Main Nav

Search results

Showing 1 - 10 of 199 Results

Sort by:

Risk Management

Risk Management True EDUCAUSE IT Governance, Risk, and Co…

Unified Communications in Higher Education: Responding to New Risks
November 17, 2015

New unified communications (UC) capabilities and the increased desire for richer collaboration experiences have led to a fundamental shift in the technology we use for communication. For …

How to Avoid Unintentional Insider Threats
October 30, 2015

People within an organization pose unintentional threats, although lost devices have become a major concern. Training and awareness offer the best protection against losses. …

Cybersecurity Risk Management
October 29, 2015

The NIST Cybersecurity Framework enables a way to effect consistent prioritization, execution, and measurement of activity to achieve cybersecurity risk-management goals, tailored to each institu…

Organizational Risks and the Internet of Things
October 23, 2015

The Internet of Things poses some serious risks to higher education institutions, but banning devices isn't the answer. Instead, the IT organization must manage IoT risks, as this blog expla…

IT Risk Register
October 13, 2015

This IT Risk Register was created to help institutional IT departments get their strategic IT risk-management programs off the ground. The IT Risk Register is a sortable checklist tha…

IT Accessibility Risk Statements and Evidence
July 31, 2015

This document was created by the EDUCAUSE IT Accessibility Constituent Group to help identify accessibility risks that IT leaders should consider in their risk management process. …

Preparing the IT Organization for the Cloud
May 7, 2015

Cloud-based IT services are becoming a norm for higher education, providing researchers, faculty, students, and administrators alike with the tools that they need in order to do their work. But t…

2015 Strategic Information Security Issues Infographic
April 24, 2015

Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by th…

Developing a Meaningful Labor Cost Estimate
April 27, 2015

Key Takeaways Because in-house labor expenses can consume more than half of the IT budget , it is essential for IT leaders to understand labor's cost, productivity, and i…