FAQs

1. How is this training different from the university’s Security Awareness and Training Program (SATP)?2025-05-12T13:24:22-04:00

This training builds on the university’s existing SATP by offering a customizable, synchronous format. Research teams and RISP can tailor the content to best fit their needs.

2. Why should I request a training session?2025-05-12T13:24:53-04:00

Research-related cyber attacks are a top security risk identified by the university’s Chief Information Security Officer. Cyber security training helps foster a culture of security within research teams. Sessions can be customized to:

  • Address pressing concerns or risks
  • Cover specific solutions or processes
  • Answer outstanding security-related questions

Each session is designed with the research team in mind — enhancing security while supporting innovation.

3. When should I request a training session?2025-04-23T15:57:56-04:00

Timing depends on the research team’s needs. We aim to balance overall interest in training with availability for a synchronous session.

4. Are training sessions required?2025-05-12T13:25:34-04:00

Training is recommended but not required. However, some research agreements may require cyber security training in addition to the university’s SATP.

5. What will I receive after completing a training session?2025-04-23T16:04:41-04:00

The requester will receive a copy of the presentation deck and a collection of highlighted resources.

6. What is not included in a training session?2025-05-12T13:26:30-04:00

RISP does not provide specific technical implementation guidance for a team’s information systems or solutions. If such guidance is needed, a consultation with technical support staff and RISP can be arranged.

Last modified: May 28, 2025

Go to Top