About IS

Information Security

Consulting & Architecture

Your starting point for information security. We promote, design, and develop secure architecture across Penn State. Our key initiatives include secure enclaves, Authority to Operate, and guideline development. We’re always happy to provide answers and guidance for general security consulting questions. If you have a cybersecurity question and aren’t sure where to start, start with us!

focus

FOCUSED ON YOU

Cybersecurity is a partnership. As a customer-focused group, we work closely with units, colleges, and campuses to promote cybersecurity holistically and collaboratively; not just as an afterthought or lone project. Our projects vary in scope from large enterprise-wide initiatives to localized college research projects and administrative needs.

If you have any question, concern, or need, please don’t hesitate to reach out to us. We would love the opportunity to partner with you to strengthen cybersecurity across Penn State.

Services

Secure Architecture Design

Need to build a new information system? Want to make sure it’s secure? Our team can give input on how to build a secure system and maintain the integrity of your information.

Authority to Operate

All information systems processing or storing Level 3 or Level 4 data under University Policy AD95 must have an authority to operate (ATO).

Learn more about ATOs here.

Secure Enclaves

Secure enclaves help to ensure that Penn State’s most valuable information remains secure.

Learn more about Secure Enclaves here.

Subject Matter Experts (SME) for IS PCI compliance

Our team collaborates with the IS compliance team to provide the technical expertise required to maintain PCI compliance in your area.

Security Consulting

Have a question? Need some input? Our team is here to help you with your project, big or small. We have the right expertise to guide you through any challenge.

Subject Matter Experts (SME) for projects

Have a local project that involves any technology? Our experienced staff can sit in on project meetings to help you find a secure and compliant solution.

Regulatory Compliance

Our team is responsible for regulatory compliance and ensuring sensitive research meets government requirements. NIST 800-171 and CMMC are two that have a large impact on research.

Requests for Proposal (RFP)

Looking to source new services, hardware, or software? Our team can help you work through the security side of an RFP.

Cloud Initiatives

Partnering with the EIT cloud team, we can help you understand and design your system for the cloud.

involved

GET US INVOLVED

Consulting & Architecture offers consulting for a wide array of cybersecurity projects, services, and initiatives. Don’t see what you need here? Email security@psu.edu; we can help or find the right contact person for you.

Working on an ATO or enclave? Please reach out to use through your existing ATO record in ServiceNow, or email enclaves@psu.edu.

Meet our team

Kyle Crain

Kyle Crain

Information Security Architect

 

Focus areas: General security consulting, cloud architecture, Office 365 security, PCI-DSS, information classification, Authority to Operate, secure enclave design and build, presentations, enterprise initiatives, requests for proposals (RFP), standards guidance, secure network, and system architecture, NIST standards, Cybersecurity Maturity Model Certification (CMMC), research collaboration and cyber security.

Kyle has has worked at Penn State for thirteen years and has been involved with Information Security for ten years. During his time at IS, he worked on a variety of key initiatives and services as an analyst and engineer before becoming the Information Security Architect. Kyle believes in balancing security with usability to support the goals of the University and that security cannot be a one size fits all approach. He enjoys building relationships with University personnel to understand their needs and help design approaches that are both secure and allow work to continue without introducing unnecessary complexities.

Randy Hegarty

Randy Hegarty

Cyber Information Assurance Analyst

 

Focus areas: Enterprise firewall, general security consulting, Office 365 for level 3 and 4 data, requests for proposal (RFP), exemptions and exceptions, change advisory board, incident response, secure information system design, SME for security projects.

Randy has spent the majority of his 20 years at Penn State working in information security. He was part of the first central security team that was formed at Penn State which was the precursor to other iterations of security at the University. Prior to his time at Penn State he was employed by a large defense contractor. He has an extensive background in secure infrastructure, intrusion detection, and system design. Randy’s experience and expertise allows him to apply a wealth of knowledge into helping consult on and design systems that are not only secure but also meet the needs and challenge of complex university environments.

Randy Hegarty

Andy Hersh

Cyber Security Systems Engineer

 

Focus areas: cyber risk, Cybersecurity Maturity Model Certification (CMMC), NIST standards and frameworks, Authority to Operate (ATO), general security consulting, ATO compliance, requests for proposal (RFP), exemptions and exceptions, secure information system design, SME for security projects.

Andy splits time between the IS Consulting and Architecture team. and the Privacy Compliance and Risk team. This unique dual role allows him to focus on both the technical sides of cyber security as well as the compliance implications. Andy is able to build processes and workflows that help projects navigate the complex waters on both the cyber and compliance sides. He is also able to utilize this experience to help mature Penn State’s CMMC program and stay on top of current requirements for this critical work. Prior to joining IS, Andy was involved in the security program and vulnerability management for Penn State IT. 

Sean Woleslagle

Michael Morgan

Cyber Security Systems Engineer

 

Focus areas: Infrastructure, networking, endpoint management, cloud development, compliance frameworks, NIST, ITAR, virtualization, VDI, CMMC, system security plans, secure enclaves, authority to operate, process maturity.

Mike is a Cyber Security Systems Engineer with the Consulting & Architecture group within Information Security. Mike graduated in 2005 from Penn State with a BS in Information Technology minoring in business. Prior to joining IS, he worked for over 7 years in Penn State’s College of Engineering as the Senior Systems Analyst managing infrastructure, security, and compliance frameworks for critical research projects. Before his time at Penn State, Mike was an administrator and later IT Manager for General Dynamics, a global aerospace and defense company. Mike has also worked at ESPN as an associate systems administrator. Outside of work, Mike volunteers with Penn State’s Men’s Ice Hockey team as an in-game statistician tracking advanced statistics, video editor, assists with in-game playstyle/strategy adjustments and other operational duties. He also enjoys golf, playing guitar, and attending PSU sporting events; primarily Football and Wrestling.

Jason Behory

Jason Behory

Cyber Security Systems Engineer

 

Focus areas: Core infrastructure, cloud development, virtualization, Office365, endpoint hardening and management, securie information system design, general security consulting, enterprise wide initiatives, research security. 

Jason started his career in IT at a small defense contractor as a network administrator working with application developers on research contracts for the Navy. From there then moved into a systems analyst role at a large corporate bank where he was responsible for implementing and maintaining much of the institution’s core IT infrastructure. Just prior to joining Penn State, he was a Senior systems analyst at IUP managing the university’s IT infrastructure. His primary focus was on the secure systems and services supporting the student information system. He was also heavily involved with the university’s identity and access management (IAM) systems and services.

secure

JOIN THE CONVERSATION

Join in the conversation on Yammer: