Main Nav

Search results

Showing 31 - 40 of 258 Results

Sort by:

Very Hard Risk Management Is
May 8, 2014 | A session at the Security Professionals Conference

Why struggle with issues alone when you can learn from the experience of your peers? Representatives from the UF, Penn, Virginia Tech, and the University of Tampa will discuss common risk managem…

Cybersecurity Incident Response: Needs of a Modern Incident Response Program
May 7, 2014 | A session at the Security Professionals Virtual Conference 2014

There's no question that organizations of all sizes face a significant threat from information security breaches. Cyberattacks have become more commonplace and more sophisticated with each pas…

SEM02P-Preventing a Lawsuit by Preparing for a Breach (separate registration required)
May 6, 2014 | A session at the Security Professionals Conference

Today's complex threat landscape, combined with open, networked environments, highly mobile populations, and the decentralized authorities of higher education institutions, creates a scenari…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

Information Systems Risk Assessment
July 24, 2012

This Spotlight bulletin focuses on 2011 CDS survey results related to information systems (IS) risk assessments. Research findings and industry experience demonstrate that conducting a …

Multifactor Authentication in Higher Education
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Planning and deployment issues related to multifactor authentication in higher education will be presented by participants in the NSTIC-sponsored MFA Cohortium project. Overall issues of risk asses…

IT Risk Assessment: Two Universities Share Their Methodologies
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Throughout higher education, increased emphasis is being placed on the necessity to manage IT risk/opportunity more effectively. In this session, we will compare and contrast how Princeton and Oxfo…

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. This session will introduce the new …

Alternative IT Sourcing: A Discussion of Privacy, Security, and Risk
July 21, 2011

In this interview, three higher education privacy, security, and risk professionals discuss the common challenges and opportunities inherent in alternative IT sourcing. The sourcing of I…

Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
June 4, 2009

Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…