Main Nav

Search results

Showing 21 - 30 of 258 Results

Sort by:

Seminar 14P - Diamonds and Paper Clips: Steps Needed to Make Your University Cybersecure (separate registration is required)
September 29, 2014 | A session at the EDUCAUSE Annual Conference

Total information security is not practical. How do you understand the risk landscape, identify the most sensitive information, and apply appropriate controls? More importantly, how do you implem…

Information Security Program Assessment Tool
February 3, 2014

This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…

NIST Posts Initial Analysis of Comments on Cybersecurity Framework
May 21, 2013

The National Institute of Standards and Technology (NIST)  announced that it has prepared an initial analysis of hundreds of comments submitted by industry and the public related to the P…

An Incremental Approach to Building an Information Security Program
April 1, 2013

Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…

Using Shodan for the .edu
May 7, 2014 | A session at the Security Professionals Conference

Ever hear of the Shodan computer search engine? This project scans the Internet, collects banners from exposed systems' services, and places them in a searchable database. We'll discuss…

Keeping the Lights On and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
May 8, 2014 | A session at the Security Professionals Conference

The Cornell IT Security Office performed a risk assessment of campus utility and building control systems, including its electric generating plant, steam plant, chilled water plant, and drinking …

The Risks of "Click-Through" Agreements: How Real Are They, and What to Do?
May 8, 2014 | A session at the Security Professionals Conference

"Free" Internet services are commonly integrated into teaching, research, and administration at our institutions, spurred by the ease of individuals simply clicking "I agree."…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

A Consolidated Approach to Risk and Standards Management
May 7, 2014 | A session at the Security Professionals Conference

This session will offer an overview of the tools and techniques we use at Ohio University to address our information risk and standards management. We will include an overview of the tool we use …

Look Up: It's a Bird! It's a Plane! It's Your Sensitive Data in the Cloud!
May 7, 2014 | A session at the Security Professionals Conference

The cloud is the new frontier for data storage and is now considered by analysts as a viable option. Employees and students are undoubtedly sharing and storing personal and work-related informati…