Viewing offline content

Limited functionality available

Dismiss
Deloitte UK
  • Services

    Highlights

    • CFO Advisory

      Bringing together the best of Deloitte to support CFOs. Whether developing skills or navigating business challenges, CFO Advisory can support.

    • Deloitte Ventures

      Connecting our clients to emerging start-ups, leading technology players and a whole raft of new Deloitte talent.

    • Towards net zero together

      Discover the people leading the change and what could be possible for your business.

    • Audit & Assurance

      • Audit
      • Audit - IASPlus
      • Assurance
    • Consulting

      • Core Business Operations
      • Customer and Marketing
      • Enterprise Technology & Performance
      • Human Capital
      • Strategy, Analytics and M&A
    • Financial Advisory

      • Mergers & Acquisitions
      • Performance Improvement
    • Legal

      • Legal Advisory
      • Legal Managed Services
      • Legal Management Consulting
    • Deloitte Private

      • Family Enterprises
      • Emerging Growth
      • Family Office
    • Risk Advisory

      • Accounting and Internal Controls
      • Cyber and Strategic Risk
      • Regulatory and Legal
    • Tax

      • Global Business Tax Services
      • Indirect Tax
      • Global Employer Services
  • Industries

    Highlights

    • Ecosystems & Alliances

      An engine to embrace and harness disruptive change

    • Resilience Reimagined

      Resilient organisations thrive before, during and after adversity. How will you become more resilient?

    • Consumer

      • Automotive
      • Consumer Products
      • Retail, Wholesale & Distribution
      • Transportation, Hospitality & Services
    • Energy, Resources & Industrials

      • Industrial Products & Construction
      • Mining & Metals
      • Energy & Chemicals
      • Power, Utilities & Renewables
      • Future of Energy
    • Financial Services

      • Banking
      • Capital Markets
      • Insurance
      • Investment Management
      • Real Estate
      • FinTech & Alternative Finance
    • Government & Public Services

      • Health & Human Services
      • Defence, Security & Justice
      • Central Government
      • Infrastructure, Transport and Regional Government
    • Life Sciences & Health Care

      • Health Care
      • Life Sciences
    • Technology, Media & Telecommunications

      • Telecommunications, Media & Entertainment
      • Technology
  • Insights

    Deloitte Insights

    Highlights

    • Deloitte Insights Magazine

      Explore the latest issue now

    • Deloitte Insights app

      Go straight to smart with daily updates on your mobile device

    • Weekly economic update

      See what's happening this week and the impact on your business

    • Strategy

      • Business Strategy & Growth
      • Digital Transformation
      • Governance & Board
      • Innovation
      • Marketing & Sales
      • Private Enterprise
    • Economy & Society

      • Economy
      • Environmental, Social, & Governance
      • Health Equity
      • Trust
      • Mobility
    • Organization

      • Operations
      • Finance & Tax
      • Risk & Regulation
      • Supply Chain
      • Smart Manufacturing
    • People

      • Leadership
      • Talent & Work
      • Diversity, Equity, & Inclusion
    • Technology

      • Data & Analytics
      • Emerging Technologies
      • Technology Management
    • Industries

      • Consumer
      • Energy, Resources, & Industrials
      • Financial Services
      • Government & Public Services
      • Life Sciences & Health Care
      • Technology, Media, & Telecommunications
    • Spotlight

      • Deloitte Insights Magazine
      • Press Room Podcasts
      • Weekly Economic Update
      • COVID-19
      • Resilience
      • Top 10 reading guide
  • Careers

    Highlights

    • Hear from our people

      At Deloitte, our people are at the heart of what we do. Discover their stories to find out more about Life at Deloitte.

    • Careers Home

  • UK-EN Location: United Kingdom-English  
  • UK-EN Location: United Kingdom-English  
    • Dashboard
    • Saved Items
    • Content feed
    • Profile/Interests
    • Account settings

Welcome back

Still not a member? Join My Deloitte

Elevating cybersecurity on the higher education leadership agenda

by Tiffany Fishman, Cole Clark
  • Save for later
  • Download
  • Share
    • Share on Facebook
    • Share on Twitter
    • Share on Linkedin
    • Share by email
Deloitte Insights
  • Strategy
    Strategy
    Strategy
    • Business Strategy & Growth
    • Digital Transformation
    • Governance & Board
    • Innovation
    • Marketing & Sales
    • Private Enterprise
  • Economy & Society
    Economy & Society
    Economy & Society
    • Economy
    • Environmental, Social, & Governance
    • Health Equity
    • Trust
    • Mobility
  • Organization
    Organization
    Organization
    • Operations
    • Finance & Tax
    • Risk & Regulation
    • Supply Chain
    • Smart Manufacturing
  • People
    People
    People
    • Leadership
    • Talent & Work
    • Diversity, Equity, & Inclusion
  • Technology
    Technology
    Technology
    • Data & Analytics
    • Emerging Technologies
    • Technology Management
  • Industries
    Industries
    Industries
    • Consumer
    • Energy, Resources, & Industrials
    • Financial Services
    • Government & Public Services
    • Life Sciences & Health Care
    • Tech, Media, & Telecom
  • Spotlight
    Spotlight
    Spotlight
    • Deloitte Insights Magazine
    • Press Room Podcasts
    • Weekly Economic Update
    • COVID-19
    • Resilience
    • Top 10 reading guide
    • UK-EN Location: United Kingdom-English  
      • Dashboard
      • Saved Items
      • Content feed
      • Profile/Interests
      • Account settings
    22 February 2018

    Elevating cybersecurity on the higher education leadership agenda Increasing executive fluency and engagement in cyber risk

    23 February 2018
    • Tiffany Fishman United States
    • Cole Clark United States
    • Save for later
    • Download
    • Share
      • Share on Facebook
      • Share on Twitter
      • Share on Linkedin
      • Share by email
    • Introduction
    • Cyber disconnect between IT professionals and institutional leaders
    • Routine exposure: Ensuring structural alignment
    • Right framing
    • Resilience mindset: It’s no longer a matter of if, but when
    • Looking ahead

    Universities are a frequent target for cyberattacks because of the sensitive data their IT systems often house combined with the vulnerabilities that come with an open-access culture. Successful higher education cybersecurity requires communication between the IT department and institutional leaders, so they can be more effective in preventing attacks and bouncing back after an incident occurs.

    Introduction

    Learn More

    Read A guide to helping colleges and universities comply with new federal regulation

    Subscribe to receive Public Sector content

    With election hacking and large-scale consumer data breaches frequently in the national headlines, far less attention has been paid to an industry increasingly under attack by hackers and cybercriminals: higher education.

    From ransomware attacks and breaches compromising the personal information of students, faculty, and staff to denial-of-service attacks that render learning-management and other systems unavailable during important times, cybersecurity threats pose an increasingly common business risk to colleges and universities.1

    Institutions of higher education are attractive targets for two reasons. First, like health care organizations and financial institutions, colleges and universities house a wide variety of sensitive and lucrative data, including social security numbers, financial information, medical records, intellectual property, and cutting-edge research. And second, higher education’s open-access culture, decentralized departmental or unit-level control, as well as federated access to data and information makes it a particularly vulnerable target for unauthorized access, unsafe Internet usage, and malware. (For more on this, see the sidebar, “What makes higher education a prime target for cybercriminals?”).

    This hasn’t escaped the attention of the higher education information technology (IT) community. For the third year in a row, information security is the top issue identified by IT professionals on the EDUCAUSE 2018 top 10 IT issues list, and its impact on the academy has not abated.2

    The cyber disconnect between IT professionals and institutional leaders

    Yet there remains a disconnect between IT professionals and institutional leaders. At many institutions across the country, executive engagement and board-level attention haven’t yet caught up with the escalating cyber risks to which institutions are exposed. The reasons for this are threefold.

