Educause Security Discussion mailing list archives
Re: EDU-Sec podcast?
From: Morrow Long <morrow.long () YALE EDU>
Date: Mon, 29 Sep 2008 16:04:23 -0400
Educause, Cornell and REN-ISAC have series which have IT Security broadcasts
which often have higher-ed specific themes. There are also a number ofpodcast series available via iTunes -- though none specific to Higher- Ed InfoSec (in the past PaulDotCom had a lot of material touching on College IT Security).
1. REN-ISAC (www.ren-isac.net) TechBursts are EDU IT Security specific. You need to be a REN-ISAC member (and the first rule of REN-ISAC is that you can't talk about REN-ISAC).2. Cornell's UCPL has archives of their series of presentations in Real Video format:
http://ucpl.cornell.edu/video.html 3. Steven Worona has been hosting of the EDUCAUSE Live! Webcast series. The archives can be found at: http://net.educause.edu/Archives/2719 Here are the archived recent broadcasts (many are security related): Constitution Day 2008: Free Speech in Cyberspace Robert M. O'Neil Director, Thomas Jefferson Center for the Protection of Free Expression September 4, 2008 Emergency Preparedness: Leveraging IT for Safety and Security Major Jay Gruber Department of Public Safety, University of Maryland August 22, 2008The Strategic Impacts of New Technologies on Higher Education: Ithaka's Research Program
Roger C. Schonfeld Manager of Research, Ithaka August 1, 2008The Gutenberg-e Project: Opportunities and Challenges in Publishing Born-Digital Monographs
Kate WittenbergConsultant, Scholarly Communication and E-Publishing, Columbia University
July 22, 2008 Kuali Student: A Next-Generation Administrative System Richard Spencer Executive Director of IT, University of British Columbia July 1, 2008 Meeting Communications Needs in Campus Dorms Dewitt Latimer Deputy CIO & Chief Technology Officer, University of Notre Dame Walt Magnussen Director of Telecommunications, Texas A&M University June 18, 2008 IPv4 Depletion and Migration to IPv6 John Curran Chairman, American Registry for Internet Numbers June 5, 2008 The Horizon Report, Inside and Out Malcolm B. Brown Director of Academic Computing, Dartmouth College Julie K. Little Interim Director, EDUCAUSE Learning Initiative May 29, 2008 Patents in Higher Education: Issues Arising from the Blackboard Case James Hilton Vice President and CIO, University of Virginia Bruce Wieder Partner, Dow Lohnes PLLC May 12, 2008IT/Enterprise Architecture: What Is It, and What Value Does Leadership Find in Having an Architect at Hand?
Jim Phelps Senior IT Architect, University of Wisconsin–Madison May 6, 2008Digital Visual Literacy (DVL): Interdisciplinary Skills for the 21st Century Learner
John Gibson Faculty, Business and Information Technology, Glendale Community College Oris FriesenDirector, eLearning System for Arizona Teachers and Students (eSATS) and Faculty, Mesa Community College
Florence MartinAssistant Professor of Instructional Technology, University of North Carolina–Wilmington
April 11, 2008 Knowledge Sharing: Some Myths and Ideas, and a Little IT Jean E. Engle Chief Knowledge Officer, NASA/Johnson Space Center April 4, 2008 The Why and How of Web Accessibility Harry HochheiserAssistant Professor of Computer and Information Sciences, Towson University
Tracy MitranoDirector of IT Policy and Computer Policy and Law Program, Cornell University
March 25, 2008 Teaching with Digital Collections in the Undergraduate Curriculum Marianne ColgroveDeputy Chief Technology Officer and Director of Web Support Services, Reed College
Dena Hutto Director of Reference and Instruction, Reed College Library March 7, 2008 US Internet Access Policy Susan Crawford Visiting Professor, Yale Law School February 29, 2008 Update on Key Copyright Developments in the U.S. James G. NealVice President for Information Services and University Librarian, Columbia University
February 1, 2008 Copyright Fair Use and the Economy Matthew SchruersSenior Counsel for Litigation and Legislative Affairs, Computer and Communications Industry Association
