Educause Security Discussion: by author
366 messages
starting May 08 19 and
ending Jun 27 19
Date index |
Thread index |
Author index
AIS
Re: Which IAM solution do you recommend? AIS (May 08)
Re: GLBA: How are you handling it? AIS (Jun 06)
Re: Which IAM solution do you recommend? AIS (May 10)
Akey, Michael
VPN Concentrator replacement Akey, Michael (May 07)
Albrecht, Travis
Re: Interesting Research Albrecht, Travis (Apr 02)
Alexandre Adao
Re: 2 factor authentication Alexandre Adao (Jun 14)
Re: Proof point vs Mimecast Alexandre Adao (May 24)
Alex Keller
Re: Unknown traffic to known bad actor Alex Keller (May 30)
Re: OpenVAS Alex Keller (May 23)
Alex Lindstrom
Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Alex Lindstrom (Jun 28)
Andregg, Bryan Courtney
Re: Locking Computer Policy Andregg, Bryan Courtney (May 02)
Angel Howard
Re: Server asset inventory tool Angel Howard (Apr 26)
Ashlar Trystan
Re: Interesting Research Ashlar Trystan (Apr 02)
Austin Bollinger
Loan Forgiveness Scam Austin Bollinger (Apr 15)
Social Media Loan Forgiveness Scam Austin Bollinger (Apr 15)
Baillio, Aaron
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Baillio, Aaron (Apr 05)
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast Baillio, Aaron (May 23)
Bandy, John
Re: VPN Concentrator replacement Bandy, John (May 08)
Barnes, Joe
Job Posting - Cybersecurity Risk Administrative Associate Barnes, Joe (May 09)
Job Posting - University of Illinois - Cybersecurity Specialist Barnes, Joe (Apr 18)
Barton, Robert W.
Re: Prex FR Barton, Robert W. (May 29)
Re: Interesting Research Barton, Robert W. (Apr 02)
OpenVAS Barton, Robert W. (May 23)
FMAudit Barton, Robert W. (Apr 17)
Account Creation, Usage & Inclusion Barton, Robert W. (Jun 10)
Cyber Security Insurance Barton, Robert W. (Jun 24)
Re: FMAudit Barton, Robert W. (Apr 17)
Belford, Jason C. (jcb3zr)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Belford, Jason C. (jcb3zr) (May 14)
Ben Marsden
Re: 2 factor authentication Ben Marsden (Jun 07)
Ben Singh (OculusIT)
Re: IAM solution - cloud-based? Ben Singh (OculusIT) (Jun 26)
Bill Thompson
Re: Which IAM solution do you recommend? Bill Thompson (May 10)
Bob Mahoney
Re: Cybersecurity Students Bob Mahoney (Apr 05)
Brad Judy
Re: Interesting Research Brad Judy (Apr 02)
Re: Initial Phishing Simulation - Do you tell them first? Brad Judy (Jun 13)
Re: eDiscovery Solutions Brad Judy (May 29)
SPC possible Sun and Mon night outings Brad Judy (May 10)
Re: Web vulnerability scanning of hosted environments and SAAS Brad Judy (Apr 26)
Incident response and monitoring lead opening Brad Judy (May 13)
Re: Which IAM solution do you recommend? Brad Judy (May 10)
Re: eDiscovery Solutions Brad Judy (May 30)
Brautigam, Keith Adam
Re: Which IAM solution do you recommend? Brautigam, Keith Adam (May 20)
Brian Basgen
Re: Initial Phishing Simulation - Do you tell them first? Brian Basgen (Jun 13)
Re: Cybersecurity Students Brian Basgen (Apr 05)
Brian Clark
Re: 2 factor authentication Brian Clark (Jun 07)
2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)
Brian Epstein
Re: Wireless Network Rogue Access Points Brian Epstein (May 09)
Re: 2 factor authentication Brian Epstein (Jun 07)
Re: 2 factor authentication Brian Epstein (Jun 07)
Re: VPN Concentrator replacement Brian Epstein (May 07)
Brian Kelly
Presenting Enterprise Risk Register to the board? Brian Kelly (Apr 16)
EDUCAUSE Cybersecurity Program day at IBM X-Force Command Center Brian Kelly (Jun 06)
CISO reporting relationship survey from CIO listserv Brian Kelly (Jun 06)
TargetX vulnerability post Brian Kelly (Apr 04)
Update : TargetX vulnerability post Brian Kelly (Apr 05)
Bridges, Robert A.
Re: [EXTERNAL] Re: [SECURITY] Benign samples for testing AV vendors Bridges, Robert A. (May 22)
Benign samples for testing AV vendors Bridges, Robert A. (May 20)
Re: [EXTERNAL] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Bridges, Robert A. (Jun 13)
Re: Interesting Research Bridges, Robert A. (Apr 02)
Re: Interesting Research Bridges, Robert A. (Apr 02)
Bruce Carter
Re: 2 factor authentication Bruce Carter (Jun 14)
Re: 2 factor authentication Bruce Carter (Jun 14)
Bryce Porter
Re: eDiscovery Solutions Bryce Porter (May 29)
eDiscovery Solutions Bryce Porter (May 29)
Bukaweski, Dylan S
Re: [External] [SECURITY] PCI keeping it simple Bukaweski, Dylan S (Apr 23)
Bumpas, Shana
Re: KnowBe4 Security & Awareness Training Feedback Bumpas, Shana (Apr 04)
Burns, Denis
Re: Cybersecurity Students Burns, Denis (Apr 05)
Re: Locking Computer Policy Burns, Denis (May 02)
Cam Beasley
fyi: free community-based vendor assessment tool [ISORA-Lite] Cam Beasley (May 13)
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley (Apr 01)
Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley (Jun 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley (Jun 04)
Summary Report :: Dorkbot Service [APR 2019-04] Cam Beasley (May 01)
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley (Apr 01)
Casanova, Jodi
Phish Hunter Casanova, Jodi (Jun 12)
Cathy Hubbs
Question for those using a FIM for PCI compliance Cathy Hubbs (Apr 30)
Cavender, Terry L
Re: 2 factor authentication Cavender, Terry L (Jun 11)
Chad Tracy
Re: 2 factor authentication Chad Tracy (Jun 07)
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Chad Tracy (May 23)
Done in 60 seconds - who doesn't love a short survey Chad Tracy (May 20)
Cheryl Washington
EDUCAUSE - Leadership Institute Program Cheryl Washington (Apr 15)
Chrisinger, Cory A
Re: Phish Hunter Chrisinger, Cory A (Jun 13)
Chris Wilson
Unknown traffic to known bad actor Chris Wilson (May 30)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson (Jun 04)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson (Jun 04)
Clark Gaylord
Re: Server asset inventory tool Clark Gaylord (Apr 29)
Re: Interesting Research Clark Gaylord (Apr 02)
Cleary, Kevin
Re: Container Security Cleary, Kevin (Jun 04)
Re: Server asset inventory tool Cleary, Kevin (Apr 25)
Colin Abbott
SecureLink vs VPN for privileged vendor access Colin Abbott (May 24)
Distributing initial credential Colin Abbott (Apr 10)
Colleen Keller
Re: Cybersecurity Insurance Colleen Keller (Jun 07)
Coller, Jon
Re: Transport rule to put a header on external email Coller, Jon (May 07)
Conlee, Keith
Re: Training and Compliance Portal Conlee, Keith (Jun 26)
Corley, Robert B (KCTCS)
KY Cybersecurity Summit Corley, Robert B (KCTCS) (Jun 26)
Dale Lee
Re: FMAudit Dale Lee (Apr 17)
Dan Jones
Re: Presenting Enterprise Risk Register to the board? Dan Jones (Apr 16)
Dave Broucek
Re: Locking Computer Policy Dave Broucek (May 02)
Data Protection Officer (DPO) Dave Broucek (Apr 05)
Re: Initial Phishing Simulation - Do you tell them first? Dave Broucek (Jun 13)
David Curry
Job Postings - Privacy Engineer, Privacy & Security Compliance Specialist David Curry (Jun 26)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] David Curry (Jun 04)
David Eilken
Re: Initial Phishing Simulation - Do you tell them first? David Eilken (Jun 17)
Re: Which IAM solution do you recommend? David Eilken (May 09)
Initial Phishing Simulation - Do you tell them first? David Eilken (Jun 12)
Not using Kaspersky? David Eilken (Apr 04)
David Escalante
Re: SPC possible Sun and Mon night outings David Escalante (May 10)
Re: Server asset inventory tool David Escalante (Apr 26)
Davis, Ken
Re: Student Identity Verification Davis, Ken (Jun 04)
Dennis Bolton
Re: Initial Phishing Simulation - Do you tell them first? Dennis Bolton (Jun 13)
Dewight Fredrick Kramer
UC Davis Info Sec Job Opportunities Dewight Fredrick Kramer (Jun 03)
Diane Camper
Re: [External] SECURITY Digest - 30 May 2019 to 31 May 2019 (#2019-97) Diane Camper (May 31)
Re: unknown traffic to bad actor Diane Camper (May 31)
Re: unknown traffic to bad actor Diane Camper (May 31)
Dugan, Darin D [ITSYS]
Re: VPN Concentrator replacement Dugan, Darin D [ITSYS] (May 08)
Re: 2 factor authentication Dugan, Darin D [ITSYS] (Jun 14)
Re: Microsoft MFA Opt-In Dugan, Darin D [ITSYS] (May 29)
Emily Harris
Job Posting: Director of Information Security for Willams College, Williamstown, MA Emily Harris (May 21)
Eric Epps
Re: Training and Compliance Portal Eric Epps (May 28)
Re: Training and Compliance Portal Eric Epps (Jun 26)
Eric Sawyer
Re: Initial Phishing Simulation - Do you tell them first? Eric Sawyer (Jun 13)
Eric Weakland
Re: Initial Phishing Simulation - Do you tell them first? Eric Weakland (Jun 13)
Erik D Evans
Re: Transport rule to put a header on external email Erik D Evans (May 09)
Escue, Charles E
Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Escue, Charles E (Jun 28)
Francisco Chavez
Re: Which IAM solution do you recommend? Francisco Chavez (May 09)
Re: a few more 2 factor authentication questions Francisco Chavez (Jun 21)
Re: VPN Concentrator replacement Francisco Chavez (May 07)
Re: BCP & DR policy Francisco Chavez (Apr 30)
Frank Barton
Re: Proof point vs Mimecast Frank Barton (May 24)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton (Jun 04)
Re: Disk encryption Frank Barton (Jun 04)
Due Diligence, vendor assessments, etc. Frank Barton (Apr 30)
Re: Cybersecurity Students Frank Barton (Apr 04)
Re: Benign samples for testing AV vendors Frank Barton (May 20)
Re: MSUDenver seeing potential bot-net DDOS Frank Barton (Apr 03)
Re: FMAudit Frank Barton (Apr 18)
Re: Transport rule to put a header on external email Frank Barton (May 07)
Re: MSUDenver seeing potential bot-net DDOS Frank Barton (Apr 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton (Jun 04)
Gael Frouin
Re: Interesting Research Gael Frouin (Apr 02)
Gavin Wiltshire
Re: Prex FR Gavin Wiltshire (May 29)
Gene LeDuc
Re: [EXTERNAL] [SECURITY] SecureLink Vendor Access Gene LeDuc (Jun 25)
Re: [EXTERNAL] [SECURITY] SecureLink vs VPN for privileged vendor access Gene LeDuc (May 24)
George J. Silowash
Student Identity Verification George J. Silowash (Jun 04)
Giacobe, Nick
Re: Cybersecurity Students Giacobe, Nick (Apr 05)
Re: Cybersecurity Students Giacobe, Nick (Apr 05)
Glenn Forbes Fleming Larratt
Re: Interesting Reseach Glenn Forbes Fleming Larratt (Apr 03)
Gonzalez, Joshua
Re: 2 factor authentication Gonzalez, Joshua (Jun 11)
Gregg, Christopher S.
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Gregg, Christopher S. (May 22)
Re: [External] Re: [SECURITY] Transport rule to put a header on external email Gregg, Christopher S. (May 09)
Re: [External] [SECURITY] Locking Computer Policy Gregg, Christopher S. (May 02)
Re: [External] Re: [SECURITY] Student employees and access to data Gregg, Christopher S. (May 10)
Re: [External] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Gregg, Christopher S. (Jun 13)
Re: [External] Re: [SECURITY] 2 factor authentication Gregg, Christopher S. (Jun 11)
Greg Williams
Re: Cybersecurity Students Greg Williams (Apr 04)
Re: Interesting Research Greg Williams (Apr 02)
Grilli, Brian Robert
Re: BitLocker Grilli, Brian Robert (Jun 28)
Grinnell, Michael (mg7aa)
SANS SEC401 Training at UVA Grinnell, Michael (mg7aa) (Jun 11)
Re: SANS SEC401 Training at UVA Grinnell, Michael (mg7aa) (Jun 17)
Hagan, Sean
Re: Cybersecurity Insurance Hagan, Sean (Jun 07)
Hall, Rand
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Hall, Rand (Jun 04)
Harry Hoffman
Re: Prex FR Harry Hoffman (May 29)
Hart, Michael
Re: Cybersecurity Insurance Hart, Michael (Jun 07)
Re: MSUDenver seeing potential bot-net DDOS Hart, Michael (Apr 03)
Re: Initial Phishing Simulation - Do you tell them first? Hart, Michael (Jun 13)
MSUDenver seeing potential bot-net DDOS Hart, Michael (Apr 03)
Harvard Townsend
Re: Phish Hunter Harvard Townsend (Jun 12)
Haselhoff, Brent
Re: a few more 2 factor authentication questions Haselhoff, Brent (Jun 21)
Re: PCI keeping it simple Haselhoff, Brent (Apr 23)
Herring, Todd William
SANS / REN-ISAC Partnership Program Herring, Todd William (Jun 05)
Hiram Wong
Re: Interesting Research Hiram Wong (Apr 02)
Jackson, Ms. D'Ann
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Jackson, Ms. D'Ann (Apr 15)
Digital Risk Protection Inquiry Jackson, Ms. D'Ann (May 20)
James Farr
Re: Gmail Options for SPAM and Phishing James Farr (Apr 24)
Gmail Options for SPAM and Phishing James Farr (Apr 09)
James Valente
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente (Jun 12)
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data James Valente (May 10)
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente (Jun 12)
Jared Evans
Which IAM solution do you recommend? Jared Evans (May 08)
IAM solution - cloud-based? Jared Evans (Jun 26)
Web vulnerability scanning of hosted environments and SAAS Jared Evans (Apr 26)
Jarret Cummings
Re: GLBA: How are you handling it? Jarret Cummings (Jun 06)
Re: GLBA: How are you handling it? Jarret Cummings (Jun 06)
Safeguards Rule additional requirements proposal tomorrow Jarret Cummings (Apr 03)
Re: GLBA: How are you handling it? Jarret Cummings (Jun 07)
Jason Borinski
Container Security Jason Borinski (Jun 03)
Re: Container Security Jason Borinski (Jun 04)
Jason Edelstein
Re: Proof point vs Mimecast Jason Edelstein (May 23)
Jason Fried
Banner 9 - Limiting Access to student records Jason Fried (May 29)
Re: Initial Phishing Simulation - Do you tell them first? Jason Fried (Jun 13)
Jeff Choo
Re: Personal Email and other Services Jeff Choo (May 02)
Jenny Blaine
Re: 2 factor authentication Jenny Blaine (Jun 07)
Jesse Bowling
Unofficial SPC event: Joshua Beeman Memorial Fun Run Jesse Bowling (May 11)
Jessica Murray
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Jessica Murray (Apr 05)
Jessica P Drefs
Policy Exception vs Risk Acceptance Jessica P Drefs (May 20)
Joey Rego
GLBA: How are you handling it? Joey Rego (Jun 06)
John Chapman
Re: Interesting Research John Chapman (Apr 03)
John McCabe
Re: Interesting Research John McCabe (Apr 02)
Disk encryption John McCabe (Jun 04)
Re: Benign samples for testing AV vendors John McCabe (May 20)
Johnson Akse, Terri
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri (Apr 15)
Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri (Apr 15)
Jones, Mark B
Re: Interesting Research Jones, Mark B (Apr 02)
José A . Domínguez
Fwd: Call for Participation Open - Internet2 TechEX 2019 José A . Domínguez (Apr 29)
Joseph Tam
Re: MSUDenver seeing potential bot-net DDOS Joseph Tam (Apr 03)
JT Moser
Re: BCP & DR policy JT Moser (Apr 30)
Julian Y Koh
Re: Locking Computer Policy Julian Y Koh (May 02)
Ken Connelly
Re: Initial Phishing Simulation - Do you tell them first? Ken Connelly (Jun 13)
Kevin Wilcox
Re: 2 factor authentication Kevin Wilcox (Jun 07)
Re: Benign samples for testing AV vendors Kevin Wilcox (May 20)
Re: Server asset inventory tool Kevin Wilcox (Apr 26)
Re: 2 factor authentication Kevin Wilcox (Jun 07)
King, Ronald A.
