EDUCAUSE | Security Management http://www.educause.edu/Resources/Browse/SecurityManagement/30560 en EDUCAUSE | Security Management http://www.educause.edu/Resources/Browse/SecurityManagement/30560 http://www.educause.edu/sites/all/themes/educause/images/e_rss.png Information Security Program Assessment Tool http://www.educause.edu/library/resources/information-security-program-assessment-tool <p>This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 27002 &#34;Information technology Security techniques. Code of practice for information security management.&#34; This tool was intended for use by an institution as a whole, although a unit within an institution may also use it to help determine the maturity of its individual information security program. Unless otherwise noted, it should be completed by chief information officer, chief information security officer or equivalent, or a designee. There are a total of 104 questions and on average it takes about 2 hours for an information security officer or equivalent, familiar with their environment, to complete this tool.</p><p><a href="http://www.educause.edu/library/resources/information-security-program-assessment-tool" target="_blank">read more</a></p> Mon, 15 Apr 2013 17:03:26 +0000 286235 at http://www.educause.edu Call for Participation: The Multi-Factor Authentication Cohortium http://www.educause.edu/blogs/vvogel/call-participation-multi-factor-authentication-cohortium <p>The <a href="https://spaces.internet2.edu/display/scalepriv/Scalable+Privacy">Internet2 Scalable Privacy Project (ScalePriv)</a>, funded with the recent National Strategy for Trusted Identities in Cyberspace (NSTIC) grant to <a href="http://www.internet2.edu">Internet2</a>, is seeking campuses to participate in the Multi-Factor Authentication (MFA) Cohortium*. Applications are open until April 26, 2013 (<em>note the deadline extension</em>).</p><p><a href="http://www.educause.edu/blogs/vvogel/call-participation-multi-factor-authentication-cohortium" target="_blank">read more</a></p> Wed, 20 Mar 2013 15:49:09 +0000 284860 at http://www.educause.edu An Incremental Approach to Building an Information Security Program http://www.educause.edu/ero/article/incremental-approach-building-information-security-program <ul> <li><strong>Constraints</strong> such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security <strong>pose challenges</strong> for higher education IT organizations wanting to establish <strong>a comprehensive information security program</strong>.</li> <li>An <strong>iterative approach</strong> to a security program takes advantage of <strong>regular audits</strong> to find problems and <strong>address them</strong> <strong>according to risk and priority</strong> of each lapse identified.</li> <li>The IT organization&#8217;s security program <strong>gets stronger with every audit cycle</strong>, and the approach provides a good basis for <strong>comparing past performance and measuring progress</strong>.</li></ul><p><a href="http://www.educause.edu/ero/article/incremental-approach-building-information-security-program" target="_blank">read more</a></p> Tue, 05 Mar 2013 20:59:20 +0000 283560 at http://www.educause.edu 2012 CDS Executive Summary Report http://www.educause.edu/library/resources/2012-cds-executive-summary-report <p>This report <strong>summarizes results from the EDUCAUSE Core Data Service (CDS) survey. </strong>Using a matched set of 616 CDS 2011 and CDS 2012 participating institutions, this year&#8217;s report is a detailed look at the most pertinent and interesting <strong>IT financial and staffing findings</strong>, with a <strong>high-level summary </strong>of the <strong>state of IT services</strong>.&#160;&#160; Key findings, important trends, and similarities and differences across different types of institutions are highlighted.</p><p><em>Citation for this Work:</em> Lang, Leah, and Pam Arroway. <em>2012 CDS Executive Summary Report</em>. Louisville, CO: EDUCAUSE, January 2013, available from <a href="http://www.educause.edu/coredata">http://www.educause.edu/coredata</a>.</p><p><strong>Note from EDUCAUSE, February 19, 2013: </strong>The original PDF of this report was corrupted and has been replaced. If you were unable to download the PDF, please dump your cache and try again. We apologize for any inconvenience. Thank you.</p><p><a href="http://www.educause.edu/library/resources/2012-cds-executive-summary-report" target="_blank">read more</a></p> Thu, 24 Jan 2013 15:34:52 +0000 280902 at http://www.educause.edu A Model for Today: Partnering with Industry to Enhance Institutional Information Security Capabilities http://www.educause.edu/events/security-professionals-conference/2013/model-today-partnering-industry-enhance-institutional-information-security-capa Many academic organizations are facing the same problems: an aging decentralized computing infrastructure, growing use of mobile devices, increasing use of network resources, and ever-present external threats. To keep pace with growing security risks, higher education organizations must implement state-of-the-art core security components, enabling them to understand information security risks holistically and provide support for teaching, learning, and research. Join representatives of the Rochester Institute of Technology and McAfee as they discuss their partnership and how it's helping RIT use McAfee solutions to provide countermeasures and controls to understand and defend against the current and future threats.