Smart Access Program
- Protect surfaces help us prioritize what matters most—sensitive data, critical applications, and essential systems.
- The CISA Zero Trust Maturity Model provides a roadmap for improving capabilities across identity, devices, networks, applications, data, and visibility & analytics.
- Continuing governance and collaboration across DoIT and distributed IT.
- Advancing Visibility & Analytics and Automation & Orchestration to improve insight, responsiveness, and resilience.
- Improving device compliance and integration to reduce risk at the endpoint level.
What’s happening now?
| Device Data Analysis: Building the foundation for Smart Access decisions | Smart Access January 2026 update |
|---|---|
| The Smart Access program is focused on fortifying university cybersecurity. The foundation of this work is understanding the devices that are connecting to the university network. Learn more about the important work and what’s to come. | Smart Access work is active and focused on advancing Zero Trust with the tools we already have. Learn more about the current work and what’s next. |
In this page
Smart Access
Making it easy to do the right thing
Other updates
-
Smart Access January 2026 update
Smart Access work is active, focused on advancing Zero Trust with the tools we already have. Learn more about the current work and what’s next.
-
December 2025 progress update
Smart Access is focused on improving visibility and enabling data-informed decisions. In this article, the team shares the progress of their current work.
-
Device Data Analysis: Building the foundation for Smart Access decisions
The Smart Access program is focused on fortifying university cybersecurity. The foundation of this work is understanding the devices that are connecting to the university network. Learn more about the important work…
Smart Access service principles
Our service principles define the core values, strategic direction, and essential characteristics for architecture design and execution, serving as a foundation for decision-making throughout the program.
- Evaluating user experience and end-user needs to increase adoption, innovation, accessibility, and ease of use
- Being aware of the security burden on users
- Identifying and sharing the benefits of changes
- Implementing sustainable processes that ensure long-term stability and support
- Iterating and improving solutions based on stakeholder feedback
- Finding ways to reduce complexity, when feasible
Program team
- Didier Contis, Vice Provost & Chief Information Officer
- David Pagenkopf, Deputy Chief Information Officer
- Jeffrey Savoy, Chief Information Security Officer
- Tadd Smejkal, SEO Director
- Bobby Jo Morse, PPMO Director
- Chris Richards, Project Manager
- Steve Tanner, Cloud and Security Engineering Associate Director
- Crague Cook, Organizational Change Manager
- Tomomi Imamura, Enterprise Cybersecurity Architect
- Whitney Jacobson, Communications Specialist
Contact us
Stay updated and engaged
To get the latest news, event updates, and ways to stay involved join our mailing list.
Get in Touch
We’re here to help. Feel free to ask us anything or share your thoughts.