January 23, 2008 Legal Threats, Chilling Effects, and Warming the Air Wendy SeltzerFellow, Berkman Center for Internet & Society, and Visiting Professor, Northeastern University School of Law
January 4, 2008 What Price Insularity? Reflections about Computer Security Failings Fred Schneider Professor of Computer Science, Cornell University December 19, 2007 Challenges of Film, Video, and New Media Preservation Howard BesserDirector, NYU Moving Image Archiving and Preservation Master's Degree Program, New York University
December 7, 2007Swiftboating Higher Education on P2P: Why Higher Education Is Not the Real Problem, and Technology Is Not the Real Solution
Kenneth C. "Casey" Green Founding Director, The Campus Computing Project November 14, 2007IT Security Essential Body of Knowledge(EBK): A Competency and Functional Framework for IT Security Workforce Development
Brenda OldfieldDirector of Education, Training, and Workforce Development, Office of Cyber Security and Communications, National Cyber Security Division, U.S. Department of Homeland Security
November 5, 2007 Lessons Learned from the April 16, 2007 Tragedy at Virginia Tech Erv Blythe Vice President for Information Technology, Virginia Tech October 17, 2007 A Fresh Look at FERPA Steven J. McDonald General Counsel, Rhode Island School of Design Nancy E. Tribbensee General Counsel, Arizona University System October 2, 2007 Annual Copyright License: A New Tool for Permissions Tim Bowen Product Manager–Academic Licensing, Copyright Clearance Center Jeff Rehbach LIS Policy Advisor, Middlebury College September 19, 2007 Exploring Student Communications Services for the 21st Century Ira WinstonExecutive Director of Computing, School of Engineering and Applied Science, School of Arts and Sciences, and School of Design, and Director of Facilities Planning, School of Engineering and Applied Science, University of Pennsylvania
Deirdre WoodsAssociate Dean and Chief Information Officer, Wharton School, University of Pennsylvania
Walter Harp Group Product Manager, Microsoft September 5, 2007 Lessons Learned on the Road to PCI Compliance Mark WelchProject Coordinator, Credit Card Support Program, Office of Business Operations, University of Notre Dame
Walt Conway President, Walter Conway Associates, LLC August 15, 2007Working Effectively with Law Enforcement: How to Protect the Privacy of Your University Community Without Going to Jail
Michael A. CornDirector, Security Services and Information Privacy, Office of the CIO, University of Illinois at Urbana-Champaign
August 2, 2007Cyberinfrastructure: A Campus Perspective on What It Is and Why You Should Care
Peter M. SiegelVice Provost for Information and Educational Technology and CIO, University of California at Davis
July 20, 2007 IT Governance: Establishing Who Decides Andrew J. Clark Chief Process Architect, Syracuse University July 10, 2007 Tor: Anonymity and Access to Services Despite Censorship Paul SyversonMathematician, Center for High Assurance Computer Systems (CHACS), Naval Research Laboratory (NRL)
Roger Dingledine Owner and Founder, Moria Research Labs June 19, 2007 Outsourcing E-mail and Other Commodity Services Jeff Keltner Business Development Manager, Google Wendy Woodward Director, Technology Support Services, Northwestern University June 5, 2007 Webcasting Royalties: Where Do We Go From Here? Matthew J. Astle Attorney, Wiley Rein LLP May 21, 2007 Top-Ten Challenges of the Academic Technology Community John P. CampbellAssociate Vice President of Teaching and Learning Technologies, Purdue University
Dennis A. Trinkle CIO, Valparaiso University May 3, 2007 Emergency Notification Systems for a Mobile Community Rodney J. PetersenGovernment Relations Officer and Security Task Force Coordinator, EDUCAUSE
Mark Katsouros Director, Telecommunication and Network Services, The University of Iowa April 26, 2007Developing and Implementing Successful Intellectual Property Policies for Online Courses
Veronica DiazInstructional Technology Manager and Adjunct Faculty, Maricopa Center for Learning and Instruction, Maricopa Community Colleges