<p><a href="http://www.educause.edu/events/security-professionals-conference/2013/model-today-partnering-industry-enhance-institutional-information-security-capa" target="_blank">read more</a></p> Sat, 12 Jan 2013 16:15:07 +0000 279944 at http://www.educause.edu ERO Video Conversation: The Relationship Between Privacy and Security http://www.educause.edu/ero/article/ero-video-conversation-relationship-between-privacy-and-security <p><a href="http://www.educause.edu/ero/article/ero-video-conversation-relationship-between-privacy-and-security" target="_blank">read more</a></p> Tue, 08 Jan 2013 17:13:46 +0000 279531 at http://www.educause.edu Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven? http://www.educause.edu/ero/article/privacy-security-and-compliance-strange-bedfellows-or-marriage-made-heaven <p>The authors examine several campus issues lying at the intersection of privacy, security, and compliance and provide insight for institutional leaders planning strategic directions.</p><p><a href="http://www.educause.edu/ero/article/privacy-security-and-compliance-strange-bedfellows-or-marriage-made-heaven" target="_blank">read more</a></p> Fri, 04 Jan 2013 18:00:24 +0000 279281 at http://www.educause.edu Creating an IT Security Baseline http://www.educause.edu/events/security-professionals-conference/2013/creating-it-security-baseline <p>The UW&#8211;Madison Office of Campus Information Security has worked with the campus community to develop a baseline information systems security standard that&#39;s intended to help departments on campus create a measurable and minimally acceptable baseline security program. The technical controls have been developed collaboratively with campus departments and vetted through various on- and off-campus groups. The baseline security standard outlines security controls all campus IT departments should implement including controls for endpoint security, access control, physical security, policy and awareness, and application security for custom web applications.</p><p><a href="http://www.educause.edu/events/security-professionals-conference/2013/creating-it-security-baseline" target="_blank">read more</a></p> Sat, 29 Dec 2012 00:03:12 +0000 278934 at http://www.educause.edu Security Smackdown: End-User Awareness Programs vs. Technology Solutions http://www.educause.edu/events/security-professionals-conference/2013/security-smackdown-end-user-awareness-programs-vs-technology-solutions How effective is end-user security awareness education? Would it be better to allocate our scarce resources to improving our technology? Two members of the same information security team at the University of Pennsylvania will square off on opposite sides: "They'll never learn and they shouldn't have to!" versus "We're only as strong as our weakest user!" In a point-counterpoint format, we will consider various types of end-user awareness tools (blogs, videos, etc.) and the sorts of problems they aim to solve. We'll debate whether we are effectively reaching our end users and if technological alternatives are within our reach that can accomplish similar ends. <p><a href="http://www.educause.edu/events/security-professionals-conference/2013/security-smackdown-end-user-awareness-programs-vs-technology-solutions" target="_blank">read more</a></p> Sat, 29 Dec 2012 00:03:09 +0000 278931 at http://www.educause.edu A Practitioner's Approach for Developing Information Security Policy http://www.educause.edu/events/enterprise-it-leadership-conference/2013/practitioners-approach-developing-information-security-policy An institution developing its information security policy by basing it on lofty ideals and stringent standards may demand far more than its staff is capable of delivering, which risks frustrating staff to the point of resistance, outright rebellion, or clandestine noncompliance. This strategy can also create a risk of legal liability, as an institution may instantly place itself out of compliance with its own documented policy. This session will outline a strategy for phasing in policy provisions, inclusive of key executive, managerial, and technical staff members, and provide a template of policies, standards, and procedures.