-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (144)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (296)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (494)
- Security Management (270)
- Policy and Law (103)
- Identity and Access Management (97)
- Intrusion Detection and Prevention (87)
- Networking and Emerging Technologies (83)
- Information Technology Management and Leadership (75)
- Federal Policy and Law (74)
- Data Security (69)
- Authentication (57)
- Security Risk Assessment and Analysis (48)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (39)
- Firewalls (38)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
2012 Planning Guide: Identity and Privacy
-
December 12, 2011
After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continui…
-
Protecting the Security of Research Data
-
November 8, 2011
The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…
-
Mobile Internet Device Security Guidelines
-
June 29, 2011
This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives…
-
DNSSEC with BIND 9.8.0
-
May 4, 2011
This blog posting gives directions for upgrading from an older version of BIND. This blog posting gives directions for upgrading from an older …
-
Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
-
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
-
Identity Management in Higher Education, 2011—Slide Presentation
-
June 1, 2011
This slide presentation illuminates findings from the ECAR 2011 research of identity management (IdM) practices in higher education . This slide deck can be adapted for presentations within…
-
Who Should Get In?
-
June 1, 2011
Back to ECAR 2011 Identity Management Research Hub This chart reflects findings from the ECAR 2011 research of identity management (…
-
Identity Management in Higher Education, 2011—Key Findings
-
June 1, 2011
This document presents the key findings from Identity Management in Higher Education, 2011. This ECAR research study illuminates findings from the 2010 survey of identity management (IdM) …
-
Federating The University of North Carolina: Origins and Benefits
-
June 1, 2011
This ECAR case study of the University of North Carolina Identity Federation explores the benefits and impacts of federated identity on the university and its 17 constituent institutions . Fe…
-
From Homegrown to the Cloud: Identity Management Evolution at Coppin State University
-
June 1, 2011
This ECAR case study offers an introductory, not highly technical, look at a SaaS identity management (IdM) solution in higher education . It traces Coppin State University’s evolution fr…

















