Main Nav

Search results

Showing 211 - 220 of 249 Results

Sort by:

Secrets of Superspies
April 11, 2007 | A session at the Security 2007

Spies are unstoppable geniuses who can steal any information they want. Then there are the spy wannabes such as criminals, hackers, and even your employees. As good as spies are in stealing your in…

Seminar 3P - A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations PLEASE NOTE: Separate registration and fee are required to attend this seminar.
March 19, 2007 | A session at the NERCOMP Annual Conference 2007

Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Re…

Information Systems Under Attack: Managing Enterprise Risk
February 22, 2007 | A session at the Cybersecurity Summit 2007 for NSF Large Research Facilities

Today's enterprise information systems are increasingly coming under attack by sophisticated adversaries around the world including nation-states, terrorist organizations, criminals, hackers, …

Security Task Force 2008–2009 Strategic Plan: "Safeguarding Our IT Assets, Protecting Our Community's Privacy"
September 8, 2008

The EDUCAUSE/Internet2 Computer and Network Security Task Force 2008-2009 Strategic Plan is now available online. The Security Task Force (STF) has adopted the theme of " Safeguarding O…

IT Security in Higher Education: A Sea Change
October 11, 2006 | A session at the EDUCAUSE 2006 Annual Conference

ECAR data from 2003 and 2005 make it possible to compare the state of IT security over a critical two-year period. The findings from this analysis are striking, revealing an organizational, technol…

Seminar 09F - Effective IT Security Practices PLEASE NOTE: Separate registration and fee is required to attend this seminar.
October 9, 2006 | A session at the EDUCAUSE 2006 Annual Conference

IT security is a critical issue in higher education. This seminar will focus on network security architectures, infrastructure, data security, incident detection, prevention, and response. A framew…

Giving the Heave-Ho to Worms, Spyware, and Bots!
June 19, 2006 | A session at the EDUCAUSE Southeast Regional Conference 2006

IRC bots, trojan horses, rootkits, zero-day threats, and compromised PCs may result in sensitive data exposures and unwanted publicity, not to mention the loss of user productivity and time spent r…

Are Security and Quality Assurance Part of Your Software Development Life Cycle?
April 25, 2006 | A session at the EDUCAUSE Western Regional Conference 2006

Three out of four vendor or homegrown Web applications have high-risk bugs or security vulnerabilities. This presentation will demonstrate simple but deadly techniques that allow hackers to access …

Staying Out of the Security Headlines
April 12, 2006 | A session at the Security 2006

In the first half of last year 550,000 people associated with 16+ schools had personal information exposed in university security breaches, generating negative publicity for the universities concer…

The Botherd is Coming! How Education and Technology Can Stop the Stampede
April 11, 2006 | A session at the Security 2006

High-speed connections and lots of personal computers make campus networks target-rich environments for botnet recruitment. UAlbany has neither a campus firewall nor pre-connection policy enforceme…

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.