Main Nav

Search results

Showing 61 - 70 of 257 Results

Sort by:

Rapid Windows Analysis
April 16, 2013 | A session at the Security Professionals Conference

Sometimes IT professionals can't perform a full analysis of every system that is suspected of being compromised in a timely manner. This presentation will give IT pros some tips on performing …

What's Your Number? Measuring the Maturity of Your Security Program with HEISC's New Assessment Tool
April 16, 2013 | A session at the Security Professionals Conference

Do you know how mature your security program is? EDUCAUSE has developed an enhanced information security program assessment tool to help you gauge your program. A panel of several early adopters wi…

Compliance Assessment Template
September 24, 2008

This sample Harvard University questionnaire is designed to assist people in understanding if the setup and operation of their systems are in compliance with the Harvard Enterprise Information …

Information Technology Security Risk Management (ITS-RM) Program
December 12, 2008

This is the University of Virginia's ITC’s Information Technology Security Risk Management (ITS-RM) Program, which is intended to provide University departments with the information a…

Implementing Information Security Governance Using ISO 27000
March 17, 2011

GSU's CIO sponsored the ISO 27001 certification initiative at Georgia State University in mid 2007 and the Information Security Department and Office of Disbursements were the first GSU depa…

Georgia State University's IT Procurement Review Process--Practical Approach to Assessing Risks of IT Projects
March 17, 2011

In late 2005, the Security Review Policy was adopted by the University, which states "Where appropriate, information security personnel will conduct risk assessments of technologies/processe…

Whole Disk Encryption Evaluation and Deployment
October 2, 2008

Baylor University has spent two years working on a large-scale deployment of whole-disk encryption. Baylor University has spent two years working…

Security Task Force 2008–2009 Strategic Plan: Safeguarding Our IT Assets, Protecting Our Community’s Privacy
September 3, 2008

The EDUCAUSE/Internet2 Computer and Network Security Task Force (STF) provides a focal point for the academic community to join together to strengthen the ability of the higher education sector t…

Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008

This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…

Information Sharing for IT Security Professionals
August 4, 2008

© 2008 Rodney J. Petersen. The text of this article is licensed under the Creative Commons Attribution-NonCommercial-No Derivative Works 3.0 license ( http://creativecommons.org/licenses/by-n…

Close
Close


Connect: San Antonio
April 22–24
Register Now

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2015 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.