UTA Tower

Information Security Office

The Information Security Office provides a variety of services to the UT Arlington community. In a nutshell our goal is to foster best practices for preventing unauthorized access or changes to information or information systems, and to ensure that both are available to individuals who have a need-to-know.

Register your web applications here

All departments and existing owners of web applications and services must register their web applications with the ISO. 

To register your web application use this link:  https://go.uta.edu/isoreg



Mission and Responsibility

The mission of the Information Security Office is to provide support to the University in achieving its goals by ensuring the security, integrity, confidentiality, and availability of information resources.   This support helps ensure the existence of a safe computing environment in which the university community can teach, learn, and conduct research.

Services We Provide:

Governance, Risk and Compliance (GRC)

  • Policy and Standards
  • Risk Management
  • Security Architecture and Consulting
  • Reporting and Metrics

Cybersecurity, Architecture, and Incident Response (CSAIR)

  • Cybersecurity Oversight
  • Security Incident Handling and Response
  • Monitoring and Threat Intelligence
  • Research and Technology Controls
  • Data Loss Prevention

Awareness, Communication and Outreach (ACO)

  • Security Awareness and Training
  • Security Alerts and Advisories
  • Simulating Phishing
  • Community Outreach
  • Information Security Marketing

Latest Newsletter

May 2023 Gatekeepers: The guardians of data

May 2023

Ensuring confidential information remains confidential requires an overlap of three key areas: people, processes, and technology. In fact, those elements represent the foundation of a framework that has existed since the 1960s — a model designed to help organizations assess and improve performance. The idea behind the framework is that all three overlapping components must be aligned and properly balanced for an organization to achieve and maintain a successful workflow. Not long after it was introduced, the framework was adopted by the security community. To this day, it is one of the most widely used for information technology management as well as workforce management. It’s

May 2023 Newsletter
May 2023 Newsletter

May 2023 Gatekeepers: The guardians of data

May 2023