliance training through the <a href="https://b.gatech.edu/KnowBe4">KnowBe4 </a>platform, phishing awareness campaigns, and offers resources for faculty, staff, and students to enhance their cyber hygiene.&nbsp;</p></div><div><p>To contact Cyber Security to report a phishing attempt or security incident, visit <a href="https://security.gatech.edu/" rel="noreferrer noopener" target="_blank">Georgia Tech’s cybersecurity page</a>.&nbsp;</p><p>For additional cybersecurity resources and information, visit the <a href="https://oit.gatech.edu/cybersecurityawareness">Georgia Tech Cybersecurity Awareness page.</a></p></div></div></div>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2025-03-06T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Georgia Tech’s OIT Cybersecurity team protects the Institute’s digital infrastructure with proactive security, collaboration, and innovation to support research, education, and daily operations.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Georgia Tech’s OIT Cybersecurity team takes a strategic approach to protecting the Institute’s digital infrastructure, addressing evolving threats including phishing, ransomware, and DDoS attacks. In collaboration with business continuity efforts, they ensure rapid response to incidents and system disruptions. Through proactive risk management, security initiatives, and ongoing training, the team works to keep the campus community informed, resilient, and secure in an increasi digital landscape.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="676483">
            <nid>676483</nid>
            <type>image</type>
            <title><![CDATA[iStock-2201575835.png]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>260280</fid>
                  <filename><![CDATA[iStock-2201575835.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/2025/03/06/iStock-2201575835.png]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/03/06/iStock-2201575835.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity icons overlaid on man typing on keyboard.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[adurandean3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[<p><a href="https://b.gatech.edu/KnowBe4"><strong>KnowBe4</strong></a> is a security awareness and compliance training platform used by organizations around the world to strengthen their cybersecurity culture and reduce human risk. Since 2022, the University System of Georgia (USG) has utilized the platform for its biannual cybersecurity compliance training for USG employees.</p>]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>174291</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>https://security.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>https://security.gatech.edu/training</url>
      <title></title>
      </link>
          <link>
      <url>https://oit.gatech.edu/cybersecurityawareness</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>174291</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[OIT]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>8111</tid>
        <value><![CDATA[phishing]]></value>
      </item>
          <item>
        <tid>9299</tid>
        <value><![CDATA[Office of Information Technology]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
