IT Staff

Ways we help

We help IT Professionals by providing the best security controls possible and by meeting increasingly challenging policy, granting agency and regulatory requirements. We can provide advice regarding requirements to plan for, buy or build technology solutions that perform well and set up your customers for success.

Identity, Privacy and Cybersecurity teams are available to help University of Illinois IT Pros maintain the highest standards of privacy and cybersecurity as you manage, systems, networks, software and customer needs.


Urgent/critical cybersecurity event monitoring and response (security@illinois.edu)

  • Incident intake, triage, validation and response
  • Vulnerability/exposure intake, triage, validation and response
  • Threat intake, triage, validation and response  (response can include situation containment, mitigation and critical consultation)
  • As-needed emergent engagement with leadership enacted when administrative process is required due to standing requirements, commitments, laws, policies or procedures.
  • Continual monitoring, scanning, intelligence gathering and network interrogation techniques to be employed for the purpose of detecting cybersecurity vulnerabilities, threats, exposures, breaches, anomalous activity, risks borne from noncompliance, cybersecurity incidents, misconfigurations or other activities and conditions that may contribute to risk. 
  • Notification provided to owners of record after mitigation actions are taken, as soon as is practical. A best-effort process will be employed to contact security liaisons and/or stewards. Process assumes contacts are registered and findable in the Contacts Database, Security Liaisons registry or otherwise immediately identifiable using established university enterprise constructs.

Consulting services

Cybersecurity consulting (securitysupport@illinois.edu)

  • Non-emergency consultation requests
  • Cybersecurity planning
  • Security policy support
  • Compliance guidance
  • Security engineering requests
  • Feedback gathering
  • Tools maintenance
  • Cybersecurity resource support

Privacy consulting (privacy@illinois.edu)

  • Customer service requests/general Inquiries
  • Requesting a new privacy service, project or capability
  • Privacy consultations
  • New purchase/third party product or service reviews
  • Compliance-related questions
  • Privacy impact assessments
  • Reporting a possible data incident
  • Other privacy concerns

Identity and access consulting (techservices-iamu@illinois.edu)

  • Identity creation and questions around changes to your NetID, as well as sponsored and/or affiliated NetID support
  • Credential storage and support of your SSL certificates through InCommon (Sectigo)
  • Authentication and authorization and questions around Authman, AD and AzureAD
  • Single Sign-On application integration and how you can integrate departmental applications with the campus SSO solution

Job aids, tools and services, and cybersecurity training

We provide resources to help IT Professionals with cybersecurity related functions.


IT Pro FAQs

Securing devices

Securing email

Securing data and files

Securing networks