• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • About Us
    • Governance
      • Steering Committee
      • Membership Committee
      • Technical Advisory Group
      • Microsoft Analysis Team
    • Sponsors & Partners
    • Report a Vulnerability
    • History
    • Diversity
    • Accessibility
    • Staff
  • Membership
    • New Members: Start Here
      • Nomination Process
      • SSO
      • Slack
    • Get Involved!
    • How Membership Works
    • Become a Member
    • Membership Benefits
    • Fee Structure
    • Current Member List
    • Membership Documents
  • Services
  • Assessments
    • Comprehensive General Assessments
    • Policy, Process, and Compliance Reviews
    • Penetration Testing
    • Kickstart Engagements
    • Tabletop Exercises
  • News
    • Resources for News Media
  • Events
    • Event Archive
  • Login
  • Report a Vulnerability
  • Contact Us

REN-ISAC

  • Home
  • About Us
  • Membership
  • Services
  • Assessments
  • News
  • Events
  • Search
  • Login
  • Report a Vulnerability
  • Contact Us
  • Home
  • Events
  • webinars
  • 2017
  • TechBurst: April 21, 2017

Cyber Security For Title IV Schools: How Being A “Financial Institution” Changes The Paradigm

Friday, April 21, 2017

12:00 PM – 1:00 PM

-

Date: Friday, April 21st, 2017
Time: Noon (12:00) EDT
Slides: Click here
Additional File 1:  Click here
Additional File 2: Click here

Audience:[1]: Public [Pb]

This presentation is intended to inform participants about the role of a federal OIG, and the specific role and jurisdiction of ED OIG's Technology Crimes Division within the cyber-security framework of institutions participating in the Title IV Educational Assistance programs administered by the U.S. Department of Education. The presentation will also cover cyber security requirements mandated under federal law for  participating Title IV institutions, and talk about recent communications regarding these requirements from the U.S. Department of Education. The presentation should inform participants regarding cyber security event reporting requirements, and anticipated U.S. Department of Education actions regarding compliance and enforcement in this area. Although primarily targeted at a cyber security audience, this presentation will likely be relevant as well to persons involved in the administration of federally-based student financial aid.

Speaker:

Tom Harper, Jr. is currently employed as the Assistant Special Agent in Charge of the Technology Crimes Division in the Office of Inspector General (OIG) for the U.S. Department of Education (ED). After 14 years of active military service in the U.S. Marines, he began his law enforcement career as a Special Agent in the federal OIG community. Tom has been a Special Agent with the National Archives and Records Administration OIG, Housing and Urban Development (HUD) OIG, Army CID Computer Crimes Investigative Unit, the Treasury Inspector General for Tax Administration (TIGTA), and ED OIG. During his time at ED OIG, Tom has been instrumental in several search warrant operations, child exploitation investigations, computer intrusion investigations, and education financial assistance fraud investigations, which have  resulted in criminal convictions in multiple judicial districts. Tom completed 20 years in the U.S. Marine Reserves in 2009, and was recruited to be a section commander for one of the first Cyber Warfare units in the
Virginia Army National Guard, where he served until retirement at the rank of Major in 2013 with 24 years of military service. Between military and civilian government experience, Tom has completed over 1500 hours of leadership and management training, and over 3,000 hours of digital forensics/cyber investigations training. Tom holds a Master of Science degree in Digital Forensic Science from Champlain College.

-------------------------------

[1] Information Sharing Guidance: TechBursts marked with "MG" are open to members and hosted trusted guests of members. Because access to MG TechBursts require authentication with a REN-ISAC userid and password, guests must view the webcast with the member present. One marked "Pb" are open to the public (link). Ones not marked with MG or Pb are available to members only.

  • Event Archive

REN-ISAC social media channels

  • Twitter
  • LinkedIn

Research & Education Networks Information Sharing & Analysis Center

Contact Us
2715 E. Tenth Street
Bloomington, IN 47408
812-856-0717
info@ren-isac.net

Member of the Indiana University Cybersecurity Community

24-Hour CSIRT Watch Desk
+1 317-274-7228
soc@ren-isac.net

Report a Vulnerability

Indiana University

Accessibility | College Scorecard | Privacy Notice | Copyright © 2025 The Trustees of Indiana University