Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingEducation:University

Nicol Lewis assumes CISO role and Theodore Laskaris assumes CIO role at Columbus State University in Georgia

Nicole and Theodore CIO and CISO at Columbus State
Theodore Laskaris and Nicol Lewis (Image courtesy of Columbus State University)
May 20, 2021

Columbus State University in Georgia announced its new Chief Information Security Officer (CISO), Nicol Lewis and Chief Information Officer (CIO), Theodore Laskaris. Columbus State University is a public institution in the University System of Georgia with two campuses about 100 miles southwest of Atlanta.

The two positions will work in tandem to serve and secure the university’s network services, which daily meet the computing, communication and data needs of 10,000-plus students and employees.

“A reliable and secure technology infrastructure is critical in today’s higher education setting,” said Dr. Deborah Bordelon, CSU’s provost and executive vice president. “The roles of a CIO and CISO differ in their focus, but collaborate in ways that underscore the ever-growing importance of highly functional, highly secure computing networks to universities like Columbus State.”

Theodore Laskaris will serve as CSU’s CIO — a position he has held on an interim basis since July 2019. Through this role, based in the university’s Office of the Provost, he is responsible for the overall management, direction and security of the university's information technology assets. The CIO develops an organizational technology growth and renewal strategy that drives digital adoption, transforms business processes, and optimizes the digital user experience.

During his 35 years of industry experience, Laskaris has overseen enterprise-level computing and network infrastructure programs, as well as managed technical teams and processes, in a variety of banking, investing and higher education settings — including his previous appointment at Champlain College in Vermont. He holds a Master of Business Administration degree from Babson College.

Nicol Lewis joins CSU as its CISO. Based in CSU’s Office of Legal Affairs, Ethics and Compliance, the CISO ensures that all of the university’s academic and operational data is protected and made accessible within the bounds of CSU and USG information security policies.  A key element of the CISO’s role is working with executive leadership to mitigate risk by establishing and maintaining a university-wide information security management program.

Lewis’ 20-year career has included progressive duties in data security and cybersecurity, enterprise-wide IT risk management and compliance, and business continuity. In addition to her previous role as the CISO for the South Carolina Department of Probation, Parole and Pardon Services, she has held similar positions with both the Georgia Technology Authority and Georgia Public Library Service. Her education and training background includes the Georgia Cybersecurity Academy and a Master of Information Science degree from Valdosta State University.

Congratulations!

KEYWORDS: Chief Information Officer (CIO) Chief Information Security Officer (CISO) CISO leadership higher education cybersecurity security leadership University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Vitaliy Panych assumes CISO role for State of California

    Vitaliy Panych assumes role of California state CISO

    See More
  • Mark Potter appointed CISO at Backblaze

    Mark Potter assumes CISO role at Backblaze

    See More
  • Chris White takes over CISO role at Tego Cyber

    Chris White assumes role of CISO at Tego Cyber

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Physical Layer Security in Wireless Communications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing