Educause Security Discussion mailing list archives

fyi: Re: Security-Related Sessions at EDUCAUSE 2004


From: Tracy Mitrano <tbm3 () CORNELL EDU>
Date: Fri, 17 Sep 2004 12:38:21 -0400

fyi: The Pieces and the Puzzle of IT Policy, pre-conference all-day
seminar, will feature a focus on implementation procedures for security and
authentication and authorization policies with Steve Schuster and Andrea
Beesing of Cornell, afternoon portion especially.

-----Original Message-----
From: The EDUCAUSE Security Discussion Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Valerie Vogel
Sent: Thursday, September 16, 2004 2:29 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Security-Related Sessions at EDUCAUSE 2004

For those of you planning to attend the EDUCAUSE annual conference in
Denver, CO, October 19-22, a summary of security-related sessions is
provided below. Also, please note that the early registration deadline for
EDUCAUSE 2004 is Tuesday, September 21.

Thank you,

Valerie Vogel
Security Task Force Project Assistant
_______________________________________

Security Task Force-Supported Events:

19-Oct, 8:30 am - 12:00 pm
Pre-Conference Seminar 11A: Building Capabilities for Incident Handling &
Response (Killcrece, Milford, & Pearson)*

19-Oct, 8:30 am - 12:00 pm
Pre-Conference Seminar 13A: Security and Identity Management for Small
Colleges (Bruggeman, Petersen, Suess, West, & Young)*

19-Oct, 1:00 - 4:30 pm
Pre-Conference Seminar 11P: Guide to Implementing an Effective Security
Education & Awareness Program (Payne, Trivisani, & Weeks)*

19-Oct, 1:00 - 4:30 pm
Pre-Conference Seminar 13P: Effective Wired and Wireless Network Security
Practices for Higher Education (Kimball, Long, & Misra)*

20-Oct, 11:40 am - 12:30 pm
When the Bits Hit the Fan: Managing Data Security & Privacy (Dillon,
Galiano, & Krogh)

20-Oct, 4:55 - 6:10 pm
Current Issues Roundtable: Security, Privacy, & Identity Management
(Discussion led by Bruhn)

21-Oct, 12:45 - 2:15 pm
EDUCAUSE/Internet Security Task Force Open Meeting/Security Discussion Group
(Petersen, Suess, & Wishon)

21-Oct, 4:55 - 6:10 pm
Current Issues Roundtable: Effective Practices for Network Security
(Discussion led by Dobbins) _______________________________________

Other Security-Related Sessions:

19-Oct, 1:00 - 4:30 pm
Pre-Conference Seminar 09P: Patch Management in Academe: Getting the
Distributed United (Silverstone)*

20-Oct, 2:15 - 3:05 pm
Deploying PKI: Current Developments (Franklin, Ribbeck, & Worona)

20-Oct, 2:15 - 3:05 pm
Effective Practices in Wireless Security for Higher Education (Long)

20-Oct, 2:15 - 3:05 pm
Identity Theft & Other Privacy Threats: Issues and IT Implications (Bradie,
Milici, & Millar)

20-Oct, 3:50 - 4:40 pm
Centralizing IT Risk Assessment & Measuring Security Policy Compliance
(Knudsen & McCabe)

20-Oct, 4:55 - 6:10 pm
Poster Sessions: Access Management Case Study: Adding Decentralization &
Eliminating Paper (Askren, Jones, & Teshirogi); Card Access Systems and
IT: The Perfect Marriage (Bernstein); Dynamic, Scalable Enterprise
Authentication & Authorization Management: PROJECT EDNA at Arizona State
University (Hsu, Rowe, & Skipp); HIPAA Security: Fitting the Pieces Together
(DelFavero, Fauerbach, & Kenigsberg)

21-Oct, 8:10 - 9:00 am
PKI: A Technology Whose Time Has Come in Higher Education (Franklin)

21-Oct, 11:45 am - 12:35 pm
Developing an Effective & Affordable Security Infrastructure in a Small
College Environment (Cunningham)

21-Oct, 2:20 - 3:10 pm
REN-ISAC & the Cyber Security Registry for Higher Education (Pearson)

21-Oct, 3:55 - 4:45 pm
Federations: The Next Step in Middleware (Klingenstein)

21-Oct, 3:55 - 4:45 pm
Systemic Barriers to IT Security (Goldsmith & Watkins)

21-Oct, 3:55 - 4:45 pm
Balancing Security & Privacy in Times of Cyberterror (Mitrano & Worona)

21-Oct, 3:55 - 4:45 pm
Making Online Transactions Legal, Enforceable, & Secure with
E-Signatures: What is Required, When, and Why? (Caruso)

22-Oct, 8:10 - 9:00 am
How Do You Create a Successful Information Security Program? Hire a Great
ISO! (Clark)

22-Oct, 9:30 - 10:20 am
Full Eradication of Social Security Number as an Identifier: A One-Year Case
Study (Bernard, Poindexter, & Tanis)

22-Oct, 9:30 - 10:20 am
Leadership for University Information Security: Vision, Collaboration,
Policy, Funding, & Implementation (Jost, Kassabian, & Millar)
________________________________________________________

To view the entire E2004 program online, please see:
http://www.educause.edu/conference/annual/2004/program.asp. To view a list
of security-related sessions online, select "Security and Identity
Management" under the section Top Higher Education IT Issues.

*Note: Separate registration and fee is required to attend a pre-conference
seminar.

**********
Participation and subscription information for this EDUCAUSE Discussion
Group discussion list can be found at http://www.educause.edu/cg/.

**********
Participation and subscription information for this EDUCAUSE Discussion
Group discussion list can be found at http://www.educause.edu/cg/.

**********
Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at 
http://www.educause.edu/cg/.

Current thread: