-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (2)
- Blogs (2)
- Articles, Briefs, Papers, and Reports (50)
- Books and Monographs (1)
- Certification, Education, Training and Tutorials (1)
- Effective Practices (3)
- Government Documents, Laws, Testimonies or Reports (1)
- Plans and Guidelines (3)
- Policies and Procedures (2)
- Presentations and Seminars (70)
- RFPs (1)
- Surveys (3)
- Tools (4)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Incident Handling and Response [x]
- Cybersecurity (142)
- Security Management (142)
- Policy and Law (54)
- Data Security (41)
- Information Technology Management and Leadership (40)
- Federal Policy and Law (36)
- Network Security and Applications (35)
- Campus Policies (30)
- Campus Policy and Law (30)
- Security Policies (28)
- Security Risk Assessment and Analysis (28)
- Cybersecurity Policy (27)
- Intrusion Detection and Prevention (23)
- Security Awareness (22)
- Planning (15)
- Security Planning (15)
- Institutional Management (13)
- Business Continuity (12)
- IT Governance (11)
EDUCAUSE Library Items for Incident Handling and Response
-
Podcast: Larry Conrad on IT Security Then and Now
-
July 17, 2012
Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technolo…
-
Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limi…
-
A Day at the Breach
-
March 13, 2012
|
A session at the NERCOMP Annual Conference 2012
It's August 10 at the University of Wisconsin–Milwaukee and the school is not contemplating how to spend a day at the beach. Instead, they are informing approximately 75,000 individuals asso…
-
The 3 Rs of Responding to a Major Data Breach
-
March 26, 2012
|
A session at the EDUCAUSE Midwest Regional Conference 2012
Responding to a major data breach is an activity that none of us would welcome, yet many feel that having a data breach is not a matter of "if," but "when." In 2011, our campus …
-
Catch a clue from an EDU: Universities that get security right
-
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In these da…
-
Data Breach Notification: Discussing Reactive Processes and Proactive Strategies
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
Data security and privacy are focal points in many institutions' information security programs. There is a complex set of legal and regulatory frameworks for protecting data that we are entrus…
-
PaIRS/Bayesian IDS: Finding Bad Actors Without Looking at Content
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
The Columbia PaIRS (point of contact and incident response system) IDS was developed to facilitate the protection of the network from compromised machines, taking into account the totally decentral…
-
Are You Paying Attention to the Character Behind the (Layer 7) Curtain?
-
January 12, 2011
|
A session at the Mid-Atlantic Regional Conference 2011
Many bad guys revised their attack methodology during 2010. Roughly 80% of attacks are now initiated through the web application layer 7 vulnerabilities, yet most higher ed Institutions allocate le…
-
Be Prepared
-
August 19, 2010
The first rule of incident management is to accept that you will have an incident. Use these five best practices to get your institution ready. T…
-
Cybersecurity: How safe are your data?
-
April 28, 2010
In an article in Nature , Jeffrey Perkel reports that many scientists want to keep their data and resources free; cybersecurity specialists want them under lock and key. …

















