Main Nav

Search results

Showing 61 - 70 of 257 Results

Sort by:

Rapid Windows Analysis
April 16, 2013 | A session at the Security Professionals Conference

Sometimes IT professionals can't perform a full analysis of every system that is suspected of being compromised in a timely manner. This presentation will give IT pros some tips on performing …

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
April 16, 2013 | A session at the Security Professionals Conference

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. A panel of several early adopters wi…

Compliance Assessment Template
September 24, 2008

This sample Harvard University questionnaire is designed to assist people in understanding if the setup and operation of their systems are in compliance with the Harvard Enterprise Information …

Information Technology Security Risk Management (ITS-RM) Program
December 12, 2008

This is the University of Virginia's ITC’s Information Technology Security Risk Management (ITS-RM) Program, which is intended to provide University departments with the information a…

Implementing Information Security Governance Using ISO 27000
March 17, 2011

GSU's CIO sponsored the ISO 27001 certification initiative at Georgia State University in mid 2007 and the Information Security Department and Office of Disbursements were the first GSU depa…

Georgia State University's IT Procurement Review Process--Practical Approach to Assessing Risks of IT Projects
March 17, 2011

In late 2005, the Security Review Policy was adopted by the University, which states "Where appropriate, information security personnel will conduct risk assessments of technologies/processe…

Whole Disk Encryption Evaluation and Deployment
October 2, 2008

Baylor University has spent two years working on a large-scale deployment of whole-disk encryption. Baylor University has spent two years working…

Security Task Force 2008–2009 Strategic Plan: Safeguarding Our IT Assets, Protecting Our Community’s Privacy
September 3, 2008

The EDUCAUSE/Internet2 Computer and Network Security Task Force (STF) provides a focal point for the academic community to join together to strengthen the ability of the higher education sector t…

Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008

This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…

Information Sharing for IT Security Professionals
August 4, 2008

© 2008 Rodney J. Petersen. The text of this article is licensed under the Creative Commons Attribution-NonCommercial-No Derivative Works 3.0 license (…


Connect: San Antonio
April 22–24
Register Now

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.


Digital Badges
Member recognition effort
Earn yours >

Career Center

Leadership and Management Programs

EDUCAUSE Institute
Project Management



Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.


EDUCAUSE organizes its efforts around three IT Focus Areas



Join These Programs If Your Focus Is


Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.



2015 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations

Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.