Main Nav

James H. Moore (Rochester Institute of Technology)

James H. Moore
Senior Information Security Forensic Investigator

Rochester, New York

Membership Information

ECARNon-Subscriber Find Out More


Jim has been a leader in security for almost 30 years. During his first 7 years as a programmer, he learned the fundamentals of operating systems, programming languages, and data structures. He also saw a lot of products shipped to meet market windows without full implementation, sufficient testing, and plans for remedying shortcomings. He also saw the effects of when the midset of "never enough resources to do it right, but always enough to do it over."

His background in programming served Jim well in the second phase of his career in systems administration. In trying to remedy systems problems, Jim often conjectured where corners would have been cut. In systems administration, Jim began to realize that security and cost-effective systems administration have synergy. Jim also developed a Sun clonng process that could be argued was the father of Jumpstart. Jim also proposed 2 security controls for the IEEE 1387.2 (Software Management) standard.

He also began to gain a hearing with management when security could be put in terms of cost effectiveness. It was his integrated security focus that transitioned Jim into his 3rd phase of his career, full time information security.

Jim has been blessed to have worked with several security luminaries, including Michael Gerdes, and Linda Stutsman. They have added significantly to his career development.

During his time as a network security architect for Xerox, he wrote the first operating system security standard (for Unix), re-architected their security exception process, architected and lead their first corporate internal computer emergency response team, arranged for their first security posture assessement, drafted the first Windows (NT) security standard, and project managed remote access security. During this time, Jim also contributed to the first SANS Incident Handling Step-By-Step guide.

Jim joined RIT in 2001, and has built the information security program there through the establishment of trust, recognition of teamwork, and fiscal responsibility. Standards have been a key focus to help combat the exponential increases in vulnerabilities and incidents. Jim established standards as another level of partcipative governance, mandated by policy. Jim has endevoured to work with the Educause and the security communities through sharing knowledge, processes, and doumentation. To extend economies of scale, he championed the use of the Creative Commons license for security products. Jim also is a representative in the education sector for the New York state ISAC (NYS-CSCIC). Most recently, he has been looking at the application of systems thinking to information technology and information security.

EDUCAUSE Involvement


Organizations or Campuses
January 2004

Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.


Digital Badges
Member recognition effort
Earn yours >

Career Center

Leadership and Management Programs

EDUCAUSE Institute
Project Management



Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.


EDUCAUSE organizes its efforts around three IT Focus Areas



Join These Programs If Your Focus Is


Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.



2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations

Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.