Main Nav

Search results

Showing 1 - 10 of 103 Results

Sort by:

U.S. Department of Homeland Security Cybersecurity Engagement for Colleges and Universities
July 24, 2014 | A session at the EDUCAUSE LIVE! - U.S. Department of Homeland Security Cybersecurity Engagement for Colleges and Universities

The U.S. Department of Homeland Security (DHS) is increasing its efforts to enhance cybersecurity awareness and network protection at colleges and universities in response to the recent wave of c…

Diamonds and Paperclips: Steps Needed to Make Your University Cybersecure
September 30, 2014 | A session at the EDUCAUSE Annual Conference

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implemen…

Managing Risk in Moving to the Cloud: Lessons from the Internet2 NET+ Program
October 1, 2014 | A session at the EDUCAUSE Annual Conference

Internet2's NET+ program has been engaging universities and cloud services providers in understanding and mitigating risks universities face in moving to the cloud. This panel will address r…

Seminar 14P - Diamonds and Paper Clips: Steps Needed to Make Your University Cybersecure (separate registration is required)
September 29, 2014 | A session at the EDUCAUSE Annual Conference

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implem…

Using Shodan for the .edu
May 7, 2014 | A session at the Security Professionals Conference

Ever hear of the Shodan computer search engine? This project scans the Internet, collects banners from exposed systems' services, and places them in a searchable database. We'll discuss…

Keeping the Lights On and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
May 8, 2014 | A session at the Security Professionals Conference

The Cornell IT Security Office performed a risk assessment of campus utility and building control systems, including its electric generating plant, steam plant, chilled water plant, and drinking …

The Risks of "Click-Through" Agreements: How Real Are They, and What to Do?
May 8, 2014 | A session at the Security Professionals Conference

"Free" Internet services are commonly integrated into teaching, research, and administration at our institutions, spurred by the ease of individuals simply clicking "I agree."…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

A Consolidated Approach to Risk and Standards Management
May 7, 2014 | A session at the Security Professionals Conference

This session will offer an overview of the tools and techniques we use at Ohio University to address our information risk and standards management. We will include an overview of the tool we use …

Look Up: It's a Bird! It's a Plane! It's Your Sensitive Data in the Cloud!
May 7, 2014 | A session at the Security Professionals Conference

The cloud is the new frontier for data storage and is now considered by analysts as a viable option. Employees and students are undoubtedly sharing and storing personal and work-related informati…