Main Nav

Search results

Showing 61 - 70 of 87 Results

Sort by:

Robin Bartoletti

Instructional Designer

University of North Texas HSC at Fort Worth

Fort Worth, Texas

UNITED STATES

Robin Bartoletti
Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012

Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…

Secure Mobile-an Oxymoron?
April 29, 2011

Responses to the #1 topic on IdeaScale, " Consumers dictate device usage, not IT, " indicate that MANY of you believe consumers will drive smartphone adoption in Higher Education, w…

Securing Mobile Devices - Seminar
April 4, 2011 | A session at the Security Professionals Conference 2011

The iPhone, BlackBerry, Droid, and more—mobile Internet devices are extremely popular, including with faculty members, staff, and students. But are these devices secure? Do we have any idea who…

Security Conference 2012 CFP Now Open! Proposals Due 12/16
November 3, 2011

As the breadth of technology expands globally, so do the boundaries of information security. The 10th annual Security Professionals Conference will attempt to recalibrate security during a p…

Security is #4 on the 2011 Top-Ten IT Issues List
June 2, 2011

Information security "continues its long run near the top of the EDUCAUSE Current Issues Survey , coming in at #4 on the 'strategic importance' list." Other critical issue…

Security Professionals Conference 2012 Recap
June 7, 2012

Security and IT professionals from the higher education community gathered to celebrate the 10th anniversary of the Security Professionals Conference in Indianapolis, May 15-17, 2012. This …

Security, Privacy and Policy: Special Expert Q&A Session
April 28, 2011

Listen to an informal Q&A session on today's theme of Security, Privacy and Policy. Listen to an informal Q&A session on today&#…

Seminar 2A - Wireless Security for Mobile Devices PLEASE NOTE: Separate registration and fee are required to attend this seminar.
April 10, 2007 | A session at the Security 2007

Wireless devices and networks are increasingly ubiquitous, although attention to ensuring their security has been inadequate. Learn how to protect your campus users, mobile devices, and your wirele…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …