Main Nav

Search results

Showing 11 - 20 of 250 Results

Sort by:

Policy at EDUCAUSE 2013
October 30, 2013

Federal and campus-level policy issues impacting IT in higher education were hot topics at EDUCAUSE 2013. The Security Privacy, and Compliance and Data/Information Access and Manage…

Learning While Doing: Two Institutions’ Practical IT Risk Management Experiences
July 29, 2013

IT risk management identifies, assesses, and responds to IT risks. Effective IT risk management examines issues such as institutional use of data , IT security measures to prevent or…

Information Security
June 14, 2013

This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …

Using Shodan for the .edu
May 7, 2014 | A session at the Security Professionals Conference

Ever hear of the Shodan computer search engine? This project scans the Internet, collects banners from exposed systems' services, and places them in a searchable database. We'll discuss…

Keeping the Lights On and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
May 8, 2014 | A session at the Security Professionals Conference

The Cornell IT Security Office performed a risk assessment of campus utility and building control systems, including its electric generating plant, steam plant, chilled water plant, and drinking …

Information Security Program Assessment Tool
February 3, 2014

This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…

NIST Posts Initial Analysis of Comments on Cybersecurity Framework
May 21, 2013

The National Institute of Standards and Technology (NIST)  announced that it has prepared an initial analysis of hundreds of comments submitted by industry and the public related to the P…

The Risks of "Click-Through" Agreements: How Real Are They, and What to Do?
May 8, 2014 | A session at the Security Professionals Conference

"Free" Internet services are commonly integrated into teaching, research, and administration at our institutions, spurred by the ease of individuals simply clicking "I agree."…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

A Consolidated Approach to Risk and Standards Management
May 7, 2014 | A session at the Security Professionals Conference

This session will offer an overview of the tools and techniques we use at Ohio University to address our information risk and standards management. We will include an overview of the tool we use …

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.