Main Nav

Search results

Showing 41 - 50 of 250 Results

Sort by:

Using Shodan for the .edu
May 7, 2014 | A session at the Security Professionals Conference

Ever hear of the Shodan computer search engine? This project scans the Internet, collects banners from exposed systems' services, and places them in a searchable database. We'll discuss…

Keeping the Lights On and the Hackers Out: A Security Risk Assessment Process for Utilities and Building Automation Systems
May 8, 2014 | A session at the Security Professionals Conference

The Cornell IT Security Office performed a risk assessment of campus utility and building control systems, including its electric generating plant, steam plant, chilled water plant, and drinking …

The Risks of "Click-Through" Agreements: How Real Are They, and What to Do?
May 8, 2014 | A session at the Security Professionals Conference

"Free" Internet services are commonly integrated into teaching, research, and administration at our institutions, spurred by the ease of individuals simply clicking "I agree."…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

A Consolidated Approach to Risk and Standards Management
May 7, 2014 | A session at the Security Professionals Conference

This session will offer an overview of the tools and techniques we use at Ohio University to address our information risk and standards management. We will include an overview of the tool we use …

Look Up: It's a Bird! It's a Plane! It's Your Sensitive Data in the Cloud!
May 7, 2014 | A session at the Security Professionals Conference

The cloud is the new frontier for data storage and is now considered by analysts as a viable option. Employees and students are undoubtedly sharing and storing personal and work-related informati…

Very Hard Risk Management Is
May 8, 2014 | A session at the Security Professionals Conference

Why struggle with issues alone when you can learn from the experience of your peers? Representatives from the UF, Penn, Virginia Tech, and the University of Tampa will discuss common risk managem…

Cybersecurity Incident Response: Needs of a Modern Incident Response Program
May 7, 2014 | A session at the Security Professionals Virtual Conference 2014

There's no question that organizations of all sizes face a significant threat from information security breaches. Cyberattacks have become more commonplace and more sophisticated with each pas…

SEM02P-Preventing a Lawsuit by Preparing for a Breach (separate registration required)
May 6, 2014 | A session at the Security Professionals Conference

Today's complex threat landscape, combined with open, networked environments, highly mobile populations, and the decentralized authorities of higher education institutions, creates a scenari…

Alternative IT Sourcing: A Discussion of Privacy, Security, and Risk
July 21, 2011

In this interview, three higher education privacy, security, and risk professionals discuss the common challenges and opportunities inherent in alternative IT sourcing. The sourcing of I…