Educause Security Discussion mailing list archives

Educause 2006 Annual Conference Program: Security/Privacy/Policy and related talks/meetings


From: "H. Morrow Long" <morrow.long () YALE EDU>
Date: Sun, 10 Sep 2006 21:41:27 -0400

The Educause 2006 Annual Conference in Dallas Texas (October 10-12 regular sessions, October 9 - Preconference seminars) will have a track (#6) dedicated to IT security and privacy talks related to higher education. In addition there are talks on security, privacy, policy and related topics (disaster recovery, business continuity, identity management, regulation compliance, IT governance) in other tracks (particularly Track 4: Leadership, Management, Planning, and Funding and Track 5: Networking and Infrastructure).

In addition there will be many additional opportunities to meet with other IT security and information assurance practitioners at Educause 2006 ( BoFs, an open meeting of the Educause/I2 Security Task Force, Roundtables, Poster Sessions, Vendor talks and exhibits in the show hall).

Consider attending Educause 2006 as a professional development and leadership opportunity (particularly if you are in or interested in Information Security management and policy).

You can find the full conference program at: http://www.educause.edu/ e06/program/9153

If you will be attending Educause 2006 -- the following Track 6 sessions and security, privacy and policy related sessions still need conveners (the full list of Track 6 and other security/privacy/ policy related sessions are listed at the end.).

Track 6 sessions still needing conveners:
11 Oct 8;10am-9:00a Deciding Who's on First: Establishing the Identity Management Leadership Group 11 Oct 3:55pm-4:45p Incorporate Security Risk Analysis into Software Development

Track 5 security-related session needing a convener:
10 Oct 3:50pm-4:40p When Account Management Is Not Enough: Identity at RIT

If you are interested in convening one of these sessions you can make yourself the convener by authenticating (e.g. signing into the Educause 2006 registration site), browsing to the detailed conference program agenda, clicking on the session and then clicking on the link labeld 'volunteer form' to add yourself as the convener.

Note that this is taking on the responsibilities of checking in at the morning breakfast before the session, showing up at the session meeting room at least 15 minutes before the session, fulfilling the duties of a convener and attending the session.

You can sign up to convene any E2006 session directly at :
http://www.educause.edu/E06/ConvenerVolunteer/9166

If you sign up to convene a session you will receive an email explaining all of the details and responsibilities involved.

Full list of Track 6: Security, Privacy, and Policy Sessions

Tuesday, October 10, 2006
Session Time    Session Details
10:30 a.m. - 11:20 a.m. Track 6 : Getting from Illegal P2P File Sharing to Good Digital Citizenship
                                                Track 6 : Stay Out of the News: Encrypt Your Files
11:40 a.m. - 12:30 p.m. Track 6 : NSF Middleware Initiative: Managing Identity on Campus 2:15 p.m. - 3:05 p.m. Track 6 : Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research, Higher, and Further Education 3:50 p.m. - 4:40 p.m. Track 6 : Who Owns These Data Anyway? Corralling Data Stewardship

Wednesday, October 11, 2006
Session Time    Session Details
8:10 a.m. - 9:00 a.m. Track 6 : Deciding Who's on First: Establishing the Identity Management Leadership Group 11:45 a.m. - 12:35 p.m. Track 6 : Implementing an Information Technology Security Program
                                                Track 6 : Policing the Internet: Higher Education Law and Policy
2:20 p.m. - 3:10 p.m. Track 6 : Ensure IT's Quality, Ensure IT's Security, or Throw IT Out! 3:55 p.m. - 4:45 p.m. Track 6 : Incorporate Security Risk Analysis into Software Development

Thursday, October 12, 2006
Session Time    Session Details
8:10 a.m. - 9:00 a.m. Track 6 : How to Successfully Defend Against IRC Bots, Compromises, and Information Leaks
9:30 a.m. - 10:20 a.m.  Track 6 : TUid: There Is Safety in Numbers

Full list of all other related non Track 6 sessions, working group meetings and poster sessions:

Preconference Seminars on Monday 10/9/2006 (Note: Separate registration and fee are required to attend each seminar.): 01A 8:30 a.m. – 12:00 Assessing Security, Reliability, and Survivability Before Implementation
10A 8:30 a.m. – 12:00           Compliance in Higher Ed Is More Than FERPA
14A 8:30 a.m. – 12:00           Enterprise Security Planning for CIOs
09F 8:30 a.m. – 4:30 p.m.       Effective IT Security Practices
11P 1:00 p.m. – 4:30 p.m. Avoiding Your Worst Nightmare: Strategies for Information Security 08P 1:00 p.m. – 4:30 p.m. Deploying Shibboleth: Technical Requirements, Policy Issues, and Case Studies

General Session Uncovering the Science in Computer Science: Challenges for the 21st Century
8:15 a.m. – 9:45 a.m. Tuesday

Track Time                              Day     Title
4 10:30 a.m. – 11:20 a.m.       Tue The 2006 Campus Computing Survey
5 10:30 a.m. – 11:20 a.m. Tue Who Are You (Today)?: Integrating Identity Life Cycles with Information Services 5 10:30 a.m. – 11:20 a.m. Tue Your Papers, Please: The Government Discovers Identity Management 4 11:40 a.m. – 12:30 p.m. Tue Policy and Process for Security of Institutional Data 4 2:15 p.m. – 3:05 p.m. Tue Start with a Great Information Security Plan! 5 3:50 p.m. - 4:40 p.m. Tue When Account Management Is Not Enough: Identity at RIT 4 3:55 p.m. – 4:45 p.m. Wed IT Security in Higher Education: A Sea Change 1 8:10 a.m. -- 9:00 a. m. Thu Campus Access to Government Services through InCommon and eAuthentication Federations

Constituent Groups/Roundtables/Open Meetings (these are pre-planned, there may also be ad-hoc BoFs) 2:15 p.m. - 3:45 p.m. Tue Identity Management Working Group (open meeting) and Constituent Group
                                                (The Net@EDU IdM WG was formerly the PKI Working Group)
3:50 p.m. – 4:40 p.m. Tue Business Continuity/Disaster Recovery - Current Issues Roundtable 4:55 p.m. – 6:10 p.m. Tue Enterprise Electronic Content Management - Constituent Group 8:10 a.m. – 9:00 a.m. Wed Security Incidents and the Privacy of Personal Information - Current Issues Roundtable 12:45 p.m. - 2:15 p.m. Wed EDUCAUSE/Internet2 Computer & Network Security Task Force (Open Meeting) 2:20 p.m. -- 3:10 p.m. Wed Identity Management - Current Issues Roundtable

Poster Sessions -       4:55 p.m. – 6:10 p.m. Wednesday
Confessions of a Security Engineer: The Aftermath of Implementing a Security Plan
        Deputize the Community: IT Security for All
        Design on a Dime: Classroom Security for 500 Bucks
        No More Social Security Number
        Pirates Beware: Security Through IT Asset Management and Sassafras K2
The Doctor Is In: An Antivirus, Self-Help Clinic in the McGill Libraries
        Online Testing Security: New Technology Solution


                                # # #

- H. Morrow Long, CISSP, CISM, CEH
  University Information Security Officer
  Director -- Information Security Office
  Yale University, ITS

   Educause 2006 Program Committee



Current thread: