Educause Security Discussion mailing list archives

Re: Membership in REN-ISAC?


From: Vik Solem <vik.solem () TUFTS EDU>
Date: Mon, 4 Jan 2010 13:57:45 -0500

My apologies.  After checking with affected people, I'm told that the
current method for REN-ISAC membership is substantially different than
the previous method under which folks I knew were refused.  I should
probably have mentioned before that I've been a member for close to a
year, and I've found the REN-ISAC data to be substantially different
from the EDUCAUSE data.  I think the limitation on sharing the data
encourages different kinds of submissions.

-Vik

On Jan 4, 2010, at 10:47 , Ken Connelly wrote:

A more accurate take:  REN-ISAC has very specific requirements for
membership. See http://www.ren-isac.net/docs/membership.html#criteria
for the criteria used to evaluate potential members.

Ken Connelly
REN-ISAC Membership Chair

Vik Solem wrote:
I recommend wording your job descriptions very carefully with an eye
on the requirements for ren-isac.  I've seen ren-isac refuse
membership for some because they didn't agree that the person should
have access, based on their job description.   ymmv

-Vik


On Dec 29, 2009, at 14:02 , Bob Bayn wrote:

Thanks, Joel (and everybody else).  I guess we'll sign up.  Happy
new
year to all.

Sounds like they honor the Chatham House Rule like at the NetFocus
conference.

Bob Bayn        (435)797-2396      Security Team coordinator
Don't let hackers use your computer when you aren't.
Turn off your computer at the end of your work day.
Office of Information Technology   at  Utah State University
________________________________________
From: Joel Rosenblatt [joel () columbia edu]
Sent: Tuesday, December 29, 2009 11:28 AM
To: The EDUCAUSE Security Constituent Group Listserv
Cc: Bob Bayn
Subject: Re: [SECURITY] Membership in REN-ISAC?

Hi Bob,

I would highly recommend that you join if you can - there is
information and resources that will enhance your ability to secure
your University.  The only
caution is also a benefit in that the information is shared in a
closed community and you need to be aware of where you are when you
answer questions :-)

IHTH

Joel Rosenblatt

Joel Rosenblatt, Manager Network & Computer Security
Columbia Information Security Office (CISO)
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel


--On Tuesday, December 29, 2009 11:18 AM -0700 Bob Bayn
<bob.bayn () USU EDU> wrote:

Any recommendations or cautions about joining REN-ISAC?

http://www.ren-isac.net/

-Vik

Vik Solem
Sr. Applications Risk Consultant
Information Security
Tufts University UIT / 617-627-4326

Check Out the UIT Information Security Team blog
http://blogs.uit.tufts.edu/infosecteamblog/

--
- Ken
=================================================================
Ken Connelly             Associate Director, Security and Systems
ITS Network Services                  University of Northern Iowa
email: Ken.Connelly () uni edu   p: (319) 273-5850 f: (319) 273-7373

-Vik

Vik Solem
Sr. Applications Risk Consultant
Information Security
Tufts University UIT / 617-627-4326

Check Out the UIT Information Security Team blog
http://blogs.uit.tufts.edu/infosecteamblog/

Current thread: