Educause Security Discussion mailing list archives
fyi: Re: Security-Related Sessions at EDUCAUSE 2004
From: Tracy Mitrano <tbm3 () CORNELL EDU>
Date: Fri, 17 Sep 2004 12:38:21 -0400
fyi: The Pieces and the Puzzle of IT Policy, pre-conference all-day seminar, will feature a focus on implementation procedures for security and authentication and authorization policies with Steve Schuster and Andrea Beesing of Cornell, afternoon portion especially. -----Original Message-----
From: The EDUCAUSE Security Discussion Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Valerie Vogel Sent: Thursday, September 16, 2004 2:29 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] Security-Related Sessions at EDUCAUSE 2004 For those of you planning to attend the EDUCAUSE annual conference in Denver, CO, October 19-22, a summary of security-related sessions is provided below. Also, please note that the early registration deadline for EDUCAUSE 2004 is Tuesday, September 21. Thank you, Valerie Vogel Security Task Force Project Assistant _______________________________________ Security Task Force-Supported Events: 19-Oct, 8:30 am - 12:00 pm Pre-Conference Seminar 11A: Building Capabilities for Incident Handling & Response (Killcrece, Milford, & Pearson)* 19-Oct, 8:30 am - 12:00 pm Pre-Conference Seminar 13A: Security and Identity Management for Small Colleges (Bruggeman, Petersen, Suess, West, & Young)* 19-Oct, 1:00 - 4:30 pm Pre-Conference Seminar 11P: Guide to Implementing an Effective Security Education & Awareness Program (Payne, Trivisani, & Weeks)* 19-Oct, 1:00 - 4:30 pm Pre-Conference Seminar 13P: Effective Wired and Wireless Network Security Practices for Higher Education (Kimball, Long, & Misra)* 20-Oct, 11:40 am - 12:30 pm When the Bits Hit the Fan: Managing Data Security & Privacy (Dillon, Galiano, & Krogh) 20-Oct, 4:55 - 6:10 pm Current Issues Roundtable: Security, Privacy, & Identity Management (Discussion led by Bruhn) 21-Oct, 12:45 - 2:15 pm EDUCAUSE/Internet Security Task Force Open Meeting/Security Discussion Group (Petersen, Suess, & Wishon) 21-Oct, 4:55 - 6:10 pm Current Issues Roundtable: Effective Practices for Network Security (Discussion led by Dobbins) _______________________________________ Other Security-Related Sessions: 19-Oct, 1:00 - 4:30 pm Pre-Conference Seminar 09P: Patch Management in Academe: Getting the Distributed United (Silverstone)* 20-Oct, 2:15 - 3:05 pm Deploying PKI: Current Developments (Franklin, Ribbeck, & Worona) 20-Oct, 2:15 - 3:05 pm Effective Practices in Wireless Security for Higher Education (Long) 20-Oct, 2:15 - 3:05 pm Identity Theft & Other Privacy Threats: Issues and IT Implications (Bradie, Milici, & Millar) 20-Oct, 3:50 - 4:40 pm Centralizing IT Risk Assessment & Measuring Security Policy Compliance (Knudsen & McCabe) 20-Oct, 4:55 - 6:10 pm Poster Sessions: Access Management Case Study: Adding Decentralization & Eliminating Paper (Askren, Jones, & Teshirogi); Card Access Systems and IT: The Perfect Marriage (Bernstein); Dynamic, Scalable Enterprise Authentication & Authorization Management: PROJECT EDNA at Arizona State University (Hsu, Rowe, & Skipp); HIPAA Security: Fitting the Pieces Together (DelFavero, Fauerbach, & Kenigsberg) 21-Oct, 8:10 - 9:00 am PKI: A Technology Whose Time Has Come in Higher Education (Franklin) 21-Oct, 11:45 am - 12:35 pm Developing an Effective & Affordable Security Infrastructure in a Small College Environment (Cunningham) 21-Oct, 2:20 - 3:10 pm REN-ISAC & the Cyber Security Registry for Higher Education (Pearson) 21-Oct, 3:55 - 4:45 pm Federations: The Next Step in Middleware (Klingenstein) 21-Oct, 3:55 - 4:45 pm Systemic Barriers to IT Security (Goldsmith & Watkins) 21-Oct, 3:55 - 4:45 pm Balancing Security & Privacy in Times of Cyberterror (Mitrano & Worona) 21-Oct, 3:55 - 4:45 pm Making Online Transactions Legal, Enforceable, & Secure with E-Signatures: What is Required, When, and Why? (Caruso) 22-Oct, 8:10 - 9:00 am How Do You Create a Successful Information Security Program? Hire a Great ISO! (Clark) 22-Oct, 9:30 - 10:20 am Full Eradication of Social Security Number as an Identifier: A One-Year Case Study (Bernard, Poindexter, & Tanis) 22-Oct, 9:30 - 10:20 am Leadership for University Information Security: Vision, Collaboration, Policy, Funding, & Implementation (Jost, Kassabian, & Millar) ________________________________________________________ To view the entire E2004 program online, please see: http://www.educause.edu/conference/annual/2004/program.asp. To view a list of security-related sessions online, select "Security and Identity Management" under the section Top Higher Education IT Issues. *Note: Separate registration and fee is required to attend a pre-conference seminar. ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/. ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/.
********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/.
Current thread:
- fyi: Re: Security-Related Sessions at EDUCAUSE 2004 Tracy Mitrano (Sep 17)