Re: Interesting Research King, Ronald A. (Apr 09)
Re: Locking Computer Policy King, Ronald A. (May 06)
Re: VPN Concentrator replacement King, Ronald A. (May 08)
NSU is Hiring Senior Network Engineer and a Project Engineer King, Ronald A. (Apr 19)
Re: Personal Email and other Services King, Ronald A. (May 06)
Interesting Research King, Ronald A. (Apr 02)
Re: 2 factor authentication King, Ronald A. (Jun 11)
Re: Student employees and access to data King, Ronald A. (May 10)
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast King, Ronald A. (May 23)
Re: Personal Email and other Services King, Ronald A. (May 07)
Re: OpenVAS King, Ronald A. (May 23)
Kristen Dietiker
G Suite marketplace policies and guidelines Kristen Dietiker (Apr 08)
Kristi Olson
Re: SECURITY Digest - 1 Apr 2019 to 2 Apr 2019 - Special issue (#2019-56) Kristi Olson (Apr 02)
Kurtz, Eric
Re: Microsoft MFA Opt-In Kurtz, Eric (May 29)
Lance Hourany
Cybersecurity Insurance Lance Hourany (Jun 07)
Larry K. Emmons
SecureLink Vendor Access Larry K. Emmons (Jun 25)
Laverty, Patrick
Re: Interesting Research Laverty, Patrick (Apr 02)
Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Scott Bell Lazar, Edgar (NBCC) (May 28)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Canceled: Prex FR Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Canceled: Scott Bell Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Prex FR Lazar, Edgar (NBCC) (May 28)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Leah Lang
Re: 2 factor authentication Leah Lang (Jun 10)
Re: Which IAM solution do you recommend? Leah Lang (May 09)
Linc Nesheim
Re: Student employees and access to data Linc Nesheim (May 10)
Lovaas,Steven
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven (Jun 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven (Jun 03)
Ludwig, Linda
Re: [External] [SECURITY] PCI keeping it simple Ludwig, Linda (Apr 23)
Madl, Michael
Re: Transport rule to put a header on external email Madl, Michael (May 07)
Re: KnowBe4 Security & Awareness Training Feedback Madl, Michael (Apr 01)
Mahmud Rahman
Re: Which IAM solution do you recommend? Mahmud Rahman (May 08)
Re: IAM solution - cloud-based? Mahmud Rahman (Jun 26)
Mandi Witkovsky
Re: Locking Computer Policy Mandi Witkovsky (May 02)
Transport rule to put a header on external email Mandi Witkovsky (May 07)
Server asset inventory tool Mandi Witkovsky (Apr 24)
Mardecia Bell
Re: EDUCAUSE - Leadership Institute Program Mardecia Bell (Apr 15)
Mark Poepping
Re: Interesting Research Mark Poepping (Apr 09)
Mark Purcell
Re: GLBA: How are you handling it? Mark Purcell (Jun 06)
Matt Boeckner
Re: 2 factor authentication Matt Boeckner (Jun 14)
Matt Hall
Job Posting - Director of Information Technology Matt Hall (May 29)
Matthew D Kelly
Security incident with Nebraska Books/PrismRBS Matthew D Kelly (May 06)
Max McGrath
Re: Proof point vs Mimecast Max McGrath (May 23)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath (May 12)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath (May 14)
Menne, Michael S
Re: Phish Hunter Menne, Michael S (Jun 21)
Michael Duff
Re: Cybersecurity Students Michael Duff (Apr 05)
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Michael Duff (Apr 05)
Michael Passer
Grand Rapids, MI job opportunity closing 5/2 - Enterprise Analyst, security emphasis Michael Passer (Apr 24)
Michael William Zimmer
Re: Which IAM solution do you recommend? Michael William Zimmer (May 08)
Miguel Angel Gonzalez de la Torre
Re: Which IAM solution do you recommend? Miguel Angel Gonzalez de la Torre (May 08)
Mike Beane
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data Mike Beane (May 10)
