Main Nav

Search results

Showing 61 - 70 of 259 Results

Sort by:

Lessons Learned in Managing IT Risk
April 17, 2013 | A session at the Enterprise IT Leadership Conference 2013

This session will cover "understanding risk": what IT risk is, where it comes from, and what we can do about it. We'll also present a model that can be used for evaluating risk res…

The 20 Critical Controls: A Campus Security Strategy
April 16, 2013 | A session at the Security Professionals Conference

The 20 Critical Controls are quick wins that allow you to rapidly improve your cybersecurity without major procedural or technical change. International cybersecurity experts developed the 20 Cri…

Bring Your Own Cloud: Data Management Challenges in a Click-Through World
April 17, 2013 | A session at the Security Professionals Conference

Consumer cloud-based services are easy to set up, low cost, and familiar. It's understandable why clients would automatically turn to them for their data-storage needs. But what happens when…

How to Think Like a Risk Manager
April 17, 2013 | A session at the Security Professionals Conference

Having heard the enterprise risk management (ERM) panel, you are now wondering what is going on in the risk management department across the street from your office, how they view you and your issu…

Rapid Windows Analysis
April 16, 2013 | A session at the Security Professionals Conference

Sometimes IT professionals can't perform a full analysis of every system that is suspected of being compromised in a timely manner. This presentation will give IT pros some tips on performing …

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
April 16, 2013 | A session at the Security Professionals Conference

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. A panel of several early adopters wi…

Implementing Information Security Governance Using ISO 27000
March 17, 2011

GSU's CIO sponsored the ISO 27001 certification initiative at Georgia State University in mid 2007 and the Information Security Department and Office of Disbursements were the first GSU depa…

Georgia State University's IT Procurement Review Process--Practical Approach to Assessing Risks of IT Projects
March 17, 2011

In late 2005, the Security Review Policy was adopted by the University, which states "Where appropriate, information security personnel will conduct risk assessments of technologies/processe…

Whole Disk Encryption Evaluation and Deployment
October 2, 2008

Baylor University has spent two years working on a large-scale deployment of whole-disk encryption. Baylor University has spent two years working…

Security Task Force 2008–2009 Strategic Plan: Safeguarding Our IT Assets, Protecting Our Community’s Privacy
September 3, 2008

The EDUCAUSE/Internet2 Computer and Network Security Task Force (STF) provides a focal point for the academic community to join together to strengthen the ability of the higher education sector t…