-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (142)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (292)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (488)
- Security Management (264)
- Policy and Law (102)
- Identity and Access Management (97)
- Networking and Emerging Technologies (83)
- Intrusion Detection and Prevention (82)
- Federal Policy and Law (73)
- Information Technology Management and Leadership (73)
- Data Security (67)
- Authentication (57)
- Security Risk Assessment and Analysis (47)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (38)
- Firewalls (37)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
Tools, Techniques, and Practices: Lightning Round
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Discover the tools, techniques, and practices that are already working in higher education and how you can adapt these at your institutions. Georgia Tech—Fighting Backlinks: Identifying and …
-
DNS Sinkholing to Reduce Network Compromises
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Large university networks are often decentralized as a result of organic growth and federation between schools. These environments therefore tend to lack centralized network security controls, whic…
-
Campus-Wide Vulnerability Scanning
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Scanning a campus network for vulnerabilities and managing the results can be a tedious task. Even a moderately sized network produces too much information to process manually or without a logical …
-
Seminar 01P - How Tokenization and Point-to-Point Encryption Can Reduce Your School's PCI Scope (or Not)
-
May 15, 2012
|
A session at the Security Professionals Conference 2012
Two emerging technologies have the potential to reduce campus merchants' PCI scope while also reducing the risk of a damaging data breach: tokenization, the process whereby payment card data a…
-
2012 Planning Guide: Identity and Privacy
-
December 12, 2011
After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continui…
-
Protecting the Security of Research Data
-
November 8, 2011
The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…
-
Mobile Internet Device Security Guidelines
-
June 29, 2011
This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives…
-
DNSSEC with BIND 9.8.0
-
May 4, 2011
This blog posting gives directions for upgrading from an older version of BIND. This blog posting gives directions for upgrading from an older …
-
Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
-
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
-
Identity Management in Higher Education, 2011—Slide Presentation
-
June 1, 2011
This slide presentation illuminates findings from the ECAR 2011 research of identity management (IdM) practices in higher education . This slide deck can be adapted for presentations within…

