Mike Wiseman
Re: VPN Concentrator replacement Mike Wiseman (May 08)
Neal O'Farrell
Re: Training and Compliance Portal Neal O'Farrell (Jun 26)
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell (Jun 13)
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Neal O'Farrell (Apr 15)
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell (Jun 13)
Re: TargetX vulnerability post Neal O'Farrell (Apr 08)
Re: TargetX vulnerability post Neal O'Farrell (Apr 08)
Nicholas Garigliano
Re: Cybersecurity Students Nicholas Garigliano (Apr 05)
O'Callaghan, Daniel
Re: Proof point vs Mimecast O'Callaghan, Daniel (May 23)
Odi Iancu
Re: 2 factor authentication Odi Iancu (Jun 12)
Pardonek, Jim
Training and Compliance Portal Pardonek, Jim (May 24)
Microsoft MFA Opt-In Pardonek, Jim (May 29)
Re: VPN Concentrator replacement Pardonek, Jim (May 08)
Paul Chauvet
Re: PCI keeping it simple Paul Chauvet (Apr 23)
Re: Server asset inventory tool Paul Chauvet (Apr 29)
Paul Howell
Senior Cyberinfrastructure Security Architect Paul Howell (May 20)
Job Posting - DevOPs Network Engineer Paul Howell (May 29)
Penn, Blake C
Re: GLBA: How are you handling it? Penn, Blake C (Jun 06)
Re: GLBA: How are you handling it? Penn, Blake C (Jun 06)
Perrotti, Gregory
Wireless Network Rogue Access Points Perrotti, Gregory (May 09)
Pesino, Sherry
Re: Student employees and access to data Pesino, Sherry (May 10)
Pete, Andrew
Re: Managed services provider question Pete, Andrew (Jun 13)
Re: Cybersecurity Students Pete, Andrew (Apr 05)
Managed services provider question Pete, Andrew (Jun 12)
Student employees and access to data Pete, Andrew (May 10)
Re: Managed services provider question Pete, Andrew (Jun 12)
Cybersecurity Students Pete, Andrew (Apr 04)
Petrus Williams
Personal Email and other Services Petrus Williams (May 02)
Pitt, Sharon
Re: Cybersecurity Insurance Pitt, Sharon (Jun 07)
Quackenbush, Darlene H - quackedh
Re: HECVAT and HECVAT lite Threshold Quackenbush, Darlene H - quackedh (Jun 27)
Richard Siedzik
Re: (WARNING) Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Richard Siedzik (Jun 13)
Re: (WARNING) Re: [SECURITY] Cybersecurity Insurance Richard Siedzik (Jun 07)
Rich Lang
Data Center Forward Proxies/Web Security Gateways Rich Lang (Apr 18)
Robert Smith
BCP & DR policy Robert Smith (Apr 30)
Rob Milman
Re: Initial Phishing Simulation - Do you tell them first? Rob Milman (Jun 13)
Re: Cybersecurity Students Rob Milman (Apr 05)
Ronald Loneker
Re: Locking Computer Policy Ronald Loneker (May 06)
Locking Computer Policy Ronald Loneker (May 01)
Re: Locking Computer Policy Ronald Loneker (May 06)
Samih Ajrouch
Data centers DR Samih Ajrouch (May 01)
Re: Server asset inventory tool Samih Ajrouch (Apr 26)
Sarah Bigham
[Registration Reminder] REN-ISAC Workshop @ Purdue University Ft. Wayne: 7/9/19 Sarah Bigham (Jun 17)
Schnitzer, Lawrence
a few more 2 factor authentication questions Schnitzer, Lawrence (Jun 21)
Schwartz, John
Re: Presenting Enterprise Risk Register to the board? Schwartz, John (Apr 16)
Scott Stoops
Re: Initial Phishing Simulation - Do you tell them first? Scott Stoops (Jun 13)
Re: Distributing initial credential Scott Stoops (Apr 10)
Re: SPC possible Sun and Mon night outings Scott Stoops (May 10)
Seidl, David
Job Posting - Assistant Vice President and CISO at Miami University (Ohio) Seidl, David (May 30)
Seth A. Shestack
Re: 2 factor authentication Seth A. Shestack (Jun 12)
Sharkirah Foote
Re: DUO vs Azure/O365 MFA Sharkirah Foote (Apr 30)
Snook, Allen
Re: Proof point vs Mimecast Snook, Allen (May 24)
Proof point vs Mimecast Snook, Allen (May 23)
Sonder, Henk E.
