The Trinity College Information Security Team (IST) is dedicated to safeguarding the confidentiality, integrity, and availability of all information systems, data, and identities. Our mission is realized through a set of integrated, comprehensive programs that provide proactive security expertise, maintain resilient infrastructure, and foster a culture of security awareness and compliance across the institution.

Information Security Programs at Trinity College

Providing thorough security reviews and risk assessments for all new IT projects, third-party vendors, and significant purchases. We enforce Trinity’s security standards by formally assessing new technologies, evaluating compliance risks, and utilizing tools like our IT Security Questionnaire to streamline the review process.

Empowering the Trinity community with the knowledge to actively identify and mitigate security risks. We promote secure digital behaviors through continuous, interactive training, including learning modules, webinars, departmental sessions, and timely alerts on the latest threats and best practices.

Proactively identifying and remediating security weaknesses across the entire digital ecosystem. This involves conducting regular vulnerability scans, scheduled penetration testing, and risk assessments. We collaborate directly with Infrastructure and Applications teams to swiftly resolve identified vulnerabilities.

Ensuring institutional adherence to critical data protection regulations, including FERPA, GLBA, PCI-DSS, and HIPAA. We collaborate with departments to create formal system security plans and ensure that policies and procedures are rigorously followed to protect the sensitive data entrusted to us.

Establishing and maintaining the capability to effectively detect, analyze, contain, and recover from security incidents. The IST leads the response effort, coordinates resources, and manages threats. We conduct continuous post-incident reviews to identify root causes and drive organizational continuous improvement.

Ensuring the resilience and recoverability of critical applications and services. We regularly test comprehensive BC/DR plans, assess the criticality of all institutional systems, and set clear Recovery Time Objectives (RTOs) to minimize downtime. During a disruption, the IST supports the execution of recovery plans to guarantee business continuity.