Webinars and other forms of presentations can be a great way to gain familiarity with a new topic or brush up on a skill that you haven’t used in a while. These presentations cover a variety of topics, from security to project management, and come from various sources around the web.
Next-Generation Digital Learning Environment: Warm-Up Activity
What really is this “next-generation digital learning environment” that is being bandied about these days? What is meant when the discussion turns to the role of the LMS in a post-LMS world? By addressing these questions, this opening segment will set the stage for the focus session by providing a conceptual framework for the discussions that will take place throughout the focus session. By participating, attendees will gain a fuller understanding of the concept of a next-generation digital learning environment and will be prepared to participate actively in the remaining segments of the focus session.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Participant Orientation Session
If you missed the April 14 participant orientation session, please join us for this one.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
User-Centered Model Design for Higher Education: Adding Meaning to Student Metrics
What is “user-centered design”? Who’s doing it in higher education, and what are the results? How can you do it on your own campus? Join Holly Morris, director of postsecondary model development and adoption at EDUCAUSE, to learn more about designing user-centered models for higher education. We’ll take a look at some case studies and participants can do some brainstorming about how to take the principles forward in their own work.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Data Theft in the 21st Century – Sponsored by Bitglass
Cybersecurity expert Jay Beale will provide a state-of-the-industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information). He’ll discuss solutions to detect exposures more quickly and strengthen defenses.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Information Security Program Planning Workshop
This working session will walk attendees through a process to review institutional and department strategic goals and other IT initiatives and prioritize security needs to build out a 12–18 month program plan. You will return to your institution with a tool and process to aid in program planning, with an emphasis on alignment to broader goals, prioritization of security initiatives, and high-level resource planning. Provided tools include a process worksheet with facilitating questions and a set of one-page reference documents to stimulate brainstorming in different areas.OUTCOMES: Engage in the planning process throughout the session * Gain different perspectives from peers during the read-out for each process step * Understand the first step to take when you return to your institution
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Threat Detection Using Time Series Analysis and Summary Statistics of Darknet Probes and OSSEC Reports
The ability to detect malicious activity across an organization’s computing infrastructure is an ongoing problem we face as information security practitioners. Where can an organization start when building a threat detection program? How can an organization gain threat detection intelligence using free tools? This presentation will address these questions and provide initial steps taken toward developing a threat detection program. Our darknet sensor data comes from dropped packets logged by iptables and collected by OSSEC. We use ossec-reportd to generate reports from across our infrastructure. These data are imported into R for statistical computing and graphics.OUTCOMES: Learn about implementing a threat detection program * Learn about importing OSSEC data into R * Learn introductory R concepts for creating security metrics
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Assess, Implement, Verify: The Ohio State University Information Risk Management Program
The Enterprise Security team at the Ohio State University is in the third year of implementing its innovative and successful information risk management program. The program has been responsible for measurable improvements to information security at the university. Additionally, the program has helped university departments understand where they have their greatest information risks, and then prioritize and plan which risks to address first. The program has also helped senior leaders understand the university’s overall information risk profile. This session will describe the key elements of the program: assess information risk, implement information security, and verify compliance.OUTCOMES: Learn about a light-weight method for assessing information risk across campus * Learn how to leverage collective knowledge to implement information security * Learn how to verifying compliance with self-assessments
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Cradle to the Grave: Building a Next-Gen Identity and Access Management Program
Are you thinking about modern and next-generation identity management? You should be, because your students demand it! Each year, new students enter the university as digital natives and have a low tolerance for any organization that cannot serve their personal needs. Despite this trend, universities are still using old, homegrown identity management suites to deal with a world of new challenges. But how do you build acceptance for something this foundational across the different areas of your university? The University of Oklahoma is building an inclusive modern IAM platform, and we invite you to look at IAM differently.OUTCOMES: Learn how to engage your organization and community to improve IAM * Develop new strategies for the changing world of IAM * Understand pitfalls you are likely to encounter
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Information Security Leadership: Trends, Perceptions, and Future Directions
It should be a priority for leaders in higher education to make sure that the CISO position is successful and effective. Having an effective information security leader who can address emerging security issues, communicate with top stakeholders, and establish and maintain an effective security program is essential. This interactive discussion session will look at trends affecting the CISO and how the position is perceived, how it’s evolving, and roles that are unique to it.OUTCOMES: Discuss the current landscape affecting CISOs in higher education * Learn about the shift in security leadership from traditionally operational to strategic * Understand the necessary roles and skills for successful information security leadership
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Delving into Diversity
A 2015 poll conducted by ISC2 found that of 14,000 security professionals worldwide, women account for just one out of 10 cybersecurity professionals. The results compared with previous years’ data showed that the gender gap has widened over the past two years. The National Bureau of Labor Statistics predicts that this white, male-dominated field has a drastic workforce shortage that will last through 2020. Please join me in this SPC first, a conversation focused on women and minorities. We will identify barriers and opportunities faced by women and minorities in IT Security. Men are welcomed and encouraged to attend this session. OUTCOMES: Learn about the role of unconscious bias in hiring decisions * Identify barriers and opportunities for women and minorities in information security * Identify opportunities for EDUCAUSE to develop resources targeting women and minorities
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations