Educause Security Discussion: by date

268 messages starting Oct 01 14 and ending Dec 24 14
Date index | Thread index | Author index


Wednesday, 01 October

funny video on avoiding copyright infringement Shalla, Kevin
Re: funny video on avoiding copyright infringement Self, Dennis
Re: funny video on avoiding copyright infringement Greg Jackson
Re: funny video on avoiding copyright infringement Chris Garriss
Re: funny video on avoiding copyright infringement Harry Zahlis

Thursday, 02 October

Contact at RedSeal Eric Weakland
NMSU - Cybersecurity Month Activities Carlos Lobato
Syr.Edu - Cybersecurity Month Activities Randall C Grimshaw

Friday, 03 October

Re: Syr.Edu - Cybersecurity Month Activities Harry Hoffman
Re: Syr.Edu - Cybersecurity Month Activities Ken Connelly
Re: Syr.Edu - Cybersecurity Month Activities Frank Barton
NCSAM 2014: Week 1 Update Valerie Vogel
Re: NCSAM 2014: Week 1 Update Mitcham, Zachery S.

Monday, 06 October

Annual Security Report Dan Sarazen
Re: Annual Security Report Sturgis, John (John Sturgis)
DRP Shaun Gray
Re: DRP Valerie Vogel
Re: Annual Security Report Nick Lewis
Proxy stealing journal access Andrew Daviel
Risk management study Jim Hietala
Re: Proxy stealing journal access Keller, Alex

Tuesday, 07 October

Re: Proxy stealing journal access Fulton, Lora
Re: Proxy stealing journal access Rajewski, Jonathan
Re: Proxy stealing journal access Roger A Safian
Re: Proxy stealing journal access Tim Doty
Pearson MyLab - SSL issues Fowler, Becky Thurmond
Re: Proxy stealing journal access Gary Warner
Get Study Room site Alex Jalso
Re: Get Study Room site Alex Waitkus
Re: Get Study Room site Jones, Mark B
Internet2 Update Regarding Shellshock Paul Howell
Re: DRP Shaun Gray

Wednesday, 08 October

Re: Syr.Edu - Cybersecurity Month Activities Plesco, Todd
Free NCSAM Webinar on 10/14: CIO Insights on Cybersecurity Valerie Vogel
Any thoughts on BitSight Security Ratings/Scores? Jeff McCabe
Re: Get Study Room site Kevin Halgren
Re: Get Study Room site Beyette, Jeremy
Re: Get Study Room site Leland Lyerla

Friday, 10 October

Deprecation of SSL Certificates Using SHA-1 Roger A Safian
Re: Deprecation of SSL Certificates Using SHA-1 Tim Faircloth
Re: Deprecation of SSL Certificates Using SHA-1 John Ladwig
Re: Deprecation of SSL Certificates Using SHA-1 Ken Connelly
Sharing Files Securely with External Parties Knights, John
Re: Sharing Files Securely with External Parties Kevin Kelly
Re: Deprecation of SSL Certificates Using SHA-1 Roger A Safian
Re: Deprecation of SSL Certificates Using SHA-1 Miguel Angel Gonzalez de la Torre
Re: Deprecation of SSL Certificates Using SHA-1 Miller, Thomas

Sunday, 12 October

Re: Sharing Files Securely with External Parties Plesco, Todd

Monday, 13 October

Re: Sharing Files Securely with External Parties Wisdom, Michelle M.
Re: Sharing Files Securely with External Parties Mark Powell
Re: Deprecation of SSL Certificates Using SHA-1 Albert Lunde
Ohio University Information Technology Security Seminar Dalton, Matthew
Risk Based Authentication Pardonek, Jim

Tuesday, 14 October

Re: Sharing Files Securely with External Parties Kevin P. Sale
NCSAM 2014: Mid-Month Update Valerie Vogel

Wednesday, 15 October

Re: Sharing Files Securely with External Parties Knights, John
Fwd: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Paul Howell
Re: ISO27002 vs ISO27006 Leon DuPree

Thursday, 16 October

Re: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Alan Amesbury
Who manages your antivirus. Jeff Borton
Re: Who manages your antivirus. David Seidl
Re: Who manages your antivirus. Renee Peters
Re: Who manages your antivirus. Mike Cunningham
Re: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Keller, Alex
Re: Who manages your antivirus. Knights, John