<p><a href="http://www.educause.edu/events/enterprise-it-leadership-conference/2013/practitioners-approach-developing-information-security-policy" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:40:59 +0000 278875 at http://www.educause.edu A Practitioner's Approach for Developing Information Security Policy http://www.educause.edu/events/security-professionals-conference/2013/practitioners-approach-developing-information-security-policy An institution developing its information security policy by basing it on lofty ideals and stringent standards may demand far more than its staff is capable of delivering, which risks frustrating staff to the point of resistance, outright rebellion, or clandestine noncompliance. This strategy can also create a risk of legal liability, as an institution may instantly place itself out of compliance with its own documented policy. This session will outline a strategy for phasing in policy provisions, inclusive of key executive, managerial, and technical staff members, and provide a template of policies, standards, and procedures.<p><a href="http://www.educause.edu/events/security-professionals-conference/2013/practitioners-approach-developing-information-security-policy" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:32:21 +0000 278854 at http://www.educause.edu Practical Project Management for Security Implementation in Enterprise Systems http://www.educause.edu/events/security-professionals-conference/2013/practical-project-management-security-implementation-enterprise-systems <p>Security implementation is, or should be, a part of every enterprise system, not an add-on after the fact. One of the best ways to ensure effective IT security is to have a seat at the table throughout the life cycle of the project. Project management strategies provide a systematic approach for including the appropriate areas while assigning responsibility and accountability for projects. Join University of Wisconsin&#149;Milwaukee staff to learn how project management strategies are improving information security in enterprise systems and how to employ the same strategies at your institution.</p><p><a href="http://www.educause.edu/events/security-professionals-conference/2013/practical-project-management-security-implementation-enterprise-systems" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:32:10 +0000 278842 at http://www.educause.edu The Enemy Is Us: Doing the Work of Information Security Better http://www.educause.edu/events/security-professionals-conference/2013/enemy-us-doing-work-information-security-better <p>Within information security departments, staff often get so bogged down in &#34;getting the job done&#34; that they can never assess how they are doing their job and whether they can do anything to improve the quality and efficiency of their work. If you&#39;re part of an information security group, this presentation will help you evaluate how things get done, figure out how to make policies and regulations work for you, teach you new techniques for getting a better sense of the problem, and help you set up relationships that can assist any group with achieving its goals.</p><p><a href="http://www.educause.edu/events/security-professionals-conference/2013/enemy-us-doing-work-information-security-better" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:32:07 +0000 278838 at http://www.educause.edu A Pragmatic Information Security Program for Small Institutions http://www.educause.edu/events/security-professionals-conference/2013/pragmatic-information-security-program-small-institutions When no one has "information security" in their job title, how can a small institution develop (and maintain) a reasonable IT security profile? An institution's information security profile is increasingly important, and it's not just IT's problem anymore. But for smaller institutions with limited resources, effectively implementing a security program can be a real challenge. The goal of this session is to provide those who have ownership of information security oversight with a pathway to implement a security program with controls that are reasonable, sustainable, comprehensive, and effective&#8212;and with resources that probably aren't tagged just for security.<p><a href="http://www.educause.edu/events/security-professionals-conference/2013/pragmatic-information-security-program-small-institutions" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:02:18 +0000 278826 at http://www.educause.edu IT Service Metrics 101 http://www.educause.edu/ero/article/it-service-metrics-101 <ul> <li>These guidelines to service metrics explain <strong>what to measure </strong>and<strong> how, when, and why</strong> to measure it.</li> <li><strong>Trends</strong> <strong>reveal the most</strong> about services and performance, alerting an IT department to problems as they develop or to success in their service delivery efforts.</li> <li><strong>Service subscription rates and customer surveys</strong> provide the <strong>best metrics for identifying trends</strong> because the only way to know what customers think about your organization&#39;s ability to deliver services is to ask them.