{"id":1354,"date":"2018-03-21T16:52:54","date_gmt":"2018-03-21T20:52:54","guid":{"rendered":"https:\/\/med.sites.unc.edu\/it\/?page_id=1354"},"modified":"2025-10-03T14:48:50","modified_gmt":"2025-10-03T18:48:50","slug":"it-security-office","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/","title":{"rendered":"Information Security"},"content":{"rendered":"<p><strong>Working collaboratively to ensure the confidentiality, integrity, and availability of data to enable UNC School of Medicine faculty, staff, and students to safely pursue academic and research activities.<\/strong><\/p>\n<p>The Information Security Team\u00a0is responsible for promoting a secure information technology environment in the School of Medicine.\u00a0 Our goal is to protect the confidentiality, integrity and availability of the school&#8217;s data and maintain compliance with all federal, state and local regulations.<\/p>\n<h2>Services include<\/h2>\n<ul>\n<li>Risk Assessments<\/li>\n<li>Software and service purchases<\/li>\n<li>Research\u00a0Studies<\/li>\n<li>Policy\u00a0consultation<\/li>\n<li>HIPAA Security Training and Outreach<\/li>\n<li>Incident Management<\/li>\n<li>Vulnerability Management<\/li>\n<li>Consultation<\/li>\n<\/ul>\n<h2>Services Offered<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.med.unc.edu\/it\/services\/informationsecurity\/\">Information Security Services<\/a><br \/>\nIncident Response, System Vulnerability Scans, Laptop Encryption, Forensics, Business Continuity Planning, Education Awareness and Training and Security Consulting.<\/li>\n<\/ul>\n<h2>Director<\/h2>\n<div class=\"container-fluid divisions-container \">\n    \n            <article class=\"row post entry\">\n            <div class=\"directory-gallery-thumbnail\">\n                                                                                                \t\t\n                    <div class=\"upd-image\">\n                        <img loading=\"lazy\" decoding=\"async\" class=\"upd_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/10\/thumb_48612.png\" alt=\"Brian Penders\" height=\"160\" width=\"120\" \/>\n                        <img decoding=\"async\" class=\"print_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/10\/thumb_48612.png\" alt=\"\" \/>\n                    <\/div>\t\t\t\t\t\t\t\t\t\n                            <\/div>\n            <div class=\"directory-gallery-content\">\n                <h2 class=\"entry-title\">                                            Brian Penders                                    <\/h2> \n                \n                                                                    <p><strong>Chief Information Security Officer<\/strong><\/p>\n<p><a href=\"tel:919-962-8649\">(919) 962-8649<\/a><br \/>\n<a href=\"mailto:brian_penders@med.unc.edu\">Brian_Penders@med.unc.edu<\/a><\/p>\n                            <\/div>\n        <\/article>\n\n    \n    <script type=\"text\/javascript\">\n        (function($){\n            var entries = $('.entry-content');\n                entries.each(function(index, entry ){\n                    if( $(entry).find('.post-author').length === 0 ) {\n                        $(entry).parents('article.post.entry').css('min-height', '110px');\n                    }\n                });\n        })(jQuery);\n    <\/script>\n\n<\/div>\n\n\n<h2>Team<\/h2>\n<div class=\"container-fluid divisions-container \">\n    \n            <article class=\"row post entry\">\n            <div class=\"directory-gallery-thumbnail\">\n                                                                                                \t\t\n                    <div class=\"upd-image\">\n                        <img loading=\"lazy\" decoding=\"async\" class=\"upd_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/04\/Peter-731x1024.jpeg\" alt=\"Peter Voland\" height=\"160\" width=\"120\" \/>\n                        <img decoding=\"async\" class=\"print_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/04\/Peter-731x1024.jpeg\" alt=\"\" \/>\n                    <\/div>\t\t\t\t\t\t\t\t\t\n                            <\/div>\n            <div class=\"directory-gallery-content\">\n                <h2 class=\"entry-title\">                                            Peter Voland                                    <\/h2> \n                \n                                                                    <p>IT Security Manager<\/p>\n<p><a href=\"tel:9198437926\">(919) 843-7926<\/a><br \/>\n<a href=\"mailto:peter_voland@med.unc.edu\">peter_voland@med.unc.edu<\/a><\/p>\n                            <\/div>\n        <\/article>\n\n            <article class=\"row post entry\">\n            <div class=\"directory-gallery-thumbnail\">\n                                                            <div class=\"upd-image\">\n                            <img decoding=\"async\" class=\"upd-image\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/themes\/heelium-white-coat\/images\/default-profile.svg\" alt=\"No profile image on file\" \/>\n                        <\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\n                            <\/div>\n            <div class=\"directory-gallery-content\">\n                <h2 class=\"entry-title\">                                            Quinton McDonald                                    <\/h2> \n                \n                                                                    <p>IT Security Specialist<\/p>\n<p><a href=\"tel:9199622157\">(919) 962-2157<\/a><br \/>\n<a href=\"mailto:Quinton_McDonald@med.unc.edu\">Quinton_McDonald@med.unc.edu<\/a><\/p>\n                            <\/div>\n        <\/article>\n\n            <article class=\"row post entry\">\n            <div class=\"directory-gallery-thumbnail\">\n                                                                                                \t\t\n                    <div class=\"upd-image\">\n                        <img loading=\"lazy\" decoding=\"async\" class=\"upd_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/11\/myron-morton.jpeg\" alt=\"Myron Morton\" height=\"160\" width=\"120\" \/>\n                        <img decoding=\"async\" class=\"print_img\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/11\/myron-morton.jpeg\" alt=\"\" \/>\n                    <\/div>\t\t\t\t\t\t\t\t\t\n                            <\/div>\n            <div class=\"directory-gallery-content\">\n                <h2 class=\"entry-title\">                                            Myron Morton                                    <\/h2> \n                \n                                                                    <p>IT Security Specialist<\/p>\n<p><a href=\"tel:9198430140\">(919) 843-0140<\/a><br \/>\n<a href=\"mailto:myron_morton@med.unc.edu\">myron_morton@med.unc.edu<\/a><\/p>\n                            <\/div>\n        <\/article>\n\n            <article class=\"row post entry\">\n            <div class=\"directory-gallery-thumbnail\">\n                                                            <div class=\"upd-image\">\n                            <img decoding=\"async\" class=\"upd-image\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/themes\/heelium-white-coat\/images\/default-profile.svg\" alt=\"No profile image on file\" \/>\n                        <\/div>\n                    \t\t\t\t\t\t\t\t\t\t\t\t\n                            <\/div>\n            <div class=\"directory-gallery-content\">\n                <h2 class=\"entry-title\">                                            Danielle Wingler                                    <\/h2> \n                \n                                                                    <p>IT Security Specialist<\/p>\n<p><a href=\"mailto:Danielle_Wingler@med.unc.edu\">Danielle_Wingler@med.unc.edu<\/a><\/p>\n                            <\/div>\n        <\/article>\n\n    \n    <script type=\"text\/javascript\">\n        (function($){\n            var entries = $('.entry-content');\n                entries.each(function(index, entry ){\n                    if( $(entry).find('.post-author').length === 0 ) {\n                        $(entry).parents('article.post.entry').css('min-height', '110px');\n                    }\n                });\n        })(jQuery);\n    <\/script>\n\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Working collaboratively to ensure the confidentiality, integrity, and availability of data to enable UNC School of Medicine faculty, staff, and students to safely pursue academic and research activities. The Information Security Team\u00a0is responsible for promoting a secure information technology environment in the School of Medicine.\u00a0 Our goal is to protect the confidentiality, integrity and availability &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\" aria-label=\"Read more about Information Security\">Read more<\/a><\/p>\n","protected":false},"author":64398,"featured_media":0,"parent":1331,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-1354","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security | Information Technology\" \/>\n<meta property=\"og:description\" content=\"Working collaboratively to ensure the confidentiality, integrity, and availability of data to enable UNC School of Medicine faculty, staff, and students to safely pursue academic and research activities. The Information Security Team\u00a0is responsible for promoting a secure information technology environment in the School of Medicine.\u00a0 Our goal is to protect the confidentiality, integrity and availability &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T18:48:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\",\"name\":\"Information Security | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"datePublished\":\"2018-03-21T20:52:54+00:00\",\"dateModified\":\"2025-10-03T18:48:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About\",\"item\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"About Us\",\"item\":\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/","og_locale":"en_US","og_type":"article","og_title":"Information Security | Information Technology","og_description":"Working collaboratively to ensure the confidentiality, integrity, and availability of data to enable UNC School of Medicine faculty, staff, and students to safely pursue academic and research activities. The Information Security Team\u00a0is responsible for promoting a secure information technology environment in the School of Medicine.\u00a0 Our goal is to protect the confidentiality, integrity and availability &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/","og_site_name":"Information Technology","article_modified_time":"2025-10-03T18:48:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/","url":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/","name":"Information Security | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"datePublished":"2018-03-21T20:52:54+00:00","dateModified":"2025-10-03T18:48:50+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"About","item":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/"},{"@type":"ListItem","position":3,"name":"About Us","item":"https:\/\/www.med.unc.edu\/it\/about\/about-us\/"},{"@type":"ListItem","position":4,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/1354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/64398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=1354"}],"version-history":[{"count":1,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/1354\/revisions"}],"predecessor-version":[{"id":13711,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/1354\/revisions\/13711"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/1331"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=1354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}