Patricia McGeeAssociate Professor of Instructional Technology, The University of Texas at San Antonio
April 5, 2007 High-Tech Abuse and Crime on College and University Campuses Samuel C. McQuade IIIProfessional Studies Graduate Program Coordinator, Center for Multidisciplinary Studies, Rochester Institute of Technology
David PecoraAssociate Director, Customer Support Services, Information and Technology Services, Rochester Institute of Technology
March 27, 2007 Ubiquitous Secure Document Storage and Sharing: A Case Study Bruce Maas Interim CIO, University of Wisconsin-Milwaukee Cheryl Ellsworth Systems Integration Manager, University of Wisconsin-Milwaukee March 7, 2007Good Digital Citizenship: Examining Student Peer-to-Peer Activity at Illinois State University
Warren Arbogast President, Boulder Management Group, LLC David Greenfield Director, Student Technology, Illinois State University February 27, 2007 Selecting a Business Continuity Planning Tool Bill Heiser, PMPBusiness Continuity & Disaster Recovery Program Manager, Stanford University
Katina Blue, CBCPDirector of Business Continuity and Disaster Recovery, North Carolina State University
Betty Hawkins, CBCP, SSCPM Senior Project Manager, University of South Carolina February 15, 2007The Information Commons and the Future of Innovation, Scholarship, and Creativity
Gigi Sohn President and Founder, Public Knowledge January 30, 2007Architectures for Collaboration—Roles and Expectations for Digital Libraries
Peter Brantley Director-Designate, Digital Library FederationDirector, Strategic Technology, Academic Information Services, University of California Office of the President
January 9, 2007 Federal E-Discovery Rules—Hindrance or Opportunity? M. Peter AdlerPresident, AIPG LLC, and Interim Director of Privacy and Security Policy, Montgomery College, Maryland
December 18, 2006 Closed Source/Open Source: An Update on Software Licensing 101 Karen Copenhaver Partner, Choate, Hall & Stewart LLP December 11, 2006Copyright Infringement from the Inside: Student Perspectives on Music Piracy
Ross HousewrightGraduate Student, School of Information Management & Systems, University of California, Berkeley
November 28, 2006 What Researchers Want from IT Sandra BramanECAR Fellow and Professor of Communication, University of Wisconsin– Milwaukee
November 8, 2006 Facing Facebook and Other Social Networking Technologies Tracy MitranoDirector of IT Policy and the Computer Policy and Law Program, Cornell University
Anita "Nicky" Rho Senior, Cornell University October 30, 2006 Planning and Delivering Service-Oriented Architecture Margaret BackerDirector, Web Application Development, University of California, San Diego
Christopher De Rosa Architecture Manager, University of California, San Diego October 3, 2006 Overview of U.S. Federal Government Identity Management Initiatives Peter AltermanChair, Federal PKI Policy Authority, and Assistant CIO for E- Authentication, National Institutes of Health
September 14, 2006 Virtual Computing: A New Strategy for a New Era Samuel Averitt Vice Provost for Information Technology, North Carolina State University Mladin A. VoukDepartment Head and Professor of Computer Science and Associate Vice Provost for Information Technology, North Carolina State University
September 6, 2006 Going Beyond Recovery to Continuity: Lessons Learned David G. Swartz Vice President and CIO, The George Washington University August 16, 2006 Fight Back Against Identity Theft Nat WoodAssistant Director for Consumer and Business Education, Bureau of Consumer Protection, Federal Trade Commission
August 2, 2006 Trends in Malicious Code on the Internet Andrew J. Czyzewski Intelligence Analyst, FBI Cyber Division Vincent J. Rowe Intelligence Analyst, FBI Cyber Division July 20, 2006 Governance in Identity Management Federations Clair W. Goldsmith Associate Vice Chancellor and CIO, University of Texas System William WeemsAssistant Vice President for Academic Computing, The University of Texas Health Science Center at Houston
July 6, 2006Proposed Legislation on Orphan Works: Solving the Problem or Escalating the Crisis?
