Main Nav

Search results

Showing 1 - 10 of 258 Results

Sort by:

2015 Strategic Information Security Issues Infographic
April 24, 2015

Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by th…

HEISC Security Translation Series
March 19, 2015

The Higher Education Information Security Council (HEISC) Governance, Risk, and Compliance (GRC) Working Group has developed a series of security translation papers for specific campus audien…

2014 CDS Benchmarking Report
February 25, 2015

Traditionally, the Core Data Service annual report has summarized the state of higher education IT; however, the strength of CDS data are shown through their benchmarking capability. To serve…

Understanding IT GRC in Higher Education: IT Risk
February 23, 2015

Key Takeaways IT risk is the potential for an unplanned, negative outcome . IT risk is a business risk consisting of IT-related events that could affect an institut…

8 Ways to Defend Higher Education against Cyberattacks
December 8, 2014

Key Takeaways No single product can guarantee the security of systems and data , especially in the face of increasingly sophisticated threats. The real issues in protecti…

Cloud Strategy for Higher Education: Building a Common Solution
November 5, 2014

Higher education IT is in the midst of an exciting transformation. The economies of scale, resiliency, flexibility, and agility provided by cloud computing are rendering the construction and ma…

Managing Risk in Moving to the Cloud: Lessons from the Internet2 NET+ Program
October 1, 2014 | A session at the EDUCAUSE Annual Conference

Internet2's NET+ program has been engaging universities and cloud services providers in understanding and mitigating risks universities face in moving to the cloud. This panel will address r…

Diamonds and Paperclips: Steps Needed to Make Your University Cybersecure
September 30, 2014 | A session at the EDUCAUSE Annual Conference

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implemen…

Seminar 14P - Diamonds and Paper Clips: Steps Needed to Make Your University Cybersecure (separate registration is required)
September 29, 2014 | A session at the EDUCAUSE Annual Conference

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implem…

Resources for Presidents and Senior Executives: Information Security
September 15, 2014

These executive briefs are designed to help institutional leaders optimize the impact of IT in higher education.  The  Foundations  offer a framework for considering higher educatio…