-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (82)
- Network Security and Applications (82)
- Security Management (60)
- Incident Handling and Response (23)
- Data Security (19)
- Security Risk Assessment and Analysis (13)
- Security Awareness (12)
- Policy and Law (11)
- Firewalls (10)
- Information Technology Management and Leadership (9)
- Networking and Emerging Technologies (9)
- Security Architecture (9)
- Security Planning (9)
- Network Vulnerability Assessment (8)
- Federal Policy and Law (7)
- Identity and Access Management (7)
- Information Systems and Services (7)
- Security Implementation (6)
- Vulnerability Scanning (6)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
Data Custodians, It's 11 p.m.: Do You Know Where Your Confidential Data Is?
-
March 20, 2013
|
A session at the Midwest Regional Conference
Many campuses find that the proliferation and continued storage of confidential data on desktop and laptop computers to be one of their top security risks. In combination with policy and awareness …
-
Can Big Data Help Universities Tackle Security, BYOD?
-
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
-
Podcast: Larry Conrad on IT Security Then and Now
-
July 17, 2012
Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technolo…
-
Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and…
-
Tools and Methods for Managing Snort Sensors in Distributed Environments
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Intrusion Detection Systems are a valuable component of a security monitoring program; however, they can be expensive to operate, both in terms of equipment/licensing costs and person hours. By mak…
-
2012 Planning Guide: Identity and Privacy
-
December 12, 2011
After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continui…
-
A Gentle Introduction to Bro
-
April 4, 2011
For years, organizations with large networks and highly skilled computer security incident response teams have struggled to detect many intruders or even understand their own networks. The tools av…
-
Raising Awareness of Website Vulnerability: How to Protect Your University's Site from Threats
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
As universities make the complete transition to a web-based interface, they must be aware of the constantly evolving strategies and attacks of hackers looking to exploit vulnerable websites. The im…
-
The Evolution of SES, REN-ISAC's Security Event System
-
April 6, 2011
|
A session at the Security Professionals Conference 2011
The REN-ISAC has developed and implemented the Security Event System (SES) within the REN-ISAC community. SES facilitates the sharing and correlation of operational threat data among institutions a…
-
Seminar 01A - Our Shared Risk, Our Shared Responsibility: Learning to Prevent Confidential Data Loss PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
The information security team at Texas State University has embarked on a strategic initiative to prevent confidential data leakage through a combination of endpoint protection, data loss preventio…

















