-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Implementation [x]
- Cybersecurity (103)
- Security Management (103)
- Security Planning (42)
- Network Security and Applications (28)
- Policy and Law (27)
- Information Technology Management and Leadership (25)
- Campus Policy and Law (20)
- Security Risk Assessment and Analysis (20)
- Campus Policies (17)
- Data Security (17)
- Security Awareness (16)
- Security Policies (15)
- Federal Policy and Law (11)
- Cybersecurity Policy (8)
- Identity and Access Management (8)
- Networking and Emerging Technologies (8)
- Information Systems and Services (7)
- Intrusion Detection and Prevention (7)
- Security Architecture (7)
EDUCAUSE Library Items for Security Implementation
-
Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
-
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
-
An Incremental Approach to Building an Information Security Program
-
April 1, 2013
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…
-
A Model for Today: Partnering with Industry to Enhance Institutional Information Security Capabilities
-
April 16, 2013
|
A session at the Security Professionals Conference
Many academic organizations are facing the same problems: an aging decentralized computing infrastructure, growing use of mobile devices, increasing use of network resources, and ever-present exter…
-
Administration of Data Loss Prevention Services in Higher Education
-
April 16, 2013
|
A session at the Security Professionals Conference
This presentation will examine the challenges, shortcomings, potential solutions, and areas for improvement in deploying and administering a data loss prevention (DLP) tool in a highly distributed …
-
A Practitioner's Approach for Developing Information Security Policy
-
April 17, 2013
|
A session at the Security Professionals Conference
An institution developing its information security policy by basing it on lofty ideals and stringent standards may demand far more than its staff is capable of delivering, which risks frustrating s…
-
Practical Project Management for Security Implementation in Enterprise Systems
-
April 17, 2013
|
A session at the Security Professionals Conference
Security implementation is, or should be, a part of every enterprise system, not an add-on after the fact. One of the best ways to ensure effective IT security is to have a seat at the table throug…
-
A Pragmatic Information Security Program for Small Institutions
-
April 16, 2013
|
A session at the Security Professionals Conference
When no one has "information security" in their job title, how can a small institution develop (and maintain) a reasonable IT security profile? An institution's information security …
-
Network Segmentation: Virtual Routing Implementation
-
April 6, 2011
|
A session at the Security Professionals Conference 2011
Virtual routing and forwarding (VRF) concepts have been around for a number of years, primarily directed at major ISPs for providing dedicated network connectivity for various clients over a divers…
-
There's a Party in Security and Everyone's Invited
-
February 22, 2011
|
A session at the EDUCAUSE West/Southwest Regional Conference 2011
The increase of security threats on campuses and the tightening of budgets require IT security programs to get creative. How can IT security programs provide the most value to campus? How do you ba…
-
Implementing Google Apps for Faculty and Staff
-
October 19, 2010
This ECAR research bulletin explains how Boise State University addressed important concerns about security and strategic alignment in finalizing its decision to move to Google Apps for Educatio…

















