-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (2)
- Blogs (2)
- Articles, Briefs, Papers, and Reports (50)
- Books and Monographs (1)
- Certification, Education, Training and Tutorials (1)
- Effective Practices (3)
- Government Documents, Laws, Testimonies or Reports (1)
- Plans and Guidelines (3)
- Policies and Procedures (2)
- Presentations and Seminars (70)
- RFPs (1)
- Surveys (3)
- Tools (4)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Incident Handling and Response [x]
- Cybersecurity (142)
- Security Management (142)
- Policy and Law (54)
- Data Security (41)
- Information Technology Management and Leadership (40)
- Federal Policy and Law (36)
- Network Security and Applications (35)
- Campus Policies (30)
- Campus Policy and Law (30)
- Security Policies (28)
- Security Risk Assessment and Analysis (28)
- Cybersecurity Policy (27)
- Intrusion Detection and Prevention (23)
- Security Awareness (22)
- Planning (15)
- Security Planning (15)
- Institutional Management (13)
- Business Continuity (12)
- IT Governance (11)
EDUCAUSE Library Items for Incident Handling and Response
-
E-Discovery and Fraud/Abuse Details
-
April 14, 2010
|
A session at the Security 2010
The VA Tech IT Security Office has created disk images for e-discovery and internal audit fraud and abuse investigations. This talk discusses the strategies, tools, forms, and procedures the office…
-
Effective Incident Response Strategies for Managing Sensitive Data Incidents
-
March 10, 2010
|
A session at the NERCOMP Annual Conference 2010
In 2009, MIT's Data Incident Response Team (DIRT) experienced a surge of reports of suspected sensitive data exposure incidents. As awareness of the new Massachusetts Data Breach Notification …
-
Compliance Matrix Poster for IT & Compliance Professionals
-
March 17, 2010
This matrix poster developed by Symantec outlines IT Controls for security and privacy concerns related to regulatory compliance in the workplace. Topics addressed in this poster include: Regu…
-
RFP Template for Information Security Projects
-
November 10, 2009
This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations sho…
-
At Least It Wasn’t a Football Weekend: The Notre Dame Tunnel Fire
-
October 6, 2009
This ECAR research bulletin discusses how the University of Notre Dame created and refined its incident response plan, how the utility tunnel fire of August 28, 2009, played out within that fram…
-
Incident Management
-
November 4, 2009
In this unique, online-only session, discuss emerging issues around incident management. In this unique, online-only session, discuss emerging issues …
-
Collaborative Cybersecurity Response
-
November 5, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
Three universities signed a memorandum of understanding to prepare and respond to large-scale cyberthreats. This presentation will discuss the opportunities that present themselves when one institu…
-
Securing Institutional Data: Let’s Make It Everyone’s Business
-
May 5, 2009
This ECAR research bulletin discusses the costs of preventing data loss in terms of people, processes, and technology. It focuses on principles to guide decision making in higher education and …
-
Improving Security Event Correlation and Analysis Using Intelligent Agents
-
April 22, 2009
|
A session at the Security 2009
Attacks on computer resources are security events that are more complex and difficult to quickly and effectively collect, analyze, and respond to. This presentation will explain how the use of inte…
-
REN-ISAC and CSI2—The Security Event System
-
April 22, 2009
|
A session at the Security 2009
The REN-ISAC in partnership with the Internet2 SALSA CSI2 Working Group has identified clear benefit in the sharing and correlation of security event data among institutions and organizations parti…

















