Educause Security Discussion: by date

321 messages starting Jan 01 18 and ending Mar 29 18
Date index | Thread index | Author index


Monday, 01 January

Re: Digital Forensics / Pen Testing Resources Davis, Richard G.

Tuesday, 02 January

Job opening at Univ of Penn - SOC Director Beeman, Joshua D
VA Tech SANS Onsite Class, 3/5-10/2018 randy
Summary Report :: Dorkbot Service [DEC 2017-12] Cam Beasley
Re: Summary Report :: Dorkbot Service [DEC 2017-12] Hart, Michael

Wednesday, 03 January

Job Posting: Chief Information Security Officer at Kansas State University Josh McCune
Re: Tis the season - for a five minute survey! Chad Tracy
Supporting police systems on your network Judith Tabron
Re: Supporting police systems on your network Allen Mundt
Job Posting: Information Security Officer at St. Olaf and Carleton Colleges Janet Scannell

Thursday, 04 January

Job Posting: Information Security Analyst at Longwood University Smith, Bob

Friday, 05 January

Detecting phishing messages Erik D Evans
Re: Detecting phishing messages Keith Hartranft
Re: Detecting phishing messages Hart, Michael
Re: Detecting phishing messages Keith Hartranft
REN-ISAC Threat Notification: Email Ransom Scheme Milford, Kim
REN-ISAC ADVISORY: Oracle WebLogic Vulnerability Being Exploited by Bitcoin Miners Doug Pearson
Risk Assessment of Spectre and Meltdown Security Wonks
Re: Detecting phishing messages Joseph Tam

Saturday, 06 January

Re: Risk Assessment of Spectre and Meltdown Manjak, Martin

Sunday, 07 January

Re: guest access to athletic events like baseball, soccer Ronald King
Anyone know what happened to the DNSCrypt website? Harry Hoffman
Re: Anyone know what happened to the DNSCrypt website? John Kristoff

Monday, 08 January

GDPR Question Pardonek, Jim
Re: GDPR Question Joanna Grama
Re: GDPR Question Hudson, Edward
Re: GDPR Question Brian T. Huntley
Re: GDPR Question David Sheryn
Re: GDPR Question Ben Marsden
Re: GDPR Question Brad Judy
Re: GDPR Question John Denune
Re: GDPR Question Brad Judy
Re: GDPR Question David Sheryn
Re: GDPR Question Adam Maynard
Re: GDPR Question Brad Judy
Re: GDPR Question Jennifer Svensson
Minnesota State seeks Cloud Security Architect Ladwig, John M
Re: GDPR Question Ben Marsden
Re: GDPR Question Chris Garriss
Re: GDPR Question Joanna Grama

Tuesday, 09 January

Re: Anyone know what happened to the DNSCrypt website? Mike Beane
Re: GDPR Question Adam Menos

Wednesday, 10 January

Re: Dept of Edu Letters DOE sending letters about nonpublic info disclosures from Rasputin SQLi attack Aube, Jane M.

Monday, 15 January

Laurentian University Research on Higher Ed and Malware Attacks Joanna Grama

Thursday, 18 January

IT Security Architect/Analyst positions at the University of Iowa Drews, Jane E

Friday, 19 January

SIEM Tools Madl, Michael
Re: SIEM Tools WALTER KERNER

Saturday, 20 January

Re: SIEM Tools David D Grisham
Re: SIEM Tools David D Grisham
Re: SIEM Tools Chad Tracy

Sunday, 21 January

Re: SIEM Tools Michael Klint Borozan

Monday, 22 January

Re: SIEM Tools Seth A. Shestack
Re: *EXT* Re: [SECURITY] SIEM Tools Velislav K Pavlov
Re: *EXT* Re: [SECURITY] SIEM Tools Pardonek, Jim
Re: *EXT* Re: [SECURITY] SIEM Tools Kingsley, Gene
Re: SIEM Tools Frank Barton
Re: SIEM Tools Rob Milman
Re: SIEM Tools Bridges, Robert A.
Virtru and Google Apps Max McGrath
Re: SIEM Tools Frank Barton
Re: SIEM Tools Bridges, Robert A.
Re: SIEM Tools Brad Judy
Re: SIEM Tools Adam Menos
Re: SIEM Tools Tina Thorstenson
Re: SIEM Tools Kevin Wilcox
Re: SIEM Tools Kevin Wilcox
Re: SIEM Tools Manjak, Martin
Re: SIEM Tools Collyer, Jeffrey W. (jwc3f)
Training or lab environments for cybersecurity programs at institutions Rhonda Johnson
Re: Training or lab environments for cybersecurity programs at institutions Rob Milman
Re: SIEM Tools Jeannine Shantz
Fwd: [ITSM] VDI for Administrative/Academic Staff desktop/laptops? Ronald King
Re: Training or lab environments for cybersecurity programs at institutions Barton, Robert W.
Re: Fwd: [ITSM] VDI for Administrative/Academic Staff desktop/laptops? Haselhoff, Brent
Re: Fwd: [ITSM] VDI for Administrative/Academic Staff desktop/laptops? Ronald King
Re: Fwd: [ITSM] VDI for Administrative/Academic Staff desktop/laptops? Frank Barton
Re: Training or lab environments for cybersecurity programs at institutions Dennis Bolton
Re: Training or lab environments for cybersecurity programs at institutions Johnson Akse, Terri
ELK v Splunk, was Re: [SECURITY] SIEM Tools; extremely long Kevin Wilcox
Re: SIEM Tools Ramon Rentas

