Ensuring Continuity

Ensuring Continuity

Cybersecurity within higher education

Talking with…Bob Turner, Chief Information Security Officer, Penn State University

Universities face an uphill battle in protecting sensitive data, research assets, and operational systems. Higher education institutions like Penn State University are not only centers for learning and innovation but also prime targets for cyberattacks.

At the helm of Penn State’s cybersecurity efforts is Bob Turner, Chief Information Security Officer, who leads a team tasked with safeguarding a complex digital ecosystem of students, staff, and countless research affiliates. Turner brings a wealth of experience in cybersecurity strategy, policy, and risk management, and he understands the delicate balance between security and academic freedom.

What do you see as the most pressing cybersecurity threats facing universities today, and how has the threat landscape evolved in recent years?

Cybercriminals are getting more sophisticated—whether it’s phishing schemes, ransomware attacks, or attempts to exploit research data. The volume and intensity are also increasing which stress tests the automated detection tools. And let’s be honest: No matter how many times we stress, “Don’t click on the link,” someone is still going to click on it. That’s just reality. Our job is to make sure we have systems online and professionals in the loop to detect and respond to threats, contain damage, and keep the “business” of educating the next generation on track. The delicate balance between keeping everything secured, containing the known threats, and remediating those we can is a constant yet noble effort. That’s why cybersecurity isn’t just about defense; it’s about resilience.

“Cybersecurity isn’t just about defense; it’s about resilience.”

Bob Turner, Chief Information Security Officer, Penn State University

How will AI impact cybersecurity strategies in higher education, and how should institutions leverage AI responsibly while mitigating its risks?

AI-driven security tools allow us to automate threat detection, analyze patterns in real-time, and respond faster than ever before. These tools help us filter out noise, identify unusual behaviors, and adapt defenses dynamically.

On the flip side, attackers are also using AI to create more sophisticated phishing or other social engineering campaigns, automate intrusion attempts, and find vulnerabilities faster than ever. That’s why AI can’t be our only line of defense. The imperative is to make AI a part of our broader cybersecurity strategy—one that integrates people, processes, and tools. We’re constantly refining our risk management and incident response protocols to ensure we’re leveraging AI effectively while keeping a human eye on the decision-making process. Because at the end of the day, security isn’t just about technology and strategy; it’s about trust.

How do you strike a balance between maintaining cybersecurity resilience and fostering an open academic environment that encourages knowledge-sharing?

That’s the fundamental challenge in higher education cybersecurity. Universities thrive on openness—whether the researchers collaborate across institutions or students’ access and use global learning tools. More restrictions slow down innovation. Skimping on protection means greater unknown or unchecked risk.

The perpetual strategy will always be to balance People, Process, and Tools. We must understand and find ways to provide for the university needs at every level—academic, research, business—before implementing security measures. It’s about collaboration, not control. For example, we don’t just impose rules; we work closely with faculty and researchers to understand their needs and find security solutions that enhance and accelerate research. Security should be an enabler, not a roadblock.

“Universities thrive on openness—whether the researchers collaborate across institutions or students’ access and use global learning tools.”

Bob Turner, Chief Information Security Officer, Penn State University

What practices should schools adopt to enhance cyber resilience, incident response, vulnerability management, and business continuity planning?

Resilience is the name of the game. You can do everything right, have the best security measures in place, and still have something go wrong. That’s why we don’t just focus on prevention—we focus on response and recovery as well. Our goal is to detect threats early, contain them quickly, and ensure minimal disruption. We do that through continuous risk assessment and testing—simulating attacks, running vulnerability assessments, and educating our users.

One of the biggest challenges is ensuring that when something does happen, people know what to do. That’s where tabletop exercises and business continuity planning comes in. Universities can’t afford downtime. If a critical system goes down, or if an attack disrupts research, we need to build and test clear response protocols to restore operations quickly. That’s why cybersecurity can’t just be an IT issue—it is an educational and business imperative and must be strategically woven in to the university’s overall risk management program.

Are there emerging technologies or strategic shifts that university leaders should prioritize to stay ahead of future threats?

The future of cybersecurity in higher education is going to be shaped by three key areas: automation, collaboration, and culture.

  • Automation – AI and machine learning will continue to play a bigger role in cybersecurity. We’re moving toward more automated threat detection, real-time analytics, and AI-assisted incident response. This is a huge opportunity to stay ahead of threats, but it requires careful implementation.
  • Collaboration – We need better information-sharing between institutions, government agencies, and industry partners. Cyber threats don’t respect boundaries, so our defenses need to be just as interconnected.
  • Culture – At the end of the day, the biggest security risk isn’t technology—it’s human behavior. We can have the best security tools in the world, but if people don’t follow best practices, we’re still vulnerable. That’s why building a strong security culture across the university is critical.