• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
Login

Register

Login
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Archive

Yearly Archive for 2021

Home Blog2021
Have You Identified Your IT High Value Assets?

Have You Identified Your IT High Value Assets?

Nov 11, 2021

In today’s increasingly connected world, it is more important than ever to ensure an organization’s information and information systems are protected from cyber threats. Every organization has critical information and technology assets that are essential and require enhanced security. However, due to finite organizational resources, a deliberate and strategically-focused approach is needed to identify – and secure – the most important assets. Gain a better understand of why formally identifying your high value assets – and mission essential functions – are critical to supporting your organization’s ability to conduct business.

Combatting Disinformation

Combatting Disinformation

Oct 20, 2021

The Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio has frequently used disinformation and misinformation in its community cybersecurity exercises to impact the ability of first responders to accomplish their mission. Consequently, it is our recommendation that communities need to be prepared to counter disinformation attacks that may occur in the community.

Basics of Identification and Risk Management

Basics of Identification and Risk Management

Sep 10, 2021

When it comes to cybersecurity, it is common to hear statements that you can’t protect against all attacks and be absolutely secure. Because of this, the goal of organizations should not be to try and make their computer systems and networks absolutely secure but rather they should concentrate on managing the risk to the organization. One necessary factor in risk management is an understanding of your IT environment including what systems and software you utilize.

Communities to Become More Cyber Secure Thanks to $1.67 Million NSA Grant

Communities to Become More Cyber Secure Thanks to $1.67 Million NSA Grant

Sep 7, 2021

The National Centers of Academic Excellence in Cybersecurity, as part of the National Security Agency (NSA), has awarded a grant in the amount of $1.67 million to the CIAS to help communities become more cyber secure nationwide. The CIAS will work with multiple communities during the two-year grant, beginning with Angelo State University and the city of San Angelo.

Members: Register Here for Free Access to the No Cost Tools Webinar for Improving Your IT Infrastructure

Sep 2, 2021

As a member, your ticket to the upcoming Webinar “Continuity Planning” is FREE. Just go here to register.

Low Cost Tools Webinar to Improve Your IT Infrastructure on Oct 26

Low Cost Tools Webinar to Improve Your IT Infrastructure on Oct 26

Sep 2, 2021

Register for a one-hour webinar on October 26th with the CIAS-ISAO Associate Director of Technology and Research Dwayne Williams, as he provides insights into no-cost tools that can help you monitor and secure your organization’s IT infrastructure.

A Culture of Cybersecurity Begins with Hometown Security

A Culture of Cybersecurity Begins with Hometown Security

Aug 17, 2021

Cyberattacks are occurring at the state and local level, impacting government, small businesses, academia and industry sectors, which ultimately impacts the individuals throughout the community. A whole-community approach needs to be taken by communities to protect their citizens. This begins at the K-12 level, helping educators access the tools and resources they need to create better cyber-aware citizens and support a growing cybersecurity workforce.

Attacks on Critical Infrastructures and Protecting Them

Attacks on Critical Infrastructures and Protecting Them

Jul 7, 2021

We know our infrastructures are targets for cyberattacks, both for cyber criminals as well as nation-states. Understanding the types of cyber attacks on critical infrastructure provides lessons on how to defend and protect against such attacks. This article also provides 11 steps that communities can take to prepare for an attack on one or more of their critical infrastructures.

What is a Vulnerability Assessment?

What is a Vulnerability Assessment?

Jun 9, 2021

Browse any news site today and you’ll likely see an article about a recent ransomware attack. So how do you level the playing field? You need to find those holes in your network, policies, procedures and training before the bad guys do and a vulnerability assessment can help you do that. What is a vulnerability assessment? In the simplest terms, it’s a sanctioned effort to try and find your problems before the bad guys do.

When Should You Review and Update Security Policies?

When Should You Review and Update Security Policies?

May 12, 2021

Your policies should be living documents that evolve as your organization grows and changes. If it has been a while since your security policies have been reviewed, you may find that they are outdated, no longer comply with new laws and regulations or may not address the systems and technology you are using today. At a minimum, review security policies on an annual basis and take into consideration other indicators that your policies need to be reviewed.

Protecting Your Organization from Cyberattacks Starts Now

Protecting Your Organization from Cyberattacks Starts Now

Apr 7, 2021

Cybersecurity is an important issue for your organization. It should be a concern for your IT departments, organizational leadership and...

Continuity Planning, Part 2

Continuity Planning, Part 2

Mar 10, 2021

Recognizing that many organizations do not have the resources or time to jump into larger continuity plans, this article focuses on some initial steps that smaller communities and organizations can take to begin the process. Specifically, this article focuses on Backup Recovery Plans and Information System Contingency Plans to help organizations better prepare for a cyber disruptive event.

UTSA receives $1.2 million CISA grant to develop Pilot Program for SLTTs

UTSA receives $1.2 million CISA grant to develop Pilot Program for SLTTs

Mar 8, 2021

The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the CIAS at UTSA a $1.2 million grant to conduct a pilot program to help state, local, tribal and territorial governments identify high value assets (HVA) in order to prioritize resources and planning.

Webinar: “Continuity Planning” – April 6th with Dr. Greg White

Webinar: “Continuity Planning” – April 6th with Dr. Greg White

Feb 25, 2021

Today, there are any number of events that could cause a disruption or even a complete shutdown of an organization’s operations. Should this occur, what would be the impact to your organization? Organizations, both public and private, need to be prepared to address a disruption to operations, whether it is due to a natural disaster, terrorist event or cyber incident. One of the first things that should be done to prepare is to develop a continuity plan that can be put into action when a disruption occurs.

Cyber Continuity Planning

Cyber Continuity Planning

Feb 5, 2021

Organizations, both public and private, need to be prepared to address a disruption to operations whether it is due to a natural disaster, terrorist event or cyber incident. One of the first things that should be done to prepare is to develop a cyber continuity plan that can be put into action when a disruption occurs.

Information Sharing for Your Cybersecurity Program

Information Sharing for Your Cybersecurity Program

Jan 19, 2021

Information sharing is a key element of any cybersecurity program. This article introduces information sharing at the individual, organizational and community levels.

Load More Posts
Advertisment

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message

Contact Info

  • CIAS-ISAO
  • One UTSA Circle, San Antonio, TX 78249
  • 210-458-2119
  • cias@utsa.edu
  • https://ciasisao.org

© 2025 UTSA Center for Infrastructure Assurance & Security

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • Project Xander (Cyber Clinic)
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website