Main Nav

Search results

Showing 1 - 10 of 78 Results

Sort by:

Mobile Security

Mobile Security True Information security takes on new di…

Measuring the Effectiveness of Security Awareness Programs
December 10, 2013

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…

Who Moved My Office? The Evolving Role of the CISO
June 19, 2014 | A session at the EDUCAUSE LIVE! - Who Moved My Office? The Evolving Role of the CISO

In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined …

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

HTML5 Security
May 7, 2014 | A session at the Security Professionals Conference

HTML5 is an emerging technology with broad implications for mobile application development and delivery. A number of new security-related features are contained in the HTML5 specification that ca…

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013

Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…

Executive Summary: BYOD and Consumerization of IT in Higher Education Research, 2013
April 1, 2013

"What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues th…

Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013

Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…

Touch ID: Net Benefit or Net Loss?
October 8, 2013

Guest Blogger: Joshua Wright , @joswr1ght With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the …

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.