Your browser is unsupported

We recommend using the latest version of IE11, Edge, Chrome, Firefox or Safari.

UIC’s Ed Zawacki Retires – Interview with our Chief Information Security & Privacy Officer

Interview with Ed Zawacki

35+ Years in IT at UIC Heading link

Ed Zawacki

With 36 years of experience working in Information Technology, Ed Zawacki is a veteran expert supporting innovation as UIC’s Chief Information Security and Privacy Officer. Retiring this October, he shares a few words with us about his journey, beginning with where it all started: right here at UIC!

Ed’s work at UIC dates back to his early student years in the mid 80s. He began working as a freshman student programming in the Biomechanics Lab in SELE in 1982. Less than a year later, he became a student consultant at the Computer Center, rising to senior consultant by the time he graduated in 1986, after which, he joined the networking group full time.

Working at the Computer Center as a student consultant was a big deal back then and I was happy to be accepted.

Ed Zawacki  |  Chief Information Security & Privacy Officer

Throughout his career at UIC, Ed took on several roles including network engineer and system administrator working on the IBM mainframe, connecting UIC to NSFNET (the precursor to the internet), working with IBM on beta DNS server code, and then morphing into the role of “the security person” as time went by.

When it comes to his fondest memories at UIC, Ed says it’s the people. “I’ve had the pleasure over the years to consistently work with some of the best people you could hope for,” he says. “Although the students don’t really get a chance to see it, there are so many people trying their best to make the student experience the best possible.”

Challenges Inspiring Innovation Heading link

IT Group at UIC

In the fall of 2003, two very invasive internet worms popped up: Blaster and Welchia. As Ed explains, at that time, UIC did not have any intrusion detection tools available, and compromised machines were affecting network performance.

“I did have access to something called network flow data though, which is basically a summary of a network conversation,” he says. Racing against time, Ed wrote a program to detect compromised machines on the UIC network. “New machines kept popping up, but with a way to detect them, working with the network team, we were able to keep them under control and the network running.”

Ed later expanded the program to be fully configurable so that new worms could easily be detected and reported on based on their network traffic characteristics, essentially innovating a real intrusion detection system (IDS) to fulfill the university’s need at the time.

Q & A with Ed Zawacki Heading link

Ed Zawacki

What is a typical day like for a Chief Information Security & Privacy Officer? 

I’m not sure that there is a typical day. Aside from the assorted meetings with other university leaders, issues arise that need to be evaluated, opinions presented, and decisions made… new security issues regularly arise that need to be addressed. And new technologies and enhanced capabilities of existing systems need to be evaluated and communicated. Assorted issues can arise from compliance and/or law enforcement. Finally, issues arise with the detection of security events that may be escalated from the security team.

What is one of your biggest accomplishments at UIC? 

Building the Information Security office from the ground up. This includes working with others to implement policy and technical controls to help secure the university infrastructure. It also includes making available tools for the university IT community to assess and protect their own infrastructure, as well as the implementation of university-wide security awareness training.

What advice would you give students interested in pursuing a career in IT & cyber security?

Be very curious. Always try to make sure you understand how and why things function the way they do, learn how networking and operating systems work, read as much as you can, and then most importantly, find time to play with security tools and technologies.

What do you look forward to after UIC?

At this point, I’m not sure since I’ve been working here my whole adult life as well as my student years as a student at UIC. My immediate plans involve getting some projects done around the house and pursue a fledgling hobby in painting and sculpture. I care very much about this place though, so I’m also looking forward to the university finding someone to move the security infrastructure forward.

The university is really one giant team. Most of the security accomplishments on a day-to-day basis are highly dependent on other dedicated staff that do their jobs well. I don’t think most people see the work these people do, but I do and sincerely appreciate it.

Ed Zawacki  |  Chief Information Security & Privacy Officer

Celebrating Ed Zawacki Heading link

Help us celebrate Ed’s wonderful UIC career and retirement! Drop him a note on his online Kudo Board:

Sign Ed Zawacki's Kudoboard