-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (144)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (296)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (494)
- Security Management (270)
- Policy and Law (103)
- Identity and Access Management (97)
- Intrusion Detection and Prevention (87)
- Networking and Emerging Technologies (83)
- Information Technology Management and Leadership (75)
- Federal Policy and Law (74)
- Data Security (69)
- Authentication (57)
- Security Risk Assessment and Analysis (48)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (39)
- Firewalls (38)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
Catch a clue from an EDU: Universities that get security right
-
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In these da…
-
Identity Management in Higher Education, 2011—Roadmap
-
June 1, 2011
This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…
-
Identity Management in Higher Education, 2011 Report
-
June 1, 2011
Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…
-
The Titan Cloud: CSU Fullerton's Virtual Computing Infrastructure Implementation
-
October 21, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
How do you go about enabling your faculty, students, and staff to access your enterprise software anytime, anywhere? For California State University, Fullerton, the answer was to utilize the Apache…
-
Do They Measure Up? Assessing the Security Posture of Third-Party Service Providers
-
October 21, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
Institutions are increasingly gaining efficiencies and reducing costs by using third parties to host institution-owned data. How do we assess incremental risk of this approach? How can we ensure ad…
-
There's a Party in Security and Everyone's Invited
-
October 21, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
The increase of security threats on campuses and the tightening of budgets require IT security programs to get creative. How do you balance the reactive work with the proactive initiatives? The Uni…
-
Reducing the Cost of PCI Compliance
-
October 20, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
Credit card payments are prevalent throughout university campuses and websites. Achieving PCI compliance is aggravated by the scope-related complexities of a typical cyberinfrastructure. This ses…
-
New Architectural Models for Central Academic Tools and Services
-
October 20, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
This session will present an emerging architecture to seamlessly deliver best-in-breed enterprise academic technology tools unifying core utilities, front-end functionality, cross-application group…
-
7 Things You Should Know About IPv6
-
April 20, 2011
The rapid expansion in the use of the Internet, coupled with explosive growth in the number of devices that access it, has prompted development of a new protocol, IPv6. Apart from adding subs…
-
Application Security for Management, Project Managers, and Architects
-
March 25, 2011
Although Web application security is gradually improving, many project leaders, vendors, and programmers are still unaware of vulnerabilities that can expose confidential institutional data, allo…

















