Main Nav

Search results

Showing 1 - 10 of 34 Results

Sort by:

Lapse in Cybersecurity Awareness Leads to Mistaken Plagiarism Charge
June 6, 2012

David V. Halbeisen ( davidhalbeisen@halfiron.net ) is an IT professional in Washington, DC. Key Takeaways Cybersecurity awareness rarely receives the attention from higher edu…

Practical Strategies for Managing Risk in Cloud Computing
March 1, 2011

This ECAR research bulletin identifies some key principles on which to base decisions related to security assurance and compliance capabilities in cloud computing environments. It also illustrate…

Managing Availability and Performance Risks in the Cloud: Expect the Unexpected
December 7, 2010

We know that the best way to avoid cloud risks is to apply sound risk management strategies before placing applications and IT services in the cloud. Some risks, however, cannot be predetermined …

Higher Education Information Security Council 2014 Strategic Priorities
January 30, 2014

The Higher Education Information Security Council (HEISC) has identified three areas of focus in 2014, which closely align with the  2014 EDUCAUSE Strategic Directions . This year's stra…

Lawrence Dobranski

Director, ICT Security

University of Saskatchewan

Saskatoon, Saskatchewan

CANADA

Lawrence Dobranski
Connecting the Academic Experience to the Operational Security Needs of Higher Education
January 1, 2007

One of the criteria for becoming a National Center of Academic Excellence in Information Assurance Education is for "the academic program to demonstrate how the university encourages the pract…

NSA Centers of Academic Excellence in Information Assurance Education
January 1, 2004

The Centers of Academic Excellence in Information Assurance Education (CAEIAE) program, established in November 1998, helps NSA partner with colleges and universities across the nation to promote h…

Information Security: A Difficult Balance
January 1, 2004

© 2004 Linwood H. Rose EDUCAUSE Review, vol. 39, no. 5 (September/October 2004): 10–11. Information Security: A Difficult Balance Linwood H. Rose Protecting the critical …

What’s in a Name?
January 1, 2004

Viewpoint What’s in a Name? The labels associated with security—computer, network, information, information assurance—have multiple implications for higher education By Rodney Pe…

Information Assurance and Higher Education
January 1, 2004

A variety of academic efforts are underway to secure cyberspace. The National Science Foundation has instituted a Cyber Trust program that supports research and education activities that will lead …

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.