Main Nav

Search results

Showing 41 - 50 of 246 Results

Sort by:

Information Systems Risk Assessment
July 24, 2012

This Spotlight bulletin focuses on 2011 CDS survey results related to information systems (IS) risk assessments. Research findings and industry experience demonstrate that conducting a …

Cybersecurity Incident Response: Needs of a Modern Incident Response Program
May 7, 2014 | A session at the Security Professionals Virtual Conference 2014

There's no question that organizations of all sizes face a significant threat from information security breaches. Cyberattacks have become more commonplace and more sophisticated with each pas…

SEM02P-Preventing a Lawsuit by Preparing for a Breach (separate registration required)
May 6, 2014 | A session at the Security Professionals Conference

Today's complex threat landscape, combined with open, networked environments, highly mobile populations, and the decentralized authorities of higher education institutions, creates a scenari…

Alternative IT Sourcing: A Discussion of Privacy, Security, and Risk
July 21, 2011

In this interview, three higher education privacy, security, and risk professionals discuss the common challenges and opportunities inherent in alternative IT sourcing. The sourcing of I…

Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
June 4, 2009

Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…

Multifactor Authentication in Higher Education
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Planning and deployment issues related to multifactor authentication in higher education will be presented by participants in the NSTIC-sponsored MFA Cohortium project. Overall issues of risk asses…

IT Risk Assessment: Two Universities Share Their Methodologies
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Throughout higher education, increased emphasis is being placed on the necessity to manage IT risk/opportunity more effectively. In this session, we will compare and contrast how Princeton and Oxfo…

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
October 16, 2013 | A session at the EDUCAUSE Annual Conference 2013

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. This session will introduce the new …

7 Things You Should Know About Cloud Security
September 3, 2010

Cloud computing promises to provide considerable benefits for colleges and universities, including increased reliability and flexibility, with lower or more transparent costs. At the same time, c…

Eight Steps to Secure Your Copier or Multi-Function Device (MFD)
June 3, 2010

These resources have been gathered to specifically address concerns related to the security of sensitive information that may be stored on the hard drives of copiers, printers, or multi-function …