-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (142)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (292)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (488)
- Security Management (264)
- Policy and Law (102)
- Identity and Access Management (97)
- Networking and Emerging Technologies (83)
- Intrusion Detection and Prevention (82)
- Federal Policy and Law (73)
- Information Technology Management and Leadership (73)
- Data Security (67)
- Authentication (57)
- Security Risk Assessment and Analysis (47)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (38)
- Firewalls (37)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
Seminar 01A - Our Shared Risk, Our Shared Responsibility: Learning to Prevent Confidential Data Loss PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
The information security team at Texas State University has embarked on a strategic initiative to prevent confidential data leakage through a combination of endpoint protection, data loss preventio…
-
PaIRS/Bayesian IDS: Finding Bad Actors Without Looking at Content
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
The Columbia PaIRS (point of contact and incident response system) IDS was developed to facilitate the protection of the network from compromised machines, taking into account the totally decentral…
-
Application Security in the Cloud
-
April 6, 2011
|
A session at the Security Professionals Conference 2011
Institutions are interested in applications in the cloud due to the "miracle of marginal cost." While offloading maintenance to the cloud provider and the elasticity of applications in th…
-
Phishing Technical Controls: Beyond Proofpoint
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
As phish attacks increase in sophistication, a focused technical arsenal to combat them is necessary. We will share an innovative, cost-free preventative control that can identify a phish-related U…
-
Seminar 02P - Malware Detection and Mitigation with Passive DNS and Blackhole DNS PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
Modern malware is now highly reliant on DNS systems to coordinate communications between infected clients and controlling servers. This dependency can be exploited to detect and mitigate infections…
-
Sensitive Data and Public Systems: Free Tools and Tactical Approaches to Reduce Information Exposure Risk
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
The growing number of public-facing university systems also leads to increased risk of potential disclosure of sensitive information. This session will explore pragmatic, technical approaches secur…
-
Seminar 01A - IT Security in Higher Education: Prepare, Prevent, Protect-It's Everyone's Responsibility! PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
March 28, 2011
|
A session at the NERCOMP Annual Conference 2011
This seminar will be presented by a group of information security experts who will discuss the four basic components of security: prevention, detection, response and recovery. Prevention is the are…
-
How Secure Is Your Information?
-
March 30, 2011
|
A session at the NERCOMP Annual Conference 2011
This dynamic session will provide a brief overview of the information security standards institutions must comply with in order to provide data security. The program will include some live demonstr…
-
Gone Phishing at Wayne State University: Protecting Your Inbox with Zimbra
-
March 16, 2010
|
A session at the EDUCAUSE Midwest Regional Conference 2010
Wayne State University has successfully minimized risks associated with phishing attacks by integrating the Zimbra ZCS anti-phishing Zimlet and other techniques with its existing technology to incr…
-
Using ERP Security to Work Toward a Common Goal
-
February 23, 2011
|
A session at the EDUCAUSE West/Southwest Regional Conference 2011
ERP systems holding confidential student and employee data have become the cornerstone of business processes in higher education. The sheer complexity and heavy integration of these systems into co…

















