Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
DHS on the Administration's Cybersecurity Legislative Proposal
U.S. Department of Homeland Security (DHS) Deputy Secretary Jane Holl Lute recently addressed the administration's Cybersecurity Legislative Proposal in a blog post, stating that "President Obama has proposed legislation that would give [DHS] the tools to execute [their] cybersecurity mission more effectively. This legislative proposal focuses on clarifying authorities, collaborating with the private sector, and driving measurable progress and outcomes. The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to [their] private sector and state, local, tribal, and territorial government partners. At the same time, it includes important safeguards to protect the privacy and civil liberties of the American public."
February 8 IAM Online: Policy & Privacy Considerations in a Federated World
Tune in to the next IAM Online, which will take place Wednesday, February 8, 2012, at 3 p.m. EST, to learn more about "Policy and Privacy Considerations for Identity and Access Management in a Federated World" with speakers Steven Carmody (Brown University) and Ken Klingenstein (Internet2). Rodney Petersen (EDUCAUSE) will moderate this discussion. For more details, or to access archived sessions, visit http://www.incommon.org/iamonline.
InCommon Affiliates Workshop - January 24, 2012
Join an informational workshop with InCommon affiliates on January 24, 2012, at the UMBC Technology Center. All five InCommon affiliates, AegisUSA, Fischer International, Gluu, Microsoft, and Unicon will present their identity management solutions and services and will be available for in-depth discussions in break-out sessions. Learn more about these InCommon affiliates. In addition, Khalil Yazdi from Internet2 will provide an update on NET+ Services.
Audience: IT management, policy, and identity management practitioners from Maryland's community colleges, independent colleges and universities, public universities, K-12 institutions, and state agencies.
Date: January 24, 2012, from 8:30 a.m. - 4:00 p.m.
Data Privacy Month Campus Activities, January 2012 - What's Your Campus Doing?
Many institutions are celebrating Data Privacy Month in January. Here are just a few examples. We hope that you will be able to adapt these materials for use at your institution or that the creativity behind these activities will inspire you to host your own events or develop your own original resources! If you would like to share your efforts, please contact us.
In Honor of Data Privacy Month, Download Matt Ivester's Book at No Charge (Jan. 27-30)
In honor of Data Privacy Month, you can download Matt Ivester’s book “lol...OMG!” at no charge. The giveaway starts at 12:01 a.m. on January 27, 2012, and expires at 11:59 p.m. on January 30, 2012. Then be sure to join us on Monday, January 30 at 1 p.m. Eastern Time for a webinar with Matt Ivester (author and founder of JuicyCampus).
“lol...OMG!” provides a cautionary look at the many ways that today's students are experiencing the unanticipated negative consequences of their digital decisions from lost job opportunities and denied college and graduate school admissions to full-blown national scandals.
Make Cybersecurity Part of Your 2012 Resolutions
If you’re still looking for a New Year’s resolution, it’s not too late to join the Stop.Think.Connect.™ Campaign in setting online safety resolutions for 2012. Follow these simple steps from the United States Computer Emergency Readiness Team (US-CERT) to enhance increase your devices’ cybersecurity:
Higher Education Information Security Council Releases 2012-13 Strategic Plan
The Higher Education Information Security Council 2012-13 Strategic Plan is now available online. This strategic plan is intended to set forth a vision for the higher education information security community and provide a concise roadmap to guide the efforts of the HEISC in 2012 and 2013. If you missed the Town Hall webinar on January 9, where we discussed the council's vision, mission, goals, objectives, and current working group activities, an archived recording is now available.
Contact us if you have any questions or feedback.
January 11 IAM Online: Multi-Factor Authentication in Higher Education
Tune in to the next IAM Online, which will take place Wednesday, January 11, 2012, at 3 p.m. EST, to learn more about "Using Federated Identity for NSF- and NIH-Funded Cyberinfrastructure" with speakers Bill Barnett (Indiana University) and Von Welch (Center for Applied Cybersecurity Research, Indiana University). Tom Barton (University of Chicago) will moderate this discussion. For more details, or to access archived sessions, visit http://www.incommon.org/iamonline.
2011 ECAR Report on IdM in Higher Ed ucation Now Publicly Available
The Identity Management in Higher Education, 2011 Report is now available to the public. You may access the report (originally published June 2, 2011), along with the methodology, survey instrument, case study, and more through the ECAR research hub.
Based on its findings in Identity Management in Higher Education, 2011, ECAR offers the following recommendations:
Federal Cybersecurity R&D Strategic Plan Released, December 2011
The Office of Science and Technology Policy (OSTP) recently released Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, which defines a set of interrelated priorities for the agencies of the United States government that conduct or sponsor research and development (R&D) in cybersecurity.