Main Nav

Search results

Showing 41 - 50 of 249 Results

Sort by:

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
April 16, 2013 | A session at the Security Professionals Conference

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. A panel of several early adopters wi…

Eight Steps to Secure Your Copier or Multi-Function Device (MFD)
June 3, 2010

These resources have been gathered to specifically address concerns related to the security of sensitive information that may be stored on the hard drives of copiers, printers, or multi-function …

Compliance Matrix Poster for IT & Compliance Professionals
March 17, 2010

This matrix poster developed by Symantec outlines IT Controls for security and privacy concerns related to regulatory compliance in the workplace. Topics addressed in this poster include: Regu…

ISAAC (Information Security Awareness, Assessment, and Compliance): A Success Story
February 24, 2010

Risk assessment and mitigation are challenging in any environment, but especially in the open and decentralized world of higher education. Texas A&M University developed the ISAAC methodology…

IT Security Information - IT Risk Management
January 11, 2008

The CU-Boulder IT Security Office has developed a risk management framework and risk assessment service to meet campus needs in identifying and mitigating IT related risk. The risk management fra…

Cyber-Insurance Advancement Underscores Data Breach Risk Recognition
January 15, 2009

While the market for cyber-insurance remains largely nascent, with most private sector organizations still unable to adequately safeguard their financial and operational well-being against a majo…

Risk Management and Cyber Insurance
October 7, 2007

The Internet has radically changed the way business (work and personal) is carried out. However, vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of …

Cyber-Insurance Revisited
January 5, 2005

Cyber-insurance is considered as appropriate means to absorb financial losses caused by computer security breaches. Since insurance markets at the same time create incentives to construct more se…

RFP Template for Information Security Projects
November 10, 2009

This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations sho…

Information Technology Sector Baseline Risk Assessment
August 28, 2009

The IT Sector Baseline Risk Assessment evaluates risk to the IT Sector and focuses on critical IT Sector functions. The assessment methodology is not intended to be guidance for individual entiti…

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.