Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Identity and Access Management Topics at EDUCAUSE 2012
The National Strategy for Trusted Identities in Cyberspace (NSTIC) has certainly brought to light the importance of an international dialogue about the role of identity and access management (IAM) in helping to enable online services and improve cybersecurity. At the campus level, there is a need for an enterprise strategy on IAM to enable single sign-on, authenticate users, limit access to authorized individuals, and federate with other service providers. Movement away from on-campus systems to externally hosted systems and cloud providers make the need for robust identity management even more important.
The annual EDUCAUSE Conference in Denver will provide an opportunity to explore the range and depth of issues that campuses must consider as they build their enterprise IAM strategy. Below are the sessions that we would encourage you to attend.
Federal Government Develops Toolkit for Bring Your Own Device
The Digital Services Advisory Group and Federal Chief Information Officers Council have produced a Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs. The toolkit provides key areas for consideration and examples of existing policies and best practices. The toolkit also includes a small collection of case studies to highlight the successful efforts of BYOD pilots or programs at several government agencies. The Digital Government Strategy, issued by Federal Chief Information Officer (CIO) Steven VanRoekel on May 23, 2012, called for the establishment of a Digital Services Advisory Group (Advisory Group) to promote cross-agency sharing and accelerated adoption of mobile workforce solutions and best practices in the development and
Constitution Day - an opportunity for Internet law education
September 17 is Constitution Day/Citizenship Day, commemorating the September 17, 1787, signing of the U.S.
Proposed Rule to Safeguard Contractor Information Systems Impact on Higher Education
The General Services Administration (GSA), Department of Defense (DoD), and National Aeronautics and Space Administration (NASA) have issued a Proposed Rule that would enhance the cybersecurity of government information held by contractors, including colleges and universities. The proposal would amend the Federal Acquisition Regulation (FAR) to add a new subpart and contract clause for the basic safeguarding of contractor information systems that contain information provided by or generated for the Government (other than public information) that will be resident on or transiting through contractor information systems.
The rule proposes that contractors provide “protective measures to information” and identifies the following areas for attention:
What will be the Impact of the National Election on Higher Education?
All eyes in Washington, D.C., are now firmly focused on the national election in the weeks leading up to November 6th. We asked representatives of higher education associations for their perspectives on the impact of the election on higher education. The results of those interviews are shared in this video.
The 2012 Republican National Convention will kick-off on August 27-30 in Tampa, Florida. Republican presidential candidate Mitt Romney is hoping to reclaim The White House for his party, regain control of the U.S. Senate, and maintain the Republican majority in the U.S. House of Representatives.
Cybersecurity Legislation Falters in the Senate
Congress has left for a five week summer recess without agreeing up a cybersecurity legislative package that would protect critical infrastructure and promote information sharing. After three days of debate on the Senate floor and a vote along partisan lines, the Senate rejected a motion that would have ended a filibuster led by Sen. John McCain (R-Ariz) on its version of cybersecurity legislation, S. 3414: The Cybersecurity Act of 2012.
Cybersecurity Legislation Falters in the Senate
Congress has left for a five week summer recess without agreeing up a cybersecurity legislative package that would protect critical infrastructure and promote information sharing. After three days of debate on the Senate floor and a vote along partisan lines, the Senate rejected a motion that would have ended a filibuster led by Sen. John McCain (R-Ariz) on its version of cybersecurity legislation, S. 3414.
Science and Technology Policy Priorities Emphasize Big Data and Cybersecurity
A memorandum from the heads of the Office of Management and Budget (OMB) and Office of Science and Technology Policy (OSTP) outlines the Administration’s multi-agency science and technology priorities that should guide FY2014 budget submissions from executive departments and agencies. “Scientific discovery, technological breakthroughs, and innovation are the primary engines for expanding the frontiers of human knowledge and are vital for responding to the challenges and opportunities of the 21st century,” writes the directors of the OMB and OSTP.
Senate Majority Leader Reid Pledges to Bring Cybersecurity Legislation to Senate Floor in July
Senate Majority Leader Harry Reid announced this week that he plans to bring a comprehensive cybersecurity bill to the Senate floor in July. The House of Representatives approved its version of cybersecurity legislation in April (see "House Declares Cybersecurity Week with Introduction of Four Cybersecurity Bills").
2012 Top Ten IT Issues Reflect Privacy, Security, and Compliance Challenges
The EDUCAUSE IT Issues Panel and the staff of EDUCAUSE Data, Research, and Analytics have published the Top Ten IT Issues for 2012. According to an article published in EDUCAUSE Review, this year’s results reflected a change of methodology “in response to perceptions that the top issues were at risk of becoming a stale recycling of the same fifteen or so issues”. Although the 2012 list is significantly different from prior years, it continues the tradition of providing an insightful outlook into the most pressing issues in the world of higher education information technology.