-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Intrusion Detection and Prevention [x]
- Cybersecurity (87)
- Network Security and Applications (87)
- Security Management (65)
- Incident Handling and Response (23)
- Data Security (21)
- Security Risk Assessment and Analysis (14)
- Policy and Law (12)
- Security Awareness (12)
- Firewalls (11)
- Information Technology Management and Leadership (11)
- Security Architecture (10)
- Security Planning (10)
- Network Vulnerability Assessment (9)
- Networking and Emerging Technologies (9)
- Federal Policy and Law (8)
- Information Systems and Services (8)
- Identity and Access Management (7)
- Security Implementation (7)
- Vulnerability Scanning (7)
EDUCAUSE Library Items for Intrusion Detection and Prevention
-
2012 Planning Guide: Identity and Privacy
-
December 12, 2011
After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continui…
-
A Gentle Introduction to Bro
-
April 4, 2011
For years, organizations with large networks and highly skilled computer security incident response teams have struggled to detect many intruders or even understand their own networks. The tools av…
-
Raising Awareness of Website Vulnerability: How to Protect Your University's Site from Threats
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
As universities make the complete transition to a web-based interface, they must be aware of the constantly evolving strategies and attacks of hackers looking to exploit vulnerable websites. The im…
-
The Evolution of SES, REN-ISAC's Security Event System
-
April 6, 2011
|
A session at the Security Professionals Conference 2011
The REN-ISAC has developed and implemented the Security Event System (SES) within the REN-ISAC community. SES facilitates the sharing and correlation of operational threat data among institutions a…
-
Seminar 01A - Our Shared Risk, Our Shared Responsibility: Learning to Prevent Confidential Data Loss PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
The information security team at Texas State University has embarked on a strategic initiative to prevent confidential data leakage through a combination of endpoint protection, data loss preventio…
-
Phishing Technical Controls: Beyond Proofpoint
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
As phish attacks increase in sophistication, a focused technical arsenal to combat them is necessary. We will share an innovative, cost-free preventative control that can identify a phish-related U…
-
Seminar 02P - Malware Detection and Mitigation with Passive DNS and Blackhole DNS PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
Modern malware is now highly reliant on DNS systems to coordinate communications between infected clients and controlling servers. This dependency can be exploited to detect and mitigate infections…
-
Sensitive Data and Public Systems: Free Tools and Tactical Approaches to Reduce Information Exposure Risk
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
The growing number of public-facing university systems also leads to increased risk of potential disclosure of sensitive information. This session will explore pragmatic, technical approaches secur…
-
Seminar 01A - IT Security in Higher Education: Prepare, Prevent, Protect-It's Everyone's Responsibility! PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
March 28, 2011
|
A session at the NERCOMP Annual Conference 2011
This seminar will be presented by a group of information security experts who will discuss the four basic components of security: prevention, detection, response and recovery. Prevention is the are…
-
How Secure Is Your Information?
-
March 30, 2011
|
A session at the NERCOMP Annual Conference 2011
This dynamic session will provide a brief overview of the information security standards institutions must comply with in order to provide data security. The program will include some live demonstr…

















