Main Nav

Search results

Showing 1 - 10 of 246 Results

Sort by:

2007 Enterprise Conference: The Adaptable University
June 15, 2007

This podcast features a keynote address from the 2007 Enterprise Conference in Chicago, Illinois. Our speaker is H. David Lambert , Vice President for Information Services and Chief Informatio…

2014 CDS Benchmarking Report
February 25, 2015

Traditionally, the Core Data Service annual report has summarized the state of higher education IT; however, the strength of CDS data are shown through their benchmarking capability. To serve…

2015 Strategic Information Security Issues Infographic
April 24, 2015

Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by th…

7 Things You Should Know About Cloud Security
September 3, 2010

Cloud computing promises to provide considerable benefits for colleges and universities, including increased reliability and flexibility, with lower or more transparent costs. At the same time, c…

8 Ways to Defend Higher Education against Cyberattacks
December 8, 2014

Key Takeaways No single product can guarantee the security of systems and data , especially in the face of increasingly sophisticated threats. The real issues in protecti…

A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations
January 1, 2007

Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Res…

A Consolidated Approach to Risk and Standards Management
May 7, 2014 | A session at the Security Professionals Conference

This session will offer an overview of the tools and techniques we use at Ohio University to address our information risk and standards management. We will include an overview of the tool we use …

A Model for Today: Partnering with Industry to Enhance Institutional Information Security Capabilities
April 16, 2013 | A session at the Security Professionals Conference

Many academic organizations are facing the same problems: an aging decentralized computing infrastructure, growing use of mobile devices, increasing use of network resources, and ever-present exter…

A Successful Tool to Create Positive Change: Result of an IT Risk Assessment and Benchmark at Scandinavian Universities
October 21, 2005 | A session at the EDUCAUSE 2005 Annual Conference

Current cost pressures, technology changes, and new requirements meant that changes were needed in the way IT was managed at Scandinavian universities. This session will present results from an IT …

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…