Re: Managed services provider question Sonder, Henk E. (Jun 13)
Re: Initial Phishing Simulation - Do you tell them first? Sonder, Henk E. (Jun 13)
Stefan Wahe
Prex FR Stefan Wahe (May 28)
CALL FOR PROPOSALS: UW-Madison Cybersecurity Lockdown Conference Stefan Wahe (Apr 29)
Steven Helwig
Please Remove from The List Steven Helwig (May 08)
Steve Niedzwiecki
Re: DUO vs Azure/O365 MFA Steve Niedzwiecki (Apr 15)
St-Jean, Daniel
BitLocker St-Jean, Daniel (Jun 28)
Tanner, Andrea
Re: Interesting Research Tanner, Andrea (Apr 02)
Taylor Randle
Re: Proof point vs Mimecast Taylor Randle (May 23)
Telfer, Will
Re: a few more 2 factor authentication questions Telfer, Will (Jun 21)
Re: 2 factor authentication Telfer, Will (Jun 07)
Re: DUO vs Azure/O365 MFA Telfer, Will (Apr 16)
Re: 2 factor authentication Telfer, Will (Jun 07)
Re: VPN Concentrator replacement Telfer, Will (May 07)
Thierry Lechler
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler (Apr 23)
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler (Apr 23)
Thomas Carter
Re: Transport rule to put a header on external email Thomas Carter (May 07)
Thomas Dugas
Re: Which IAM solution do you recommend? Thomas Dugas (May 08)
Tomassetti, Tina
Re: Server asset inventory tool Tomassetti, Tina (Apr 25)
Tom Miller
Re: Malware detection Tom Miller (Apr 01)
Re: Managed services provider question Tom Miller (Jun 12)
Re: Locking Computer Policy Tom Miller (May 02)
Re: Managed services provider question Tom Miller (Jun 13)
Valdis Klētnieks
Re: Personal Email and other Services Valdis Klētnieks (May 06)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Valdis Klētnieks (Jun 04)
Valerie Vogel
SANS Security Awareness Summit, August 7-8 in San Diego Valerie Vogel (Jun 12)
Re: Initial Phishing Simulation - Do you tell them first? Valerie Vogel (Jun 13)
CyberStart Program for College Students Valerie Vogel (May 07)
Announcing our July 18 Coffee Shop on Preparing for NCSAM! Valerie Vogel (Jun 21)
Von Welch (Work)
Re: Interesting Research Von Welch (Work) (Apr 02)
Wade Lambert
Re: SECURITY Digest - 24 Apr 2019 to 25 Apr 2019 (#2019-74) Wade Lambert (Apr 26)
Watkins, Jameson
Re: Initial Phishing Simulation - Do you tell them first? Watkins, Jameson (Jun 18)
Wessam Maher
DUO vs Azure/O365 MFA Wessam Maher (Apr 14)
ClearPass 802.1x and password change/expiry Wessam Maher (Apr 13)
Windham, Gary D - (windhamg)
Re: 2 factor authentication Windham, Gary D - (windhamg) (Jun 07)
Yost, Davis
PCI keeping it simple Yost, Davis (Apr 23)
Zachary Yamada
Re: Cybersecurity Students Zachary Yamada (Apr 04)
Zeshan Siddiqui
HECVAT and HECVAT lite Threshold Zeshan Siddiqui (Jun 27)