Denise Troll CoveyPrincipal Librarian for Special Projects, Carnegie Mellon University Libraries
June 21, 2006A Tale of Two Tracks: Social Engineering Your Students and Detecting Bots with DNS
Justin Azoff Network Performance Analyst, University at Albany, SUNY Martin Manjak Information Security Officer, University at Albany, SUNY June 1, 2006 PKI Implementation at the University of Wisconsin–Madison Nicholas Davis PKI Project Manager, University of Wisconsin–Madison May 18, 2006 Mentoring: A Learning Collaboration Marilu GoodyearECAR Fellow, and Associate Professor, Department of Public Administration, University of Kansas
May 8, 2006 Building a National Science Digital Library Dean B. KrafftPrincipal Investigator, NSDL Core Integration Project at Cornell University
April 18, 2006 Archiving and Preserving the Web Dan Avery Senior Crawl Engineer, Internet Archive Kristine Hanna Program Director, Archive-It, Internet Archive April 5, 2006 At Katrina's Edge: One Campus's Story Brian D. Voss Chief Information Officer, Louisiana State University March 23, 2006 Advantages and Challenges of Network Quarantine Steve Schuster Director, IT Security Office, Cornell University March 9, 2006 Learning from the Past—Lessons for the Future Internet Michael M. Roberts Policy Consultant, The Darwin Group, Inc. February 28, 2006The Sony Digital Rights Management Debacle: The Litigation, the Settlement, and Some Thoughts on the Future of DRM
Corynne McSherry Staff Attorney, Electronic Frontier Foundation February 15, 2006 The Myth of Network Neutrality Scott Bradner University Technology Security Officer, Harvard University January 24, 2006 From Digital Campus to Connected Community Lev S. GonickVice President, Information Technology Services, Chief Information Officer, Case Western Reserve University
January 9, 2006 The ECAR 2005 Study of Students and Information Technology Robert B. Kvavik ECAR Senior Fellow and Associate Vice President, University of Minnesota Judith B. CarusoECAR Fellow and Director of Policy and Planning, University of Wisconsin–Madison
December 15, 2005 HIPAA Privacy and Security for Academic Institutions Brian D. Gradle Counsel, Hogan & Hartson L.L.P. December 9, 2005 Export Control Laws: Analysis for the IT Manager Wendy A. Robinson Senior Assistant Attorney General, Oregon Department of Justice November 17, 2005 Wiretapping the Internet: CALEA and Higher Education Terry W. HartleSenior Vice President of Government and Public Affairs, American Council on Education
Doug CarlsonExecutive Director, Communications and Computing Services, New York University
November 7, 2005 An Eye to the Future with a Brief Look Back at the Past John W. "Jack" McCredie Associate Vice Chancellor and CIO, University of California, Berkeley October 11, 2005 The Case for IT Planning for Research Enterprises William F. "Bill" Decker Senior Associate Vice President for Research, The University of Iowa October 3, 2005 The 2005 ResNet Survey: Key Findings David Futey Associate Director for Academic Computing, Stanford University Kevin Guidry Member, ResNet Applied Research Group September 15, 2005 Whose Law? The Problem of Jurisdiction on the Internet David G. Post Professor of Law, Temple University Law School September 1, 2005Regulation of the Internet: The Hows and Whys of Telecommunications Reform
Wendy Wigen Government Relations Officers, EDUCAUSE John Windhausen, Jr. President, Telepoly August 16, 2005 Policy Development Theory and Practice: An Emphasis on IT Patrick Spellacy Director of Policy and Process Development, University of Minnesota August 2, 2005 Can't Stop the Music: Dealing with File Sharing on Campus Steven J. McDonald General Counsel, Rhode Island School of Design July 21, 2005Narrowcasting 101: Using Blogs, Podcasts, and Videoblogs in Higher Education
Nick NoakesAssociate Director, Center for Enhanced Learning and Teaching, Hong Kong University of Science and Technology
Cyprien LomasDirector, The Learning Centre, Faculty of Agricultural Sciences, University of British Columbia
July 7, 2005 The Current State of E-Portfolios in Higher Education Trent BatsonDirector, Information and Instructional Technology Services, University of Rhode Island