    • The traditional academic pathway to the university leadership often precludes exposure to, and experience with, cybersecurity issues: The majority of college and university presidents and chancellors ascend to positions of institutional leadership through the ranks of academia.3 Often this means that many college and university presidents have limited exposure to and fluency in cyber issues and their potential business impact on an institution. Boards of trustees, depending on their composition and how trustees are appointed, may or may not bring relevant experience and fluency on issues of cybersecurity to their respective institutions. Too often, it takes a major breach to escalate cybersecurity matters to the executive- and board-level agenda.
    • A president’s wide-ranging scope of responsibilities leaves little bandwidth: The demands on a president’s time are many: fundraising, alumni, and donor relations, strategic planning (goal-setting and visioning), enrollment management, trustee relations, budgeting, academic affairs, community relations, federal and state relations, student life/engagement, and athletics, among others. With so many responsibilities competing for a president’s time and attention, cyber discussions, which are often cast in inaccessible and technical jargon, often get sidelined by more familiar and seemingly important matters.
    • CIOs are often not members of the president’s cabinet: There’s frequently a structural disconnect between an institution’s highest-ranking IT official and senior leadership. Fifty-six percent of the higher education institutions surveyed by EDUCAUSE have a chief information officer (CIO) or equivalent role that is part of the president’s cabinet.4 In other words, the highest-ranking IT official has the ear of leadership at just over half of the institutions included in the survey. EDUCAUSE’s higher education IT workforce study found that CIOs who serve on the cabinet are significantly more likely to discuss the IT implications of institutional decisions with campus executives.5

      Often this means that important conversations about cybersecurity don’t make it beyond an institution’s IT shop to the top of the house. As Georgia State University’s (GSU’s) chief innovation officer Phil Ventimiglia explains, “If you really believe in cybersecurity and the importance of technology to the operation and future of the campus, then the CIO or whatever role is leading technology for the institution should be at the cabinet level.”6 It’s not imperative that the CIO report to the president, but having a seat at the senior leadership table to elevate the discussion around these risks is important. For institutions where the CIO reports to an executive vice president or provost, it’s important that these most senior officers regularly bring predigested, cogently argued, and succinctly written issues to the president and trustees.

    Drawing on conversations with college and university presidents and IT leaders who have elevated cyber issues to the executive agenda, this article looks at what effective executive engagement looks like in practice and explores considerations for building a more resilient institution that’s capable of bouncing back from cyber events quickly, recognizing that it’s no longer a matter of if they will occur, but when.

    What makes higher education a prime target for cybercriminals?

    Wide variety of valuable data

    Institutions of higher learning have sensitive data about students, parents, alumni, faculty, and staff. Records are routinely retained decades after students have graduated from an institution. Furthermore, colleges and universities, particularly those that engage in high volumes of research, often house proprietary data from a wide range of corporations and government entities. Moreover, institutions with ties to local and regional hospitals generally store confidential medical data. In short, the sheer volume of potentially valuable data housed at most institutions of higher learning tends to make them highly attractive targets.

    Lack of centralized structure

    Institutions tend to house their sensitive data in many different locations rather than one centralized hub. Student data may be kept separately at each college within a university or at different branches in a statewide university system. The same data may be kept in a variety of other locations, as well: alumni offices, central administration, or even at the department level for graduate programs. Sensitive data relating to corporate or government grants may be housed in the departments that receive those grants or even on the devices of individual professors and graduate students who play key research roles. This decentralized structure can give cybercriminals a wide range of paths to exploit vulnerabilities in the disparate systems that house sensitive data.

    Organizational vulnerabilities

    The decentralized nature of data storage in institutions of higher education is often paralleled by similar organizational and structural issues. The responsibility for implementing security measures and determining processes may lie with a number of different stakeholders in a wide range of departments. Institutions generally lack a top-down command structure that makes new safeguards easy to implement; so departments, individual professors, or students may be slow to engage in the practices necessary to improve security.

    Widespread use of personal devices

    Administrators, faculty, and staff are often unaware of the extent to which they may be exposing their institution to cyber risks when they download sensitive data to less well-protected personal devices. At last count, 93 percent of faculty reported owning a smartphone, while just 27 percent received mandatory information security training.7 As a result, even if an institution has robust security measures in place, any number of individuals at the institution may, through carelessness or unintentionally, through lack of awareness, expose sensitive data.

    Routine exposure: Ensuring structural alignment

    CIOs who are cabinet members are generally in a better position to raise strategic IT issues, including cybersecurity risks to the institution, presidents, and boards of trustees.

    By virtue of this structural alignment, institutional leaders tend to have greater exposure to an issue set that may otherwise be confined to the technology shop. The direct reporting relationship to the president serves as “a way of keeping the lines of communication open, so that when we have situations like a distributed denial of service attack or something that’s highly disruptive, I don’t have to build the foundation. It’s already in place and it’s just a matter of zeroing in on a particular direction,” says Rutgers University’s senior vice president and CIO Michele Norin.

    As GSU president Mark Becker explains, “The chief information officer (or equivalent) has to be at a high level in the organization; they can't be buried away from the president. At Georgia State, they report directly to me and sit on my cabinet, as well as on the administrative council [which allows us] to have direct conversations. Our offices are on the same floor.”8 This kind of routine exposure and access typically facilitates greater understanding of the cybersecurity issues facing the institution.

    For American University (AU), the elevation of the CIO role to the vice president level and appointment to the president’s cabinet began with the recognition that the CIO is an institutional actor and therefore required to understand all the major features of the institution. As AU president emeritus Neil Kerwin recounts, “With a seat on the cabinet, the vice president of information technology educates colleagues on the senior management team and is educated by them. That works its way ultimately up to the board of trustees, which now has a fixed expectation of IT being an agenda item for every board meeting.” Dave Swartz, AU’s vice president and CIO observes, “At most universities, what CIOs struggle with is having the authority to be able to put in place the controls that are needed to be sure that risks are mitigated.” The result of AU’s change in organizational structure was “better alignment between responsibility and authority and accountability.”

    Right framing: Lingua franca for communicating cyber risk to institutional leaders

    Too often, overly technical and esoteric cyberspeak obscures the bigger picture issues of concern for institutional leaders. To gain traction with presidents and boards of trustees, the conversation around cybersecurity should be reframed in terms of enterprise risk management, with the business impact to the institution clearly spelled out. As GSU president Mark Becker puts it, “What I want to know is where our greatest vulnerabilities are and what are we doing to minimize those in a cost-efficient manner.”

    GSU has gone so far as to put in place a cybersecurity charter to communicate to the institution writ large that cybersecurity is not an IT domain but rather an enterprise risk. “In today’s world, where information storage and processes like monetary transactions are increasingly carried out digitally, we all see instances in the news where unauthorized data access has put large numbers of people’s personal information at risk. As a large organization, we are stewards of a variety of sensitive data, so solid information security practices are vital to protecting our students, faculty, and staff, as well as all those who conduct business and research in partnership with the university,” explains Ren Flot, GSU’s chief information security officer and director of cybersecurity services.

    The business risks associated with a breach can range from financial and reputational impact to the ability of an institution to carry out its mission.

    • Financial impact: The sheer financial cost of a breach can be significant. Research at the Ponemon Institute suggests that when factoring in all the different costs (including customer loss, the time to detect a breach, the costs of fixing identified vulnerabilities, the costs of compensating victims, public relations, and so on), the average data breach cost institutions of higher learning about $260 per record seized in the incidents they analyzed over the past four years.9
    • Impact on operations: Because virtually every facet of the modern university depends to some extent on properly functioning technology, a significant data breach can be crippling to the daily operations of a university. For example, a large-scale breach at one major university recently prevented students from being able to access their learning management system for several hours during finals week. As AU president emeritus Neil Kerwin points out, “The kind of damage a breach can cause at a university is not confined to access to information in a narrow sense but literally affects the ability of the institution to conduct its mission.”

      As the reliance on technology at institutions of higher learning grows year over year, the magnitude of potential disruptions to daily business operations will likely only increase. As GSU’s Mark Becker observes, “The future in higher education is how to leverage technology to deliver a better education at a lower cost. The integration of the technology is going to happen. We have to do that in a secure environment.”

    • Reputational damage with consumers, corporate partners, and government agencies: Corporations are less likely to be interested in partnerships with universities whose research data has been breached or with institutions that seem to lack a clear, strong resilience plan and set of processes for dealing with cyber threats. In addition to the concerns they share with corporations, universities often need to comply with strict regulatory considerations (such as NIST 800-177) for government grants and contracts.

      Finally, if important student, parent, or alumni data is seized in a breach, the university’s reputation with potential enrollees may suffer, especially if a robust response plan with a strong public relations element is not in place.

    Resilience mind-set: It’s no longer a matter of if, but when

    Yesterday’s relatively isolated malicious activity has given way to well-organized cybercrime enterprises and networks of politically motivated, and sometimes state-sponsored, attackers. Verizon’s 2017 data breach investigations report found that state-affiliated actors and organized criminal groups were behind an increasing number of breaches targeting the education sector.10 Against this backdrop, it seems inevitable that some cyber incidents may occur.

    While an institution’s technical team handles many day-to-day, routine security events, some incidents may become more serious business crises that can affect an institution’s broader mission. In more serious events, it is imperative that the business closely collaborates with IT to maintain effective resiliency. As GSU’s Ventimiglia observes, “We’re in a day and age that if a network goes down for an hour, you can’t teach.”11

    Being resilient means having the capacity to rapidly contain the damage and mobilize the diverse resources needed to reduce impact—including direct costs and operational disruption, as well as damage to reputation.

    Effectively developing this capability generally requires executive- and board-level engagement.

    Every institution should realistically assess its changing risk profile and determine what levels and types of cyber risk they consider acceptable. Just three-quarters of higher education institutions surveyed by EDUCAUSE have conducted any sort of security risk assessment.12 This is a business challenge, not just a technical one. Presidents and trustees need enough understanding of the threat landscape to provide cyber risk guidance. It’s then the job of the technical team to translate this into effective operational capabilities.

    While resilience requires investment in traditional technology-based redundancy and disaster recovery capabilities, the bigger picture includes a complete set of crisis management capabilities. It involves IT, as well as leaders across the institution, and decision-makers from legal, risk, human relations, and communications functions. It typically requires a playbook across all these entities, designed in advance by considering how threat scenarios impacting critical assets and processes could play out.

    Beyond playbooks, developing a robust resilience capability can be supported through cyber wargaming and simulations. Staging simulations can create better organizational awareness and understanding of threats, improve cyber judgment, and facilitate the development of “muscle memory” that helps teams respond flexibly and instinctively to both the simulation scenarios, as well as situations that cannot be foreseen.

    Many higher education institutions apply a different philosophy to wargaming and security. As Virginia Tech’s information technology security officer Randy Marchany explains, “This is the difference between a ‘keep them out’ versus ‘we assume they’re in’ approach. This viewpoint changes how institutions respond to a wargame scenario. If it is assumed that attackers are already in the system, it’s a matter of ‘how do I hunt them down’ as opposed to ‘how do I keep them out.’”

    Users are inevitably going to make mistakes. The question is how to reduce the damage once a mistake is made. For its part, GSU is using outside companies to monitor the traffic into and out of the university 24/7. The university is also virtualizing its entire network, which will enable it to see any rogue activity in the network and isolate the source and quickly reduce the risk.

    Looking ahead

    Until recently, it has frequently taken a major cyber incident to elevate cybersecurity to the executive agenda. But with the increasing digitization of the academic enterprise, growing regulatory pressure to improve an institution’s information security posture, and a fast-evolving cyber threat landscape, the stakes are higher than ever for institutions that don’t treat cybersecurity matters as serious enterprise risks with the attendant executive- and board-level attention they warrant.

    Increasing executive- and board-level fluency in cyber issues is part and parcel of responsibly overseeing and governing an institution, given the reality of today’s growing cyber threats. Developing such fluency often requires getting the structural alignment in place (to the extent it’s not already there), reframing the issue as one of enterprise risk management, and developing institutional resiliency so that colleges and universities are in a position to bounce back quickly if an incident occurs.

    Authors

    Tiffany Fishman is a senior manager with the Deloitte Center for Higher Education Excellence and is based in Arlington, Va.

    Cole Clark leads client and community outreach and relationships for Deloitte Services LP’s Higher Education practice and is based in Atlanta, GA.

    Joanna Lyn Grama directs the EDUCAUSE Cybersecurity Initiative and the IT GRC (governance, risk, and compliance) program.

    Acknowledgements

    In summer 2017, Deloitte and EDUCAUSE convened a panel to discuss cybersecurity issues in higher education. Deloitte and EDUCAUSE extend their thanks to the following working group members:

    • Ahmed El-Haggen, CIO and VP for information technology, Coppin State University
    • Patrick Feehan, information security & privacy director, Montgomery College
    • Cathy Hubbs, CISO, American University
    • Randy Marchany, information technology security officer, Virginia Tech
    • Ed Martin, deputy chief information officer, George Washington University
    • Scott Midkiff, CIO and VP for information technology, Virginia Tech

    Deloitte and EDUCAUSE also wish to extend their thanks to the following higher education leaders who were interviewed as a part of this project:

    • Mark P. Becker, president, Georgia State University
    • Michael Gower, executive vice president for finance & administration, Rutgers, The State University of New Jersey
    • Cornelius M. Kerwin, president emeritus, American University
    • Michele Norin, senior vice president and chief information officer, Rutgers, The State University of New Jersey
    • Timothy D. Sands, president, Virginia Tech
    • David Swartz, vice president and chief information officer, American University
    • Phil Ventimiglia, chief innovation officer, George State University

     

    Cover image by: Alex Nabaum

    Endnotes
      1. According to Verizon’s 2017 data breach investigations report, 455 cybersecurity incidents occurred in the education sector in 2016, 73 of which resulted in data disclosure. View in article

      2. EDUCAUSE, “Top 10 IT issues, technologies, and trends,” accessed February 12, 2018. View in article

      3. Jeffrey Selingo, Sonny Chheng, and Cole Clark, Pathways to the university presidency: The future of higher education leadership, a report by Deloitte’s Center for Higher Education Excellence in conjunction with Georgia Tech’s Center for 21st Century Universities, Deloitte University Press, April 18, 2017. View in article

      4. EDUCAUSE, “2017 EDUCAUSE core data service,” accessed February 12, 2018. View in article

      5. Jeffrey Pomerantz and D. Christopher Brooks, The higher education IT workforce landscape, 2016, EDUCAUSE Center for Analysis and Research, April 2016. View in article

      6. Mark Becker and Phil Ventimiglia, joint interview. View in article

      7. EDUCAUSE, “The EDUCAUSE almanac for faculty and technology survey, 2017,” accessed February 12, 2018. View in article

      8. EDUCAUSE Annual Conference 2017, “The importance of cybersecurity governance: Perspectives from presidents, trustees, and IT leaders,” November 3, 2017. View in article

      9. IBM Security and Ponemon Institute, 2017 cost of data breach study: United States, June 13, 2017. View in article

      10. Verizon, 2017 data breach investigations report: 10th edition, accessed January 29, 2018. View in article

      11. EDUCAUSE Annual Conference 2017, “The importance of cybersecurity governance,” November 3, 2017. View in article

      12. EDUCAUSE, “The EDUCAUSE core data service almanac.” View in article

    Show moreShow less

    Topics in this article

    Chief Risk Officer (CRO) , Cyber risk , Education , Americas , Government , Leadership

    Deloitte Center for Higher Education Excellence

    View
    Download Subscribe

    Related

    img Trending

    Interactive 3 days ago

    Tiffany Fishman

    Tiffany Fishman

    Senior Manager | Deloitte Center for Government Insights

    Tiffany Fishman is a senior manager with the Deloitte Center for Government Insights. Her research and client work focuses on how emerging issues in technology, business, and society will impact organizations. She has written extensively on a wide range of public policy and management issues, from health and human services reform to the future of transportation and the transformation of higher education. Her work has appeared in a number of publications, including Public CIO, Governing, and EducationWeek.

    • tfishman@deloitte.com
    • +1 571 882 6247
    Cole Clark

    Cole Clark

    Managing Director | Higher Education

    Cole is a managing director within the Higher Education sector at Deloitte Services LP. He has more than 30 years global experience engaging with education and non-profit research organizations, with a focus on the enabling capabilities of technology within the unique culture and context of education and research. In his current role, Cole engages with the higher education community on issues ranging from cost and revenue challenges, administrative modernization, technology transformation, Future of Work, hybrid and online modalities, enterprise risk and resiliency, and the student experience. Cole has participated in research and co-authored several monographs on leadership development and transformation in higher education, including Pathways to the university presidency, Future(s) of public higher education, and The hybrid campus – three major shifts for the post-COVID university. Prior to Deloitte, Cole served as Global Vice President for Education and Research at Oracle Corporation, serving clients across the major functional areas of the academic enterprise, including student lifecycle, HR, and finance. He has also held a variety of education-focused roles with Sun Microsystems, Inc. and Apple, Inc. In addition to the core business functions of the institution, he has experience in areas of the “front office” of higher education including research administration, student engagement, recruitment and retention, and student success. Cole serves on the corporate advisory committee for EDUCAUSE and on the board of trustees of Western Governors University and the Corporation of the Western Governors.

    • coleclark@deloitte.com
    • +1 703 626 4755

    Share article highlights

    See something interesting? Simply select text and choose how to share it:

    Email a customized link that shows your highlighted text.
    Copy a customized link that shows your highlighted text.
    Copy your highlighted text.

    Elevating cybersecurity on the higher education leadership agenda has been saved

    Elevating cybersecurity on the higher education leadership agenda has been removed

    An Article Titled Elevating cybersecurity on the higher education leadership agenda already exists in Saved items

    Invalid special characters found 
    Forgot password

    To stay logged in, change your functional cookie settings.

    OR

    Social login not available on Microsoft Edge browser at this time.

    Connect Accounts

    Connect your social accounts

    This is the first time you have logged in with a social network.

    You have previously logged in with a different account. To link your accounts, please re-authenticate.

    Log in with an existing social network:

    To connect with your existing account, please enter your password:

    OR

    Log in with an existing site account:

    To connect with your existing account, please enter your password:

    Forgot password

    Subscribe

    to receive more business insights, analysis, and perspectives from Deloitte Insights
    ✓ Link copied to clipboard
    • Contact us
    • Careers at Deloitte
    • Submit RFP
    Follow Deloitte Insights:
    Global office directory Office locations
    UK-EN Location: United Kingdom-English  
    About Deloitte
    • Home
    • Press releases
    • Newsroom
    • Deloitte Insights
    • Global Office Directory
    • Office locator
    • Contact us
    • Submit RFP
    Services
    • Audit & Assurance
    • Consulting
    • Financial Advisory
    • Legal
    • Deloitte Private
    • Risk Advisory
    • Tax
    Industries
    • Consumer
    • Energy, Resources & Industrials
    • Financial Services
    • Government & Public Services
    • Life Sciences & Health Care
    • Technology, Media & Telecommunications
    Careers
    • Careers Home
    • About Deloitte
    • About Deloitte UK
    • Accessibility statement
    • Cookies
    • Health and Safety
    • Modern Slavery Act Statement
    • Privacy statement
    • Regulators & Provision of Services Regulations
    • Deloitte LLP Subprocessors
    • Supplier Standard Terms & Conditions
    • Terms of Use

    © 2023. See Terms of Use for more information.

     

    Deloitte LLP is the United Kingdom affiliate of Deloitte NSE LLP, a member firm of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). DTTL and each of its member firms are legally separate and independent entities. DTTL and Deloitte NSE LLP do not provide services to clients. Please see About Deloitte to learn more about our global network of member firms.

     

    Deloitte LLP is a limited liability partnership registered in England and Wales with registered number OC303675 and its registered office at 1 New Street Square, London EC4A 3HQ, United Kingdom. A list of members of Deloitte LLP is available at Companies House.