</li> <li>Do <em>not</em> gather a bunch of metric data just because you can &#8212; <strong>start with high-level service goals</strong> and then <strong>identify the metrics</strong> that can help gauge <strong>how well those goals are being met</strong>.</li></ul><p><a href="http://www.educause.edu/ero/article/it-service-metrics-101" target="_blank">read more</a></p> Thu, 13 Dec 2012 18:35:26 +0000 278168 at http://www.educause.edu Bootstrapping IT Security http://www.educause.edu/nercomp-annual-conference/2013/bootstrapping-it-security This session will cover the history of the Brown Security Round Table, the benefits of this committee, and lessons learned. Come and talk to some of the founding members of this committee to learn how we are expanding security coverage without expanding resources. Learn how the committee provides great value and an excellent opportunity for cross-pollination, and why we believe it will help us innovate in this area into the future. Get a leg up by taking away our best practices and skip over the bumps we encountered when we got started.<p><a href="http://www.educause.edu/nercomp-annual-conference/2013/bootstrapping-it-security" target="_blank">read more</a></p> Tue, 11 Dec 2012 01:29:53 +0000 277939 at http://www.educause.edu Advice from Lance Spitzner on Information Security Careers http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-information-security-careers <p>I often get requests asking how to get started in information security. I can&#39;t blame people, it is an extremely exciting field. What I like most about it is that everything is so new; often there are no rules on how to do things. You make the rules up as you go along, almost like blazing a path in the wild jungle just as the explorers did hundreds of years ago.</p><p>Here are some suggestions on how to get started based on my experience. I feel these work regardless if you are an existing IT person or coming from a different field. Personally, my background was a History major that spent four years in the Army driving around in tanks, so if you have the passion anyone can get started in this field.</p><p><a href="http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-information-security-careers" target="_blank">read more</a></p> Mon, 29 Oct 2012 19:46:59 +0000 274671 at http://www.educause.edu Advice from Lance Spitzner on Cybersecurity Careers http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-cybersecurity-careers <p>I often get requests asking how to get started in information security. I can&#39;t blame people, it is an extremely exciting field. What I like most about it is that everything is so new; often there are no rules on how to do things. You make the rules up as you go along, almost like blazing a path in the wild jungle just as the explorers did hundreds of years ago.</p><p>Here are some suggestions on how to get started based on my experience. I feel these work regardless if you are an existing IT person or coming from a different field. Personally, my background was a History major that spent four years in the Army driving around in tanks, so if you have the passion anyone can get started in this field.</p><p><a href="http://www.educause.edu/blogs/lspitzner/advice-lance-spitzner-cybersecurity-careers" target="_blank">read more</a></p> Mon, 29 Oct 2012 19:45:51 +0000 274670 at http://www.educause.edu EDUCAUSE Core Data Service 2012 Almanacs http://www.educause.edu/library/resources/educause-core-data-service-2012-almanacs <p>These two-page, easy-to-scan summaries distill CDS data in a variety of categories that include IT Financing, IT Staffing, Support Services, and many other service areas.</p><ul> <li><a href="http://net.educause.edu/ir/library/pdf/CDA1201.pdf" title="All Non-Specialized U.S. Institutions">All Non-Specialized U.S. Institutions</a></li> <li><a href="http://net.educause.edu/ir/library/pdf/CDA1202.pdf" title="Associate's Colleges (AA)">Associate&#39;s Colleges (AA)</a></li> <li><a href="http://net.educause.edu/ir/library/pdf/CDA1203.pdf" title="Baccalaureate Colleges-General (BA GEN)">Baccalaureate Colleges (BA)</a></li> <li><a href="http://net.educause.edu/ir/library/pdf/CDA1204.pdf" title="Master's Institutions (MA I and MA II)">Master&#39;s Institutions (MA I and MA II)</a></li> <li><a href="http://net.educause.edu/ir/library/pdf/CDA1205.pdf" title="Doctoral Institutions (DR EXT and DR INT)">Doctoral Institutions (DR EXT and DR INT)</a></li></ul><p><a href="http://www.educause.edu/library/resources/educause-core-data-service-2012-almanacs" target="_blank">read more</a></p> Thu, 25 Oct 2012 19:39:40 +0000 274334 at http://www.educause.edu Security and Privacy Sessions at EDUCAUSE 2012 http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012 <p>The <a href="http://www.educause.edu/annual-conference/2012">annual EDUCAUSE Conference</a> (November 6-9) offers a variety of <a href="http://www.educause.edu/annual-conference/agenda-and-program/search?filters=tid%3A44961">security and privacy-related sessions</a>. Whether you plan to join us in Denver or participate online, we encourage you to attend as many of these presentations as possible. Also remember to mark your calendar for the upcoming <a href="http://www.educause.edu/events/security-professionals-conference">Security Professionals Conference</a>, which will be held April 15-17, 2013 in St. Louis, Missouri, and Online. A <a href="http://www.educause.edu/events/security-professionals-conference/call-proposals">Call for Proposals </a>is currently out, with a November 13, 2012 deadline.