June 15, 2005 Google's Library Digitization Project: Reports from Michigan and Oxford John P. WilkinAssociate University Librarian, Library Information Technology and Technical and Access Services, University of Michigan
Reginald CarrDirector of University Library Services and Bodley's Librarian, University of Oxford
June 7, 2005 The USA PATRIOT Act: Past, Present, Future James X. Dempsey Executive Director, Center for Democracy and Technology May 17, 2005 iPods and Academia: The Duke First-Year Experience Tracy Futhey Vice President for Information Technology and CIO, Duke University Lynne O'BrienDirector of the Center for Instructional Technology, Perkins Library, Duke University
May 5, 2005 Outsourcing and Offshoring Sandra SentiExecutive Director and Assistant Dean, Information Services, Biological Sciences Division, University of Chicago
April 25, 2005 Wireless Security with 802.1x Michael Griego Wireless LAN Project Manager, The University of Texas at Dallas April 13, 2005 Sharing Calendars over the Internet Mitchell Kapor President and Chair, Open Source Applications Foundation (OSAF) Lisa Dusseault Standards Architect and Development Manager, OSAF March 16, 2005 Voice over IP (VoIP) at Dartmouth Robert L. Johnson Director of Network Services, Dartmouth College March 4, 2005 Podcasting Possibilities Cyprien LomasNLII Fellow and Director, The Learning Centre, Faculty of Land and Food Systems, University of British Columbia
Jennifer ReevesKOMU-TV Executive Producer and Assistant Professor, University of Missouri-Columbia
February 15, 2005 The Sakai Project: Outcomes, Reflections, and What's Next James HiltonAssociate Provost for Academic, Information and Instructional Technology Affairs, University of Michigan–Ann Arbor
Bradley C. WheelerAssociate Vice President and Dean and Associate Professor of Information Systems, Indiana University
February 2, 2005Collaborative Open Source Software: Panacea or Pipe Dream for Higher Education?
H. David Lambert VP for Information Services and CIO, Georgetown University January 27, 2005 ResNet Outsourcing Edwin W. Fuller, Jr. Director, Information Technology Services, Ithaca College Bernard Rhoades Director, Network and Communication Services, Ithaca College January 11, 2005 The NCES Proposal on Student Data Collection: Two Viewpoints Melanie CorriganAssistant Director, Center for Policy Analysis, ACE (American Council on Education)
Barmak NassirianAssociate Executive Director, External Relations, AACRAO (American Association of Collegiate Registrars and Admissions Officers)
December 21, 2004Network Infrastructure Owned by the Research and Education Community: Advancing Research, Science, and Education Worldwide
Thomas W. West President and Chief Executive Officer, National LambdaRail December 9, 2004 Fighting Spam at AOL: Lessons Learned and Issues Raised Carl Hutzler Director, Anti-Spam Operations, America Online, Inc. November 30, 2004 An Update on Digital Libraries David Millman Director of R&D, Academic Information Systems, Columbia University November 12, 2004 Improving Security Through Automated Policy Enforcement Philip RodriguesSenior Network Security Analyst, Information Technology Services, New York University
Christopher Stevens Network and Technical Services Director, Lewis & Clark College October 27, 2004 Acacia and Beyond: The Growing Threat of Abusive Patents Jason Schultz Staff Attorney, Electronic Frontier Foundation October 6, 2004 Campus and National Approaches to Improving Cyber Security Awareness Martha J. Lockwood Executive Director, the National Cyber Security Alliance (NCSA) Krizi Trivisani Chief Security Officer, The George Washington University September 24, 2004 Learning Space Design Phillip D. LongSenior Strategist for the Academic Computing Enterprise, Massachusetts Institute of Technology (MIT)
September 15, 2004 Legal Alternatives to P2P: Reports from Yale and Penn State Charles Powell Director, Academic Media & Technology, Yale University Russell S. VaughtAssociate Vice Provost, Information Technology, The Pennsylvania State University
