Webinars and other forms of presentations can be a great way to gain familiarity with a new topic or brush up on a skill that you haven’t used in a while. These presentations cover a variety of topics, from security to project management, and come from various sources around the web.
The State of Security and Privacy in Higher Education
As higher education security and privacy professionals convene in Seattle and online for the annual EDUCAUSE Security Professionals Conference, the virtual conference program will kick off with a level setting presentation on the state of security and privacy in higher ed. 2016 Program Chair David Sherry will cover recent trends and perceptions of the discipline from the server room to the board room, as well as the convergence of security and privacy, and emerging impact areas such as compliance and risk management.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Birds-of-a-Feather Sessions (BOFs)
Join colleagues this evening to discuss hot topics in an informal setting. You’ll be able to network and exchange ideas, insights, and experiences. You can also establish a new topic by notifying us in advance (security-council@educause.edu).Topics include: Cybersecurity for science DNS protection, including DKIM and SPF Handling and measuring approaches to phishing PCI training demo REN-ISAC membership services and engagement REN-ISAC Security Event System v3 Sharing best practices on an international level The future of security awareness in higher education Using Splunk to get more value from your logs and find risk
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
“Now What Do I Do?” Welcome and Orientation for First-Timers
The 2016 Security Professionals Conference Program Committee would like to welcome all first-timers and anyone new to the higher ed information security community to this short and informative orientation session. Learn how to navigate the content and program and how to take advantage of the many networking and community building opportunities where you can connect with other attendees while you are in Seattle. You will also find out how to become more involved in this community of information security professionals. Come with your questions and leave prepared to get the most out of the conference.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM05P-FBI Higher Education Cyber-Threat Briefing (Classified) (separate registration required)
Registration for this seminar is now closed.FBI experts will provide insights, based on detailed case studies and analysis, of cyber-threats facing colleges and universities today. EDUCAUSE and the Federal Bureau of Investigation (FBI) have collaborated to offer this threat briefing as part of the Security Professionals Conference. Because of space limitations, participation is restricted to conference registrants who are employees of higher education institutions. Due to the nature of the content, this session will be presented in a secure location within a comfortable walking distance of the Security Professionals Conference location. To participate in this session, each attendee must be a U.S. citizen and will need to provide their personally identifiable information (PII) to the FBI for a limited background check to receive clearance for temporary access to classified information during the session. The FBI will review and confirm attendees for the threat briefing on a first-come, first-served basis. Attendees will receive additional information about the limited background check process from EDUCAUSE during the weeks of March 7 and March 14. All limited background check forms must be submitted by 5pm ET on March 18, 2016.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM02P-Information Security Capability: How Do You Measure Up? (separate registration required)
Registration for this seminar is now closed.Is your information security program topnotch? Or are you hitting a roadblock but you just don’t know why? Building on successful benchmarking initiatives, EDUCAUSE has created a new online service that helps IT leaders assess and benchmark maturity and technology deployment for a suite of strategic initiatives including information security, IT risk management, and IT governance. Join us to learn about the landscape of information security programs in higher education and how to improve in areas of difficulty. OUTCOMES: Benchmark IT’s capability to deliver information security * Inform institutional leadership about areas of success and opportunities for improvement * Discuss action items for improving with leadership
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM03P-Creating a Security Awareness Program: A Templated Approach (separate registration required)
Creating a successful security awareness program can seem like a daunting task for the technical professional now required to engage a nontechnical audience. This task is also challenging for the nontechnical professional who must decipher security technology and buzzwords to determine key messages for their audience. The presenters will share their expertise by providing a templated approach that will enable attendees to get a security awareness program up and running quickly and successfully. OUTCOMES: Develop preliminary security awareness plan * Identify key success factors and resources * Determine how to evaluate an InfoSec program and its activitiesPlease Note: This is a hands-on session and attendees should bring their own laptops.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM01P-Using Splunk in Higher Education (separate registration required)
We will explore a variety of use cases and interactively discuss using Splunk in higher education, focusing on requirements and restrictions. We will discuss how to protect students, faculty, and staff and how to prioritize resources. Topics will include antifraud, DMCA, antiphishing, and leveraging institutional data in Splunk in an interactive discussion with three established Splunk higher ed customers featuring two higher education SplunkTrust members (Splunk’s Community MVP program.) If you use Splunk, this seminar is for you.OUTCOMES: Understand how Splunk can empower a university’s IT staff to protect the entire university * Learn how to be proactive in solving security concerns and do more with limited resourcesPlease Note: This is a hands-on session and attendees should bring their own laptops with Splunk installed and a sample dataset uploaded.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM03A-What Will You Wish for When the Genie Appears? (“The Lesson of the Golden Shovel”) (separate registration required)
What would you ask for if your organization came to you tomorrow and said they’d provide you with the resources and the authority you need to “fix” information security? The CISOs from Stanford, the University of Maryland, and the University of Pennsylvania have all recently experienced a moment like this one, which they describe as both electrifying and terrifying. They will share strategies, tools, and lessons learned on discovering and implementing their top priorities and soliciting significant audience feedback and participation to inform the ideal wish list for any security program. OUTCOMES: Learn the top 3 things every CISO should be asking for * Understand what not to do in this situation * Engage with panelists and attendees to develop your own wish list
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
SEM01F-Developing an “Ideal” Information Security Program (separate registration required)
Come prepared for a crowdsourcing experience that may have an epic impact on your information security program. Together we will deconstruct, design, and build the ideal security program. What will it take to get there? We will explore preparing for the inevitable security disruptions, gaining executive sponsorship, developing campus relationships, delivering security awareness messages, and measuring your program’s maturity. The goal of this seminar is to engage, challenge, and expand your thinking of what it takes to lead and sustain a successful information security program. We will discuss and potentially address security issues from your institution. The facilitators will introduce a variety of methods and case studies to engage you in meaningful and enjoyable ways. Planned exercises may include individual, small team, or large group work, as well as directed role-playing scenarios. OUTCOMES: Gain hands-on experience with common issues and challenges * Learn effective communication and reporting strategies * Actively practice a security pitch to an executive
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations
Robot Writers and the Future of Open Education
Robot reporters are already used to develop original stories that cover news, sports, and economic markets. Combining the same algorithmic approaches to sources of open content, we can now imagine a future where authors outline textbooks that are written by robots. This emerging application of artificial intelligence creates opportunities to save time and money while offering new learning experiences through open learning materials that are authored jointly by human and machine. This session will explore an automated book creation platform developed at Penn State to leverage intelligent algorithms that explore OER repositories and return relevant resources that can be combined, remixed, and reused to support specific learning goals. Information gathered from initial experiments, including student reactions, will also be discussed.
[Read More]
[Read More]
SOURCE: Educause
Webinars & Presentations