{"id":25877,"date":"2025-10-17T15:17:35","date_gmt":"2025-10-17T19:17:35","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?page_id=25877"},"modified":"2025-11-12T15:56:24","modified_gmt":"2025-11-12T20:56:24","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.montclair.edu\/information-technology\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<h2>Mission Statement<\/h2>\n<p><span style=\"font-weight: 400\">Information Security aims to protect the <\/span><strong>confidentiality, integrity<\/strong>,<span style=\"font-weight: 400\"> and <\/span><strong>availability<\/strong><span style=\"font-weight: 400\"> of electronic information. We strive to do this by <\/span><strong>continually evaluating<\/strong><span style=\"font-weight: 400\"> the landscape of cyber security threats, <\/span><strong>implementing technology best practices<\/strong><span style=\"font-weight: 400\">,<\/span> <span style=\"font-weight: 400\">and upholding <\/span>privacy obligations<span style=\"font-weight: 400\"> while aligning with Montclair State University\u2019s educational and research objectives. <\/span><\/p>\n<h2>Vision Statement<\/h2>\n<p>Empower the university community by creating a secure digital environment where information is protected, identities are trusted, and innovation thrives. Strive to maintain a proactive security culture built on collaboration and risk mitigation, which fosters trust and enables a vibrant learning environment.<\/p>\n<p><a name=\"Staff\"><\/a><div class=\"prpl-drawer\"><div class=\"prpl-drawer-header\">Staff<\/div><div class=\"prpl-drawer-content\">\n<p style=\"text-align: center\"><strong>Emily Harris<\/strong><br \/>\nChief Information Security Officer<\/p>\n<p style=\"text-align: center\"><div class=\"prpl-row\">\n<p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Daniel Anzalone<\/strong><br \/>\nDirector, Information Security<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Karolina Maneva-Jakimoska<\/strong><br \/>\nDirector, Web and Identity Management<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-row\">\n<p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Damien Bahoumda<\/strong><br \/>\nCybersecurity Analyst<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Sal Castiglione<\/strong><br \/>\nSenior Security Engineer<br \/>\n<\/p><\/div><br \/>\n<\/p><\/div><div class=\"prpl-row\">\n<p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Juliana Flores<\/strong><br \/>\nInformation Security Awareness and Phishing Coordinator<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Dan Ginsberg<\/strong><br \/>\nSecurity Engineer<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-row\"><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Michael Heller<\/strong><br \/>\nIdentity and Access Management Engineer<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><div class=\"prpl-column one-half\">\n<p style=\"text-align: center\"><strong>Richard Osagie<\/strong><br \/>\nCloud Applications Security Administrator<\/p>\n<p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><\/p><\/div>\n<\/p><p style=\"text-align: center\"><strong>Tyler Silva<\/strong><br \/>\nIdentity and Access Management Developer<\/p>\n<p><strong><\/strong><\/p><\/div><\/div><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mission Statement Information Security aims to protect the confidentiality, integrity, and availability of electronic information. We strive to do this by continually evaluating the landscape of cyber security threats, implementing technology best practices, and upholding privacy obligations while aligning with Montclair State University\u2019s educational and research objectives. Vision Statement Empower the university community by creating [&hellip;]<\/p>\n","protected":false},"author":368,"featured_media":23151,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-25877","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/25877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=25877"}],"version-history":[{"count":22,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/25877\/revisions"}],"predecessor-version":[{"id":26082,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/pages\/25877\/revisions\/26082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/23151"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=25877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}