Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
- Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
- Mobile Internet Device Security Guidelines
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by the Higher Education Information Security Council (HEISC).
- Ten Steps to Secure Your Mobile Device
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
- Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
- Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
- Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
- Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- 2015 Strategic Information Security Issues Infographic
April 24, 2015
Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by th…
- The Top 3 Strategic Information Security Issues
January 12, 2015
Joanna Lyn Grama is IT GRC and Cybersecurity Program Director, EDUCAUSE. Valerie Vogel is Program Manager, EDUCAUSE. Visit the EDUCAUSE top 10 IT issues web page for additional resourc…
- The Security Dilemma of Desktop Access to ERP Systems
August 11, 2014
Key Takeaways With information security shifting from the data center to the desktop , organizations must have an aggressive patch-management program — though implementing…
- Who Moved My Office? The Evolving Role of the CISO
June 19, 2014
A session at the EDUCAUSE LIVE! - Who Moved My Office? The Evolving Role of the CISO
In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined …
- Sensitive Information Is Pouring through the Floodgates
May 7, 2014
A session at the Security Professionals Conference
How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …
- Measuring the Effectiveness of Security Awareness Programs
December 10, 2013
Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…
- 8 Mobile Device Security Steps
October 1, 2013
A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps
Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …
- Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
- Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013
Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…