August 3, 2004USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries Are Cooperating and Coping
Marilu Goodyear Vice Provost for Information Services & CIO, University of Kansas Jenny MehmedovicCoordinator of Information Technology Policy & Planning, University of Kansas
July 21, 2004 The Next-Generation Learner Diana Oblinger Vice President, EDUCAUSE June 21, 2004 Charging by the Bit: Network Cost Recovery at Cornell David Vernon Director Information Technology Architecture, Cornell University May 11, 2004 PKI: A Technology Whose Time Has Come in Higher Education Mark Franklin PKI Lab Project Leader, Dartmouth College April 28, 2004 Using Open Source for Strategic Advantage Alfred H. Essa CIO of the Sloan School of Management at MIT March 9, 2004 Internet2: Priorities for Today and Tomorrow Dr. Douglas E. Van Houweling President and CEO, Internet2 February 11, 2004 Electronic Portfolios: Why Now? Barbara CambridgeVice President for Fields of Inquiry and Action, American Association for Higher Education
January 21, 2004 Balancing the Need for Security and Open, Collaborative Networking John Voloudakis ECAR Research Fellow Jack J. SuessCIO, Office of Information Technology, University of Maryland Baltimore County
December 17, 2003Acceptable Use: Need It, Hate It; Can't Agree What It Is (or Isn't); & There's No Time to Lose
Gregory A. Jackson Vice President and CIO, University of Chicago November 13, 2003 The Rise of Collaborative Tools Dr. Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder October 9, 2003 Keeping the Learning in Learning Objects Patricia McGeeNLII 2003 Fellow and Assistant Professor of Instructional Technology in the College of Education and Human Development at the University of Texas at San Antonio / 2003 NLII Fellow
Ellen Wagner Director of Higher Education, Macromedia Inc. Mike Kolitsky Emedia Consultant, nextgenEmedia September 29, 2003 Forming Partnerships in the Academic Environment Donald E. Harris Vice Provost for Information Technology and CIO, Emory University August 14, 2003 Managing Security Incidents Gordon Wishon CIO, Associate VP & Associate Provost, University of Notre Dame Daniel Updegrove Vice President for Information Technology, University of Texas at Austin July 14, 2003 Engaging or Enraging? Sharing Learning Objects Susan E. MetrosDeputy CIO, Executive Director for E-Learning, Professor of Design Technology, The Ohio State University
June 3, 2003IT and Internal Auditing: Developing a Collaborative Approach to IT Security
Robert N. Clark, Jr. Director of Internal Auditing, Georgia Institute of Technology May 22, 2003EDUCAUSE Center for Applied Research - The Promise and Performance of Enterprise Systems for Higher Education
Dr. Robert Kvavik Senior Fellow, EDUCAUSE Center for Applied Research April 21, 2003 Digital Rights Management: More than Meets the Eye Clifford Lynch Executive Director, Coalition for Networked Information Page Last Updated: Wednesday, September 17, 2008 © Copyright 1999-2008 EDUCAUSE Need Help? | Feedback | Privacy PolicyEDUCAUSE LogoUnless otherwise noted, EDUCAUSE holds the copyright on all materials published by the association, whether in print or electronic form. In certain cases the work remains the intellectual property of the individual author(s) (see Special Circumstances).
On Sep 29, 2008, at 2:59 PM, Roger Safian wrote:
At 01:48 PM 9/29/2008, Dewhirst, Rob put fingers to keyboard and wrote:Does anyone know of any IT Security Podcasts that focus on edu- specific issues? Or has anyone thought of starting one?Funny you should mention this...I'm off to a meeting in a couple of minute to go over the draft script for our first one. When they're available, I'll post links. -- Roger A. Safianr-safian () northwestern edu (email) public key available on many key servers.(847) 491-4058 (voice)(847) 467-6500 (Fax) "You're never too old to have a great childhood!"
Current thread:
- EDU-Sec podcast? Dewhirst, Rob (Sep 29)
- <Possible follow-ups>
- Re: EDU-Sec podcast? Roger Safian (Sep 29)
- Re: EDU-Sec podcast? Scott Fendley (Sep 29)
- Re: EDU-Sec podcast? Morrow Long (Sep 29)