-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Implementation [x]
- Cybersecurity (101)
- Security Management (101)
- Security Planning (41)
- Network Security and Applications (27)
- Policy and Law (26)
- Information Technology Management and Leadership (24)
- Campus Policy and Law (20)
- Security Risk Assessment and Analysis (20)
- Campus Policies (17)
- Security Awareness (16)
- Data Security (15)
- Security Policies (15)
- Federal Policy and Law (10)
- Identity and Access Management (8)
- Networking and Emerging Technologies (8)
- Cybersecurity Policy (7)
- Intrusion Detection and Prevention (6)
- Privacy (6)
- Security Architecture (6)
EDUCAUSE Library Items for Security Implementation
-
Starting Over from the Top: Campus IPv6 Deployment and Security
-
April 13, 2010
|
A session at the Security 2010
Every day the Internet handles more and more IPv6 traffic, much of which is completely transparent to the end user. Unfortunately, much of the traffic is also transparent to campus networking and s…
-
Surviving the Onslaught: Running a Security Program by Yourself
-
April 14, 2010
|
A session at the Security 2010
The Institute for Advanced Study and the University of Scranton are two schools that operate an entire security program with a single dedicated staff person. Some institutions operate with less. Th…
-
Creating an Information Security Program: Policy, Process, and Cultural Change
-
March 10, 2010
|
A session at the NERCOMP Annual Conference 2010
Complying with state and federal regulations regarding personal information and data breaches is both a challenge and a concern for many universities. This session will review how two different i…
-
Driving Security Improvements Through Research and Development
-
September 15, 2009
The Directorate for Science and Technology (S&T) is the primary research and development arm of the U.S. Department of Homeland Security. S&T uses the Homeland Security Advanced Research Pr…
-
Server Virtualization and Security: Dos and Don'ts
-
September 14, 2009
With shrinking budgets and the pressure to reduce costs, many organizations are turning to server virtualization as a technique to do more with less. This session will review the basics of virtuali…
-
Domain Name System Security (DNSSEC): Lessons Learned and Deployment for Research Facilities
-
September 15, 2009
The Domain Name System Security Extensions, known as the DNSSEC, is a suite of IETF specifications for securing certain kinds of information provided by the DNS as used on IP networks. It is widely…
-
Developing an Information Security Program: Addressing the NSF Cooperative Agreement
-
September 15, 2009
NSF cooperative agreements require the awardee to develop a security program and present it to the NSF, but they do not mandate specific security requirements. This talk will address what this mean…
-
Starting from Scratch: IT Security at LSU
-
November 4, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
LSU established an IT Security and Policy Office in the fall of 2005. This presentation will illustrate how LSU developed a strategy to tighten the security of its infrastructure by establishing po…
-
Two Views: Partnering with General Counsel to Improve IT Security
-
November 4, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
In this age of regulations and compliance, many IT security offices struggle to present a strong front. Partnering with general counsel offers the opportunity for the security office to become the …
-
Uncovering Confidential Data and Data Loss Prevention on Campus
-
April 21, 2009
|
A session at the Security 2009
Securing personally identifiable information (PII) and data loss prevention (DLP) are important parts of a modern security program. This panel will discuss regulatory and other drivers, common elem…

















