-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Access Control [x]
- Cybersecurity (103)
- Identity and Access Management (103)
- Security Management (31)
- Information Technology Management and Leadership (25)
- Information Systems and Services (19)
- Authentication (18)
- Network Security and Applications (16)
- Policy and Law (16)
- Authorization (13)
- Campus Policy and Law (12)
- Data Security (12)
- Networking and Emerging Technologies (12)
- Campus Policies (11)
- Privacy (10)
- Security Policies (10)
- Data Administration and Management (9)
- Federal Policy and Law (8)
- Network Applications (8)
- Middleware (6)
EDUCAUSE Library Items for Access Control
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
An Incremental Approach to Building an Information Security Program
-
April 1, 2013
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…
-
Leadership Discussion: Identity and Access Management in Higher Education
-
Wednesday, May 29, 2013 8:30am-9:30am
|
A session at the Southeast Regional Conference
Has your campus established an enterprise strategy for identity and access management? Does your IAM architecture facilitate easy migration to the cloud? Is your IAM system standards-based and inte…
-
Creating an IT Security Baseline
-
April 16, 2013
|
A session at the Security Professionals Conference
The UW–Madison Office of Campus Information Security has worked with the campus community to develop a baseline information systems security standard that's intended to help departments on…
-
7 Ways BYOD Could Get You Sued
-
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
-
Transitioning between Access Management Products: Sun to Oracle
-
November 7, 2012
|
A session at the EDUCAUSE 2012 Annual Conference
The University of Guelph converted its key systems from Sun Access Manager to Oracle Access Manager and is now finalizing the transition. While OAM is a commercial product, we will discuss a numb…
-
There's Data Lurking in Your Labs!
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Securing the research data spread across your institution is a challenge requiring robust processes of discovery, triage, and diplomacy. Almost inevitably some of your most critical research data w…
-
Protecting the Security of Research Data
-
November 8, 2011
The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…
-
Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
-
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
-
e-academy
-
October 18, 2011
With over 10 years of experience, e-academy has grown to be the global leader in software delivery solutions for the worldwide education market. Over 30,000 academic organizations in more than 100 …

















