-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (142)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (292)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (488)
- Security Management (264)
- Policy and Law (102)
- Identity and Access Management (97)
- Networking and Emerging Technologies (83)
- Intrusion Detection and Prevention (82)
- Federal Policy and Law (73)
- Information Technology Management and Leadership (73)
- Data Security (67)
- Authentication (57)
- Security Risk Assessment and Analysis (47)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (38)
- Firewalls (37)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
Encryption
-
Encryption True The HEISC Technologies, Operations, and…
-
DNSSEC
-
DNSSEC True DNSSEC (DNS Security Extensions) is a set of …
-
A Model for Today: Partnering with Industry to Enhance Institutional Information Security Capabilities
-
April 16, 2013
|
A session at the Security Professionals Conference
Many academic organizations are facing the same problems: an aging decentralized computing infrastructure, growing use of mobile devices, increasing use of network resources, and ever-present exter…
-
Creating an IT Security Baseline
-
April 16, 2013
|
A session at the Security Professionals Conference
The UW–Madison Office of Campus Information Security has worked with the campus community to develop a baseline information systems security standard that's intended to help departments on…
-
Bootstrapping IT Security
-
March 12, 2013
|
A session at the NERCOMP Annual Conference
This session will cover the history of the Brown Security Round Table, the benefits of this committee, and lessons learned. Come and talk to some of the founding members of this committee to learn …
-
Data Custodians, It's 11 p.m.: Do You Know Where Your Confidential Data Is?
-
March 20, 2013
|
A session at the Midwest Regional Conference
Many campuses find that the proliferation and continued storage of confidential data on desktop and laptop computers to be one of their top security risks. In combination with policy and awareness …
-
Can Big Data Help Universities Tackle Security, BYOD?
-
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
-
Podcast: Larry Conrad on IT Security Then and Now
-
July 17, 2012
Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technolo…
-
Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and…
-
Tools and Methods for Managing Snort Sensors in Distributed Environments
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Intrusion Detection Systems are a valuable component of a security monitoring program; however, they can be expensive to operate, both in terms of equipment/licensing costs and person hours. By mak…

















