-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Implementation [x]
- Cybersecurity (101)
- Security Management (101)
- Security Planning (41)
- Network Security and Applications (27)
- Policy and Law (26)
- Information Technology Management and Leadership (24)
- Campus Policy and Law (20)
- Security Risk Assessment and Analysis (20)
- Campus Policies (17)
- Security Awareness (16)
- Data Security (15)
- Security Policies (15)
- Federal Policy and Law (10)
- Identity and Access Management (8)
- Networking and Emerging Technologies (8)
- Cybersecurity Policy (7)
- Intrusion Detection and Prevention (6)
- Privacy (6)
- Security Architecture (6)
EDUCAUSE Library Items for Security Implementation
-
Secrets of Superspies
-
April 11, 2007
|
A session at the Security 2007
Spies are unstoppable geniuses who can steal any information they want. Then there are the spy wannabes such as criminals, hackers, and even your employees. As good as spies are in stealing your in…
-
Influencing the Future of Security in Your Organization
-
April 12, 2007
|
A session at the Security 2007
Most information security officers in higher education are very skilled technically, but few understand how to bring about organizational change, particularly given the culture and traditions of ac…
-
Georgia State University System Security Plan
-
January 1, 2006
This plan is a sanitized version of the Georgia State University System Security Plan. Specific information on technical controls deployed at GSU is omitted. Information about information security …
-
Information Security Standards: A Developmental Approach
-
March 20, 2007
|
A session at the NERCOMP Annual Conference 2007
The approach used to develop information security standards is key to the success of your security program. See how a cross-university, cross-functional collaborative approach worked for the Connec…
-
Seminar 3P - A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations PLEASE NOTE: Separate registration and fee are required to attend this seminar.
-
March 19, 2007
|
A session at the NERCOMP Annual Conference 2007
Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Applied Researc…
-
Higher Education-Industry Collaborations to Improve Security
-
February 5, 2007
This session will provide an update of recent EDUCAUSE/Internet2 Security Task Force initiatives with vendors, including collaborations with ERP vendors to address application and integration secur…
-
A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations
-
January 1, 2007
Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Applied Research…
-
Integration Through Participation: Security Is Everyone's Business
-
January 17, 2007
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2007
How many people does the IT security staff serve? Thousands. Policies are needed and great to have, but the reality is that IT security depends on all users. We'll review security related poli…
-
How to Successfully Defend Against IRC Bots, Compromises, and Information Leaks
-
October 12, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
IRC "bots," Trojan horses, rootkits, "zero day" threats, compromised PCs . . . sound familiar? These threats can result in sensitive data exposures, not to mention the hassles o…
-
Implementing an Information Technology Security Program
-
October 11, 2006
|
A session at the EDUCAUSE 2006 Annual Conference
The University of Wisconsin-Madison is implementing a comprehensive information technology security program suitable for both large enterprise systems and diverse departmental systems. We will desc…

















