-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (2)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (50)
- Books and Monographs (1)
- Certification, Education, Training and Tutorials (1)
- Effective Practices (3)
- Government Documents, Laws, Testimonies or Reports (1)
- Plans and Guidelines (3)
- Policies and Procedures (2)
- Presentations and Seminars (72)
- RFPs (1)
- Surveys (3)
- Tools (4)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Incident Handling and Response [x]
- Cybersecurity (145)
- Security Management (145)
- Policy and Law (55)
- Data Security (42)
- Information Technology Management and Leadership (40)
- Federal Policy and Law (37)
- Network Security and Applications (35)
- Campus Policies (30)
- Campus Policy and Law (30)
- Cybersecurity Policy (28)
- Security Policies (28)
- Security Risk Assessment and Analysis (28)
- Intrusion Detection and Prevention (23)
- Security Awareness (22)
- Security Planning (16)
- Planning (15)
- Institutional Management (13)
- Business Continuity (12)
- IT Governance (11)
EDUCAUSE Library Items for Incident Handling and Response
-
Incident Management and Response Checklist
-
May 6, 2013
Rather than waiting for a data breach to happen, consider using an incident checklist to establish a campus incident response team, review your institution's readiness, and develop (or a…
-
Breaches and a Lawsuit: An Institution's Road to Recovery
-
April 17, 2013
|
A session at the Security Professionals Conference
As a result of its breaches and a class action lawsuit, the University of Hawaii has undertaken extensive actions to transform its information security landscape. We will describe the timeline of…
-
When to Declare an Information Security Incident and How to Respond Once You Do
-
April 16, 2013
|
A session at the Security Professionals Conference
This discussion session will examine the incident response process and apply it to a sanitized version of an actual web server compromise that took place at a real university. After an initial over…
-
Podcast: Larry Conrad on IT Security Then and Now
-
July 17, 2012
Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technolo…
-
Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limi…
-
A Day at the Breach
-
March 13, 2012
|
A session at the NERCOMP Annual Conference 2012
It's August 10 at the University of Wisconsin–Milwaukee and the school is not contemplating how to spend a day at the beach. Instead, they are informing approximately 75,000 individuals asso…
-
The 3 Rs of Responding to a Major Data Breach
-
March 26, 2012
|
A session at the EDUCAUSE Midwest Regional Conference 2012
Responding to a major data breach is an activity that none of us would welcome, yet many feel that having a data breach is not a matter of "if," but "when." In 2011, our campus …
-
Catch a clue from an EDU: Universities that get security right
-
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In these da…
-
Data Breach Notification: Discussing Reactive Processes and Proactive Strategies
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
Data security and privacy are focal points in many institutions' information security programs. There is a complex set of legal and regulatory frameworks for protecting data that we are entrus…
-
PaIRS/Bayesian IDS: Finding Bad Actors Without Looking at Content
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
The Columbia PaIRS (point of contact and incident response system) IDS was developed to facilitate the protection of the network from compromised machines, taking into account the totally decentral…

















