Information Security

The mission of Cybersecurity and Enterprise Systems is to protect the confidentiality, integrity, and availability of Missouri State data and information systems; and strengthen university preparedness, timely response, and rapid recovery in the event of cyber attack, natural disaster, or other emergency. We are committed to securely, efficiently, and reliably provide the services required to meet Missouri State’s enterprise-wide computing needs.

Information security logo

Person item component: robmartin
Loading Profile. . .
loading

Operations and Systems

The Operations and Systems unit of Computer Services is committed to securely, efficiently, and reliably provide the services required to meet Missouri State’s enterprise-wide computing needs. In pursuit of this purpose, Operations and Systems maintains and manages over 300 physical and virtual servers while providing a variety of other services to the university.

Our services

Threats to computing and communications environments are evolving. While computers have transformed the workplace and become integral to university life, they have also provided opportunity for nefarious elements to prey on our information assets. Defending against cyber attack is not simply a movie plot; it is now a fact-of-life.

If you have questions about the services we provide, or would like to discuss any information security related concerns you might have, please contact us at InformationSecurity@MissouriState.edu.

Regulatory compliance

Validate compliance with federal and state requirements for information security, to deter financial loss, inhibited productivity, civil and criminal liability, and diminished reputation.

Risk management

Provide assessment and guidance on information security risks by identifying, evaluating, and communicating threats and vulnerabilities; developing and maintaining policies and supporting processes; and enforcing regulatory requirements.

Counterintelligence and mitigation

Implement and operate security management systems to detect and deter malicious activity affecting the university's information management resources.


Information security news

Loading