IS-3 Annual Themes

Each year, our office will spotlight a different IS-3 risk area, offering tools and resources for units to enhance cybersecurity and compliance. Each annual theme aims to provide clear and actionable guidance to improve security posture and increase awareness.

  • A key risk area relating to IS-3
  • The risks and IS-3 requirements the theme helps the unit address
  • Information and actual tools, such as services or templates, to help units make progress and increase awareness in that area.

Secure Access Management

Secure access management is essential for protecting sensitive data and systems. It ensures that only authorized users have the right level of access, reducing the risk of data breaches, insider threats, and operational disruptions.

Disk Encryption

Workstation Encryption.

Over 2 million laptops are reported stolen yearly in the United States, and thousands are misplaced or lost. UC Berkeley is no exception. One of the best and easiest ways to protect the personal and UC-owned data on your computer is to encrypt it. Encryption makes the data on your computer unreadable in the event it is lost, stolen, or confiscated.