</p><h4><em><strong>Tuesday, November 6, 2012</strong></em></h4><p><strong>Preconference Seminars (<em>separate registration required</em>)</strong></p><p><a href="http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012" target="_blank">read more</a></p> Tue, 16 Oct 2012 19:47:48 +0000 273154 at http://www.educause.edu The Real Reason the Human is the Weakest Link http://www.educause.edu/blogs/lspitzner/real-reason-human-weakest-link <p>Computers and mobile devices store, process, and transfer highly valuable information. As a result, your organization most likely invests a great deal of resources to protect them. Protect the end point and you protect the information. Humans also store, process, and transfer information. Employees are in many ways another operating system -- the HumanOS. Yet if you compare how much organizations invest in securing people compared to computers and mobile devices, you would be stunned at the difference. Let&#39;s take a look. Organizations typically invest the following in protecting an end device, including:</p><p><a href="http://www.educause.edu/blogs/lspitzner/real-reason-human-weakest-link" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/ncsam-sans-blog-sm.jpg">ncsam-sans-blog-sm.jpg</a></fieldset> Mon, 15 Oct 2012 14:35:29 +0000 272909 at http://www.educause.edu Security Awareness and Communication in the C-Suite http://www.educause.edu/library/resources/security-awareness-and-communication-c-suite <p>Drawing on more than 30 years of global experience, Dave Cullinane will share challenges that CISOs face while in the C-suite. This session will focus on how to <strong>advance executive understanding and awareness</strong> of recent challenges such as<strong> cloud security, privacy, compliance, BYOD, enterprise risk management</strong>, and other issues currently faced by campuses.</p><p>This webinar is part of National Cyber Security Awareness Month. Find out how you can participate in activities like this one throughout the month. <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-initiative">Learn more &#62;&#62;</a></p><p><a href="http://www.educause.edu/library/resources/security-awareness-and-communication-c-suite" target="_blank">read more</a></p> Thu, 04 Oct 2012 15:52:43 +0000 271831 at http://www.educause.edu Security Awareness on Social Media http://www.educause.edu/blogs/lspitzner/security-awareness-social-media <p>Social media is one of the fastest growing areas of online activity, and one of the fastest growing areas for malicious cyber activity. Even if your organization blocks access to social media sites, there are a tremendous number of risks you have to make your faculty, staff and students aware of. Here are some of the key points we recommend in any awareness program concerning social media sites.</p><p><a href="http://www.educause.edu/blogs/lspitzner/security-awareness-social-media" target="_blank">read more</a></p> Mon, 01 Oct 2012 14:23:38 +0000 271369 at http://www.educause.edu National Cyber Security Awareness Month http://www.educause.edu/ero/article/national-cyber-security-awareness-month <p>National Cyber Security Awareness Month, held each October, is the perfect time to raise awareness among students, faculty, staff, and administrators about ways they can be safer and more secure online. No one person, company, or agency is responsible for the security of the Internet; everyone must do his or her part. <em>Cybersecurity is our shared responsibility.</em></p><p><a href="http://www.educause.edu/ero/article/national-cyber-security-awareness-month" target="_blank">read more</a></p> Fri, 17 Aug 2012 21:35:40 +0000 267902 at http://www.educause.edu Prepare for National Cyber Security Awareness Month http://www.educause.edu/blogs/vvogel/prepare-national-cyber-security-awareness-month <h5><strong><em>Two Easy Ways to Increase Awareness</em></strong></h5><p>October is National Cyber Security Awareness Month (NCSAM). Below are two easy ways to increase information security awareness on your campus.</p><p><a href="http://www.educause.edu/blogs/vvogel/prepare-national-cyber-security-awareness-month" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/HEISC_FaceBookBanner2.jpg">HEISC_FaceBookBanner2.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/twitterBG.jpg">twitterBG.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/NCSAM%20logo.jpg">NCSAM logo.jpg</a></fieldset> Wed, 08 Aug 2012 20:00:04 +0000 267409 at http://www.educause.edu