shield
Address book
Grad cap
Document
Warning sign
How might we...
Identify USU devices & data assets?
Learn about USU's effective process for identifying critical security risks to university infrastructure.
Protect USU devices and information?
Implement stronger controls to protect USU's sensitive information and to prevent unauthorized access to USU’s networks and systems.
Detect bad things going on?
Enhance USU's real-time detection of cyber threats and vulnerabilities. Detect anomalies and potential security breaches within USU's IT environment.
Respond to digital threats or compromises?
Strengthen USU's response strategies to cyber incidents. Ensure a faster and more coordinated response across USU’s departments.
Recover from security incidents?
Recover quickly from cyber incidents and system disruptions at USU. Establish a resilient recovery process to minimize downtime and data loss.