Contact Us

For technical support or non-Digital Security and Trust inquiries, please visit the IT Service Desk's Self-Service or call 614-688-4357 (HELP).  


Quick Contacts

Report an Incident

Primary contact for Incident Response. Other requests will be routed to the correct team.

Report Phishing

This inbox and the Report Phish Button are the only ways to report phishing attack messages; reports will be reviewed by the Email Security Team and Incident Response Team in concert.

General Questions 

If you have general questions for DST, or if you are unsure who to contact below, please send an email to this address.


Contacts by Function 



Access Management

The Access Management (AM) service provides tactical and technical guidance to system and business leaders so that information contained in a university system can be appropriately protected.  The service collaborates with system owners to help design, document, and implement access controls necessary to help protect institutional data.

BuckeyePass (Multi-factor Authentication/Duo)

BuckeyePass (powered by DUO) is a multifactor authentication service provided to Ohio State faculty, staff, students and student employees. It helps protect your account even if your password is stolen.  Go to BuckeyePass 

Cybersecurity Days (CSD)

Cybersecurity Days is held in the Fall and the Spring. The fall event is focused on cybersecurity at OSU while the Spring event is focused on technical training. Topics change each year so watch for communications here: 
Cybersecurity for You (C4U)

Traditional cybersecurity training rarely answers the important questions you think about in your digital life. Cybersecurity 4 You (C4U) an innovative approach to cybersecurity awareness. 

Data Loss Prevention

The Data Loss Prevention (DLP) service provides a centrally supported offering that helps empower colleges and departments to improve their data visibility by discovering sensitive data.

Disaster Recovery

Disaster Recovery is focused on guiding and working with Disaster Recovery Coordinators of units to verify their respective preparedness for a disaster such as an outage, data loss, etc. Learn more about the Disaster Recovery Program: 

Disposal: Hard Drives, Tape Drives, computing/network equipment (OSU Surplus)

The Surplus Department is responsible for the disposition of Ohio State property in accordance with university policy.

DST Security

The DST Security Portal grants Security Coordinators access to tools such as the Privacy Impact Assessment and the Information Security Control Requirements Assessment. It's also the central repository for SSL certificates for the university.
Email Security

Email Security oversees the Email Security Gateway (blocks Spam/Phish) and Secure Email (email encryption) services.

Enhanced Endpoint Protection Service (EEPS)

The Enhanced Endpoint Protection Service (EEPS) is a centrally hosted Endpoint Detection and Response (EDR) tool that monitors connections to potentially malicious networks and potentially malicious application behaviors on university systems (e.g., desktops, laptops, and servers). It then applies enhanced protections including but not limited to quarantining infected systems from others if malicious behavior is detected.
Group Management Services (GMS/Grouper)

The Group Management Service is an access management platform supporting distributed and automated access controls for university applications. Go to the Group Management Service   

Identity Management

Identity Management oversees several services that protect and maintain the university digital identities of students, faculty, staff, and sponsored guests.

IDP Training &

The Security Awareness oversees the IDP Training and IDP Awareness education requirement defined in the Institutional Data Policy (IDP).
Industrial Control System

University critical infrastructure provides the essential services that function as the backbone to university operations, education, research, security, and health.  At the university we know these as the utilities that provide the electricity, heating, and cooling to the buildings we work in, the water we drink, the transportation that moves us, the communication systems we depend on, and the facilities we use for education, research, health, recreation, and sport. Contact us to schedule time to conduct an assessment.  
IT Technical

The IT Technical Security Assessment service provides technical and architectural security recommendations for a program, service or information system based on an in depth adversarial assessment.
KRI Dashboard

The KRI Dashboards provides current and actionable risks which are high risk and must be remediated. The KRI Dashboard has a suite of dashboards designed for respective audiences.

Log Management

Log Management collects, stores, and makes available for analysis logs and machine generated data from applications, IT systems, and devices. This data is accessible through a web portal and API for analysis and utilization to meet incident response and operational needs. This service is available to all units across campus, please see our documentation page for more information: 

Privileged Access Management (PAM)

The Privileged Access Management (PAM) service is a critical component of identity management, focused on the storage, access and management of privileged accounts university wide. Learn more about the PAM Service 

Research Security and Support 

This service provides Ohio State researchers with access to OTDI Digital Security and Trust (DST) Information Security Analysts and Engineers. This team provides individualized security analysis and recommendations based on the specific use case.

Security Framework

The Information Risk Management Program (IRMP) has produced a series of information security and risk management resources to assist organizations in understanding the program and in implementing strategies to manage information risk.
Third Party Risk Assessments &

Our Third Party Risk Assessment service works to identify the risk presented in the use of any third-party systems or services that stores, processes, or transmits university institutional data and recommend mitigations to reduce this risk. Learn more about our service at

Vulnerability Management

Vulnerability Management provides enterprise tools and services to assist university units with customized solutions to manage vulnerabilities and misconfiguration risks.

Web Single Sign-On

The Web Single Sign-On service (also known by the software name "Shibboleth") offers a standard set of authentication and authorization services to web-based applications. It allows websites and web-based applications to authenticate users by means of “name.#” accounts and provides access to useful institutional data about users at the time of login.  Learn more about Web Single-Sign On  

Last updated: November 15, 2023