-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Implementation [x]
- Cybersecurity (103)
- Security Management (103)
- Security Planning (42)
- Network Security and Applications (28)
- Policy and Law (27)
- Information Technology Management and Leadership (25)
- Campus Policy and Law (20)
- Security Risk Assessment and Analysis (20)
- Campus Policies (17)
- Data Security (17)
- Security Awareness (16)
- Security Policies (15)
- Federal Policy and Law (11)
- Cybersecurity Policy (8)
- Identity and Access Management (8)
- Networking and Emerging Technologies (8)
- Information Systems and Services (7)
- Intrusion Detection and Prevention (7)
- Security Architecture (7)
EDUCAUSE Library Items for Security Implementation
-
Building Security into the RFP Process
-
April 14, 2010
|
A session at the Security 2010
By including a security review as part of the RFP process, Indiana University has been able to identify and mitigate potential risks in products before they are purchased and implemented. IU requir…
-
Realizing the Promise of Faster, More Secure Campus Communications
-
April 13, 2010
|
A session at the Security 2010
Colleges and universities are facing difficult computer security challenges. Social networking sites, Web 2.0 applications, and high-bandwidth multimedia services have become the norm for campus co…
-
Starting Over from the Top: Campus IPv6 Deployment and Security
-
April 13, 2010
|
A session at the Security 2010
Every day the Internet handles more and more IPv6 traffic, much of which is completely transparent to the end user. Unfortunately, much of the traffic is also transparent to campus networking and s…
-
Surviving the Onslaught: Running a Security Program by Yourself
-
April 14, 2010
|
A session at the Security 2010
The Institute for Advanced Study and the University of Scranton are two schools that operate an entire security program with a single dedicated staff person. Some institutions operate with less. Th…
-
Creating an Information Security Program: Policy, Process, and Cultural Change
-
March 10, 2010
|
A session at the NERCOMP Annual Conference 2010
Complying with state and federal regulations regarding personal information and data breaches is both a challenge and a concern for many universities. This session will review how two different i…
-
Driving Security Improvements Through Research and Development
-
September 15, 2009
The Directorate for Science and Technology (S&T) is the primary research and development arm of the U.S. Department of Homeland Security. S&T uses the Homeland Security Advanced Research Pr…
-
Server Virtualization and Security: Dos and Don'ts
-
September 14, 2009
With shrinking budgets and the pressure to reduce costs, many organizations are turning to server virtualization as a technique to do more with less. This session will review the basics of virtuali…
-
Domain Name System Security (DNSSEC): Lessons Learned and Deployment for Research Facilities
-
September 15, 2009
The Domain Name System Security Extensions, known as the DNSSEC, is a suite of IETF specifications for securing certain kinds of information provided by the DNS as used on IP networks. It is widely…
-
Developing an Information Security Program: Addressing the NSF Cooperative Agreement
-
September 15, 2009
NSF cooperative agreements require the awardee to develop a security program and present it to the NSF, but they do not mandate specific security requirements. This talk will address what this mean…
-
Starting from Scratch: IT Security at LSU
-
November 4, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
LSU established an IT Security and Policy Office in the fall of 2005. This presentation will illustrate how LSU developed a strategy to tighten the security of its infrastructure by establishing po…
