Friday, 17 October

Re: Who manages your antivirus. King, Ronald A.
Re: Who manages your antivirus. Williams, Matthew (wilmh)

Monday, 20 October

Free Webinar, 10/21: Assessing Risks in Cloud Computing Valerie Vogel
OReilly security ebook discount Brad Judy
Vendor Network Access John Kaftan
Re: Vendor Network Access Scott Link

Tuesday, 21 October

Re: Vendor Network Access Dennis Bohn
Re: Vendor Network Access John Kaftan
ADFS Experience Thomas Carter
Re: ADFS Experience Ryan Hiebert
Re: ADFS Experience Ryan Hiebert
2 Job Postings: Information Security Manager & Director of Information Security, University of Chicago Medical Center Erik Decker
Re: ADFS Experience Nicholas Roy
Re: ADFS Experience Miguel Angel Gonzalez de la Torre
Re: ADFS Experience Kevin Halgren
Re: Who manages your antivirus. Kevin Halgren
Re: ADFS Experience Miguel Angel Gonzalez de la Torre
Job Posting: InfoSec Security Analyst at Oregon St. Univ. Nevin, David

Wednesday, 22 October

Senior security analyst/security engineer job descriptions. David D Grisham

Thursday, 23 October

REN-ISAC ALERT: Muzzling POODLE (While Cleaning Up Other Related Vulnerabilities, Too) Doug Pearson
Re: Ransomware Ashfield, Matt (NBCC)
Banner Data Guard / VMWare / Zerto (Zert0) / Veeam Thomas S Wolfe
Re: Ransomware David Hale
Re: Ransomware Chris Green
Re: Ransomware Cook, Dale
Re: Banner Data Guard / VMWare / Zerto (Zert0) / Veeam Richard Siedzik
RPKI workshop at I2 TechX Michael Sinatra

Friday, 24 October

Re: Ransomware Flynn, Gary - flynngn
Cyber Security Awareness Month fun Lanita Rae Collette
Re: Cyber Security Awareness Month fun Barrett, Bruce
Re: Cyber Security Awareness Month fun Bob Bayn
Re: Cyber Security Awareness Month fun Ken Connelly
Re: Cyber Security Awareness Month fun David James Anderson

Monday, 27 October

Re: Cyber Security Awareness Month fun Greene, Allen
Response to phishing e-mails Leland Lyerla
Re: Response to phishing e-mails Bob Bayn
Re: Response to phishing e-mails Roger A Safian
Re: Response to phishing e-mails Manjak, Martin
Re: Response to phishing e-mails Colleen Blaho
Re: Response to phishing e-mails Brad Judy
Re: Response to phishing e-mails Joel Anderson
Re: Response to phishing e-mails Bob Bayn
Re: Response to phishing e-mails Garmon, Joel

Tuesday, 28 October

Re: Response to phishing e-mails Thomas Carter
Re: Response to phishing e-mails Robert Meyers
Re: Response to phishing e-mails Nick Semenkovich
Re: Response to phishing e-mails Brandon Hume

Wednesday, 29 October

Re: Response to phishing e-mails Robert Meyers
Re: Response to phishing e-mails Thomas Carter
Re: Response to phishing e-mails Nick Semenkovich
Re: Response to phishing e-mails Paul Chauvet
Awareness/Compliance Tracking Software Pardonek, Jim
Re: Awareness/Compliance Tracking Software Erik Decker
Re: Response to phishing e-mails Brandon Hume
Re: Awareness/Compliance Tracking Software DiGrazia, Mick A
Re: Response to phishing e-mails Nick Semenkovich
Firewall Vendors Kubb, Richard
Re: Firewall Vendors King, Ronald A.
Re: Firewall Vendors Manuel Amaral
Re: Response to phishing e-mails Brandon Hume
Re: Firewall Vendors T. Shayne Ghere
Re: Firewall Vendors Garmon, Joel
Re: Firewall Vendors Walter Petruska
Re: Firewall Vendors Jeremy Kurtz
Re: Firewall Vendors Rich Graves
Re: Firewall Vendors Jason Cook
Re: Firewall Vendors Jason Cook
Re: Response to phishing e-mails Jones, Mark B
Re: Response to phishing e-mails Kalal, Robert (Bob)

Thursday, 30 October

Re: Firewall Vendors Ramon Hermida
Re: Firewall Vendors David Escalante
Re: Firewall Vendors King, Ronald A.
Re: Firewall Vendors Roger A Safian
Re: Response to phishing e-mails Paul Chauvet
Re: Firewall Vendors Bob Williamson
Re: Firewall Vendors Michael Horne
Re: Firewall Vendors Tornoe, Eric J.
Re: Firewall Vendors Dennis Bohn
Re: Firewall Vendors Kurtz, Eric
Re: Firewall Vendors Ben Parker
Re: Firewall Vendors Tornoe, Eric J.

Friday, 31 October

Onboarding John Kaftan
Uploading photo for IDs John Kaftan
Re: Onboarding Kevin Halgren
Re: Uploading photo for IDs Behun, Michael
Re: Uploading photo for IDs Thomas Carter
Re: Uploading photo for IDs Jenny Blaine
Re: Onboarding Jones, Mark B
Re: Response to phishing e-mails Nick Semenkovich

Saturday, 01 November

Re: Onboarding Kevin McCormick

Monday, 03 November

NCSAM 2014 is Wrapping Up‹What¹s Next? Valerie Vogel

Wednesday, 05 November

Re: Awareness/Compliance Tracking Software Donna Volpe Strouse
Invitation to Submit Proposals for the 2015 Security Professionals Conference (by 11/17) Valerie Vogel
Position available - Network Services Director at the University of Wisconsin Richard Kunert

Thursday, 06 November

Re: Firewall Vendors Brian Helman

Monday, 10 November

IAM Online Nov 12: Turning Off Legacy Technology (2 pm ET) Valerie Vogel
Position Available: Chief Information Security Officer (CISO) at Ithaca College Valerie Vogel

Tuesday, 11 November

20 Critical Controls survey request from American University of Beirut (AUB) randy

Wednesday, 12 November

Internet2 NET+ CloudProud� Webinar on Resource & Staffing 11/13/14, 1 pm ET Valerie Vogel
REN ISAC public advisory issued Joanna Grama
Re: Firewall Vendors Dexter Caldwell
2-factor authentication survey. Youngquist, Jason R.

Thursday, 13 November

SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Mike Cunningham
Re: SSL certificate purchasing Jones, Mark B
Re: SSL certificate purchasing King, Ronald A.
Re: SSL certificate purchasing Leonard Nelson
Re: SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Mike Cunningham
Re: SSL certificate purchasing Maloney, Michael
Re: SSL certificate purchasing David Lundy
Re: SSL certificate purchasing Glassman, Stephen
Re: SSL certificate purchasing Judd, Taylor Allen
Re: SSL certificate purchasing Mark Montague
Re: SSL certificate purchasing Roger A Safian
Re: SSL certificate purchasing Baumgartner, Mark A.
Re: SSL certificate purchasing David Lundy
Re: SSL certificate purchasing Nick Semenkovich
Re: Response to phishing e-mails Andrew Daviel

Friday, 14 November

Re: Firewall Vendors Tornoe, Eric J.
Re: Firewall Vendors Tornoe, Eric J.

Monday, 17 November

Re: Invitation to Submit Proposals for the 2015 Security Professionals Conference (by 11/17) Valerie Vogel

Wednesday, 19 November

Google Hacking Greene, Allen
Re: Google Hacking Brad Judy
Re: Google Hacking Greene, Allen
Re: Google Hacking David James Anderson
Re: Google Hacking Jason Todd
Re: Google Hacking Keller, Alex

Thursday, 20 November

Re: 2-factor authentication survey. Youngquist, Jason R.
Negligence for privacy/security breach standard in tort Tracy Beth Mitrano

Friday, 21 November

National Cybersecurity Network Workforce Summit, Dec. 1-2 at UMass Boston Valerie Vogel
Re: Negligence for privacy/security breach standard in tort Shackelford, Scott James
Re: Google Hacking Greene, Allen

Tuesday, 25 November

REN-ISAC / SANS Aggregate purchase program Doug Pearson
SolarWinds LEM Langford, Matthew

Wednesday, 26 November

12/2/2014 Webcast: REN-ISAC / SANS Aggregate purchase program Milford, Kim
VA TECH SANS ONSITE - Mark your calendars randy
Re: VA TECH SANS ONSITE - Mark your calendars Ken Connelly
Re: VA TECH SANS ONSITE - Mark your calendars randy
VA Tech SANS Onsite - forgot to mention ... randy
Re: VA TECH SANS ONSITE - Mark your calendars Ernie Soffronoff
Re: VA TECH SANS ONSITE - Mark your calendars Ken Connelly

Tuesday, 02 December

Evolution and Ascent of the CISO: New EDUCAUSE Review Article Valerie Vogel

Wednesday, 03 December

HEISC Update: 2014 Accomplishments & 2015 Priorities Valerie Vogel
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Barrett, Bruce
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Valerie Vogel
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Larry Thomas
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities George Farah
Job Posting - University of Washington - Teaching position Scott Barker

Thursday, 04 December

IAM Online Dec. 10 - Are Passwords Passe? Valerie Vogel

Friday, 05 December

cyber security liability insurance Alex Jalso
Brief Cyberbullying Survey - Your Response is Requested Julie Luker
Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson

Saturday, 06 December

Re: Checkpoint 13500 Next Generation Firewall/Security Ian McDonald

Monday, 08 December

Checkpoint 13500 Next Generation Firewall/Security Boyd, Daniel
Re: Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson
Re: Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson
Re: Checkpoint 13500 Next Generation Firewall/Security Flynn, Gary - flynngn
Re: Checkpoint 13500 Next Generation Firewall/Security Robert Rudloff

Tuesday, 09 December

DLP Best Practices PERRY II, JAMES
Re: DLP Best Practices Brad Judy
Data Destruction/Secure Deletion Frank Barton

Wednesday, 10 December

Start a New Cyber Adventure in Moscow! Parks, Mitch (mitch () uidaho edu)
*Reminder* - Cyberbullying Survey - Your Response is Needed Julie Luker

Thursday, 11 December

SSH logs - ip address as user? Lisciotti, Kevin
Re: SSH logs - ip address as user? David James Anderson
Vulnerability Scan RFI or RFP Self, Dennis
Re: Data Destruction/Secure Deletion Thomas S Wolfe
Uptick in SSH scanning ? Andrew Daviel
Re: Uptick in SSH scanning ? Joel L. Rosenblatt
Re: Uptick in SSH scanning ? Jason Gates
Re: Uptick in SSH scanning ? Laurie Zirkle
Re: Uptick in SSH scanning ? Michael Benedetto

Friday, 12 December

Re: Uptick in SSH scanning ? Joseph Tam

Tuesday, 16 December

Establishing the Program Committee for Security 2016 Valerie Vogel

Wednesday, 17 December

Linux Grinch attack Lisciotti, Kevin
Re: Linux Grinch attack Colleen Blaho
Re: Linux Grinch attack Everett, Alex D
Student/Staff Email Knights, John
Re: Student/Staff Email Jones, Mark B
Re: Student/Staff Email Jeff Choo
Re: Student/Staff Email Bob Bayn

Thursday, 18 December

Re: Student/Staff Email Theresa Rowe
Re: Student/Staff Email Knights, John
Re: Student/Staff Email Miguel Angel Gonzalez de la Torre
Re: Student/Staff Email Jones, Mark B
CDS Spotlight: Information Security - Now Publicly Available Valerie Vogel
Re: Job opening: UC Berkeley - Security Analyst IV - Application Security Testing (2 year appointment, 2 positions) Leon DuPree
Re: Uptick in SSH scanning ? Justin C. Klein Keane
Re: Linux Grinch attack Boyd, Daniel
Re: Linux Grinch attack Pete Hickey
Re: Uptick in SSH scanning ? Livio Ricciulli

Friday, 19 December

AD and Domain Admin Policy? Russ Leathe
Re: AD and Domain Admin Policy? Brad Judy
Re: AD and Domain Admin Policy? Dugan, Darin D [ITSYS]
Re: AD and Domain Admin Policy? Timothy Pierson
Re: AD and Domain Admin Policy? Timothy Pierson
Large community college district researching patch management Ric Getter
Sr. Information Security Engineer - University of Chicago Medicine Erik Decker

Monday, 22 December

Re: AD and Domain Admin Policy? Kevin McCormick
Cisco Advisory NTP Multiple Vulnerabilities Kevin McCormick

Wednesday, 24 December

NIST NCCOE recommending WEP for Wireless Medical Infusion Pump Security? Shawn Merdinger