Senior leadership and administrators
Govern resilience, make crisis decisions, and fund the controls that keep the campus running.
Educational summary — not live-incident instructions
The items below paraphrase publicly available guidance from sources such as CISA, NIST, and the FBI for use in advance reading and planning. They are not professional advice and not a substitute for your institution’s policies or trained responders. If an incident is happening right now, contact your campus IT or information-security team and, in the U.S., consider reporting to CISA and the FBI IC3.
Before Prepare
- Set risk appetite in writing. Cybersecurity is enterprise risk, not an IT cost center.
- Approve a written incident-response plan and authorize the IR team to act under defined thresholds.
- Fund phishing-resistant MFA, immutable backups, EDR, segmentation, and security staffing as a baseline.
- Sponsor an annual tabletop exercise with cabinet, communications, and legal participation.
- Set policy on third-party software risk; require security review for systems holding student, research, or financial data.
- Define decision authorities now: Who can take systems offline? Who can authorize ransom-related discussions with insurer/counsel? Who notifies the board?
During Respond
- Convene the crisis team; defer to the Incident Commander on technical sequencing.
- Make business decisions IT cannot: which services to suspend, which to maintain, what to communicate to whom and when.
- Engage outside counsel and your cyber-insurance carrier early. Understand the insurance’s required steps before you take them.
- Treat the ransom decision as a strategic, legal, and ethical question — not a technical one. Coordinate with counsel and law enforcement; many demands can be addressed without payment.
- Communicate calmly and frequently to the campus and trustees. Acknowledge what you don’t yet know.
After Recover & learn
- Receive the AAR and approve a remediation plan with timelines and budget.
- Report to the board, regulators, and accreditors as required.
- Re-baseline cybersecurity investment based on observed gaps; do not let the moment pass without funding decisions.
- Recognize the responders. Burn-out after a major incident is real and costly.
Self-audit checklist
Your progress is saved on this device only.
Leadership readiness checklist Complete
0 of 7 complete
What should I do right now?
A short decision tree for the most common situations in this role.
Practice scenario
Quick scenarios to turn this guidance into reflexes.