Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Help Promote the 2009 Computer Security Awareness Student Poster & Video Contest
The EDUCAUSE/Internet2 Computer and Network Security Task Force, in cooperation with the ResearchChannel, is conducting its third annual contest in search of computer security awareness posters and short videos developed by college students for college students. The contest, which is co-sponsored by the National Cyber Security Alliance (NCSA) and CyberWATCH, offers cash prizes ($1,000, $800 and $400) to the winners in each of the four categories. It also provides an opportunity for students to gain experience by developing creative and effective short videos or posters. The deadline for submission of entries is April 30, 2009.
Baker College Takes First Place in the 2008 National Collegiate Cyber Defense Competition (NCCDC)
Congratulations to Baker College (Flint, Michigan) on winning the third annual National Collegiate Cyber Defense Competition! After competing for the last three years, the Baker College team finally made it past the regional level to beat the 2007 winners from Texas A&M University.
The competition is a three day event hosted by the University of Texas at San Antonio's Center for Infrastructure Assurance and Security, a cybersecurity research and education center. Students have the opportunity to test their knowledge of network infrastructure management and protection in an operational environment. The competition also provides students with a chance to interact and discuss the security and operational challenges they will face upon entering the job market.
Security Task Force Provides Briefing to CSIS Commission on Cyber Security for the 44th Presidency
The EDUCAUSE/Internet Security Task Force provided a briefing to the CSIS Commission on Cyber Security for the 44th Presidency on March 12, 2008, during the event "Improving Cybersecurity: Recommendations from Private Sector Experts". A 1-page summary of the briefing is available, as well as the complete transcript.
FireEye Joins Internet2 to Participate in High-Performance Network Security and Malware Analysis Initiatives
FireEye, Inc., a leader in global anti-botnet protection, announced that it has joined Internet2 as a corporate member. FireEye plans to collaborate with the Internet2 community on advanced network security projects involving high-performance network security and next- generation malware analysis In addition, FireEye and Internet2 will host a joint webinar titled "Botnet Incident Response" on April 2, 2008. FireEye's chief security content officer Dr. Fengmin Gong will also present "Scaling Security Analysis vs. Next-Gen Botnet Malware Using VM-Based Analysis" at the Spring Internet2 Member Meeting on April 21-23 in Arlington, Va.
New Risk Assessment Resources Available
The Security Task Force Risk Assessment Working Group wishes to inform higher education information security practioners of a few recent resource updates which are now available from the Risk Management section of the IT Security Guide.
The Information Security Risk Assessment Consultants list provides a listing of vendors known to have conducted some form of IS risk assessment for at least one higher education institution. The only way a vendor can get onto this list is to be placed there by an EDUCAUSE member institution that has engaged the consultant. Each entry on this list provides a link to the institution which has provided the vendor reference. The list can be a starting place for schools that are seeking a consultant; referencing institutions may be willing to provide additional information about the vendor and the consulting engagement when asked.
National Campus Safety and Security Project Launched
EDUCAUSE has joined with NACUBO and several other higher education associations to launch a national campus safety and security project. The project team will conduct an 18-month study that will examine threats of every nature facing colleges and universities and develop guidelines for campus emergency management plans for prevention, preparedness, response, and recovery. Mark Luker, vice president of EDUCAUSE, underscores the importance of addressing campus threats through a multi-organizational effort: "EDUCAUSE, for example, has investigated cyber security and assisted institutions in solving related problems. Expanding on our past efforts in the most meaningful way to colleges and universities requires more of an enterprise approach. We’re looking forward to this opportunity to integrate the concerns and work of EDUCAUSE with those of our partners in the higher education community who represent other components of campus life."
E07 Video & Podcast: "Bruce Schneier on Information Security: Ten Trends"
Watch the video or listen to the podcast of Bruce Schneier's recent keynote speech, "Bruce Schneier on Information Security: Ten Trends", which was delivered at the EDUCAUSE 2007 Annual Conference in Seattle, Washington on October 26, 2007.
A Security Checklist for ERP Implementations
A study of ERP security issues produced a checklist that shows institutions what to look for while letting vendors know what campuses consider important. Learn more about this in the recent EDUCAUSE Quarterly article, "A Security Checklist for ERP Implementations" by former Security Task Force co-chair Joy R. Hughes and co-author Robert Beer.
Tune In Nov. 14: Free Web Seminar on IT Security Essential Body of Knowledge for Workforce Development
The Department of Homeland Security's National Cyber Security Division worked with subject matter experts from government, the private sector, and academia to develop an umbrella framework that establishes a national baseline representing the essential knowledge and skills IT security practitioners must have to perform their jobs. The IT Security EBK builds directly on established work and is not intended to represent a standard, directive, or policy by DHS. Instead, it further clarifies key IT security terms and concepts for well-defined competencies, identifies notional security roles, and defines primary functional perspectives to help advance the IT security training and certification landscape as we strive to ensure that we have the most qualified and appropriately trained IT security workforce possible.