Tuesday, 23 January

Re: Fwd: [ITSM] VDI for Administrative/Academic Staff desktop/laptops? Ronald King
Re: SIEM Tools Shelton Waggener
VA Tech seeking applicants for Director of Secure Identity Services randy
Third-party external services using your email domain Thomas Carter
HEISC Update, January 2018: New Resources & List Reminders Valerie Vogel
Re: Third-party external services using your email domain Rob Milman

Wednesday, 24 January

AACRAO GDPR Webinar Today Joanna Grama
language to manage risk & liability for third party use of network Justin Sipher
Re: VA Tech seeking applicants for Director of Secure Identity Services Rob Cherveny
Re: VA Tech seeking applicants for Director of Secure Identity Services Kevin Wilcox
Re: Third-party external services using your email domain Blackstone, Chris
Risk Assessment vendor recommendation? Hassler, Karl D.
Re: Risk Assessment vendor recommendation? David D Grisham
Re: Risk Assessment vendor recommendation? David Stack
Re: Risk Assessment vendor recommendation? Jeff Gassaway

Thursday, 25 January

Re: Risk Assessment vendor recommendation? Ray Phillips
MOUs/Mutual aid agreements between universities and colleges Ben Woelk
Re: MOUs/Mutual aid agreements between universities and colleges Ben Marsden
Re: MOUs/Mutual aid agreements between universities and colleges Barbara-Ann Fox, CISM, ISA, PCIP
Re: MOUs/Mutual aid agreements between universities and colleges WALTER KERNER
Job Posting: CISO position at the University Of Toronto Sue McGlashan

Friday, 26 January

privilege escalation software Chad Smith
Re: privilege escalation software WALTER KERNER
Re: privilege escalation software Barnes, William
Re: privilege escalation software Scott Stoops
Re: privilege escalation software Adam Maynard
Re: privilege escalation software Judd, Taylor Allen
Unusual pattern of compromised accounts Pollock, Joseph
Re: Unusual pattern of compromised accounts Haselhoff, Brent
Re: Unusual pattern of compromised accounts Robert Smith
Re: Unusual pattern of compromised accounts Pollock, Joseph
Re: Unusual pattern of compromised accounts David Santos
Re: Unusual pattern of compromised accounts Chris Grooby

Sunday, 28 January

GDPR Madl, Michael

Monday, 29 January

Re: Unusual pattern of compromised accounts Hiram Wong
Re: Unusual pattern of compromised accounts Andy Hooper
Re: GDPR Vince Bonura
Re: Unusual pattern of compromised accounts Arffa, Letheshia
Re: GDPR Madl, Michael
Re: GDPR Greg Gomel

Thursday, 01 February

We're number one! (Is that a good thing?) Corn, Michael
Re: We're number one! (Is that a good thing?) JT Ash
Re: We're number one! (Is that a good thing?) Pitt, Sharon
Re: We're number one! (Is that a good thing?) Hart, Michael
Re: We're number one! (Is that a good thing?) Corn, Michael
Re: We're number one! (Is that a good thing?) Grace Lynn Faustino
Re: We're number one! (Is that a good thing?) Hoerr, Jason U.

Friday, 02 February

DNSSEC Anyone? Asphyxia R4P3
Re: DNSSEC Anyone? McDowell, Karen (krm6r)
EDUCAUSE Listserv Posting Guidelines Joanna Grama
Re: DNSSEC Anyone? Andrew Chiarello
Re: DNSSEC Anyone? Childs, Aaron
Re: DNSSEC Anyone? Asphyxia R4P3
Re: DNSSEC Anyone? Beadles, Mark A.

Saturday, 03 February

Summary Report :: Dorkbot Service [JAN 2018-01] Cam Beasley

Sunday, 04 February

Re: Summary Report :: Dorkbot Service [JAN 2018-01] Ken Connelly

Monday, 05 February

EDUCAUSE March 9 Webinar on GDPR--details Joanna Grama
Identity Finder Questions Escue, Charles E
Re: Identity Finder Questions Telfer, Will

Wednesday, 07 February

Study: Effectiveness of infosec countermeasures in the post-secondary institutional domain Joanna Grama
Policy Recommendations Justin Harwood
Re: Policy Recommendations Joanna Grama
Re: Policy Recommendations Hart, Michael
Re: Policy Recommendations Ronald King
Re: Policy Recommendations randy
Save the Date: February 21 HEISC Webinar, Too Legit to Quit: How to Avoid Making Legitimate Campus Messages Look Phishy Valerie Vogel
CISo Opening: University of Alaska Karl Kowalski

Thursday, 08 February

Security management and Workday Emily Harris
Re: GDPR Question - Part 2 Theresa Rowe
Re: GDPR Question - Part 2 Hart, Michael
Re: GDPR Question - Part 2 Madl, Michael
Re: GDPR Question - Part 2 Brad Judy
Re: GDPR Question - Part 2 Penn, Blake C
Re: GDPR Question - Part 2 Karl Kowalski
Re: GDPR Question - Part 2 Ken Connelly
Re: GDPR Question - Part 2 Madl, Michael
Re: GDPR Question - Part 2 Jim Cheetham
Re: GDPR Question - Part 2 Ken Connelly
Re: GDPR Question - Part 2 Todd Watson
Re: GDPR Question - Part 2 Lovaas,Steven

Friday, 09 February

Re: GDPR Question - Part 3 Theresa Rowe
Re: GDPR Question - Part 2 Todd Watson
Re: GDPR Question - Part 3 Larry K. Emmons
Re: Security management and Workday Emily Harris
Re: GDPR Question - Part 3 Brad Judy
Laptop protection campaign for students Colin Abbott

Tuesday, 13 February

Solutions to Identity Proof Students for Classes and Exams Thomas Dugas

Wednesday, 14 February

Early Bird Registration deadline for VA Tech SANS Onsite class is 2/16/2018. randy

Thursday, 15 February

Passwords Madl, Michael
Re: Passwords Andrew Chiarello
Re: Passwords Barton, Robert W.
Securing Data in SaaS Applications Cyndie Holmes
Re: Securing Data in SaaS Applications Ruth Ginzberg
Re: Securing Data in SaaS Applications Sue McGlashan

Friday, 16 February

Re: Securing Data in SaaS Applications Santucci, Anthony
Question about INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Cobb, Raisha
Re: Question about INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Andrew Weisskopf
Re: Question about INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Valerie Vogel
Re: Question about INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Adam Menos
GDPR Madl, Michael

Sunday, 18 February

Cyber Security Scorecards Patrick McElhinney

Monday, 19 February

Re: Cyber Security Scorecards Madl, Michael
Re: Cyber Security Scorecards Lovaas,Steven
PCI DSS compliance software Kevin Shalla
Re: Question about INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Thomas Dugas

Tuesday, 20 February

Re: Cyber Security Scorecards Kevin Reedy
Re: PCI DSS compliance software Lazarus, Carolann
Re: PCI DSS compliance software Rob Milman
Seeking CUI help, professional services Rob Caffey
February 21 HEISC Webinar, Too Legit to Quit: How to Avoid Making Legitimate Campus Messages Look Phishy Valerie Vogel
Re: Seeking CUI help, professional services Ed Jalinske
Re; [SECURITY] Seeking CUI help, professional services Darren Yezo
Re: Seeking CUI help, professional services Joanna Grama
REN-ISAC TechBurst - February 22, 2018 - Providing Cybersecurity Support for Funded Research Projects Chris O'Donnell
Re: REN-ISAC TechBurst - February 22, 2018 - Providing Cybersecurity Support for Funded Research Projects Grace Lynn Faustino
Job Posting: Chief of Information Officer at Lake Forest College Reyes, Esteban

Wednesday, 21 February

HECVAT Users List Allen, Jon
FW: [ITCOMM] February 21 HEISC Webinar, Too Legit to Quit: How to Avoid Making Legitimate Campus Messages Look Phishy Joanna Grama
Re: HECVAT Users List Mark Dieterich
Re: HECVAT Users List Joanna Grama
Re: HECVAT Users List Alan Bowen
Re: HECVAT Users List Brown,Thomas
Re: HECVAT Users List Ken Connelly

Thursday, 22 February

Re: HECVAT Users List Brian T. Huntley
Re: HECVAT Users List Sue McGlashan
Re: HECVAT Users List Gregg, Christopher S.
Re: HECVAT Users List Alan Bowen
Re: Securing Data in SaaS Applications Ronald King
Re: Securing Data in SaaS Applications Ruth Ginzberg
Re: HECVAT Users List Ronald King
Re: HECVAT Users List Josh Callahan
Re: HECVAT Users List Steven W Andariese

Friday, 23 February

Re: PCI DSS compliance software Chris Grooby
Re: PCI DSS compliance software David D Grisham
Re: PCI DSS compliance software Penn, Blake C
Upcoming GDPR webinars you might be interested in Joanna Grama
Re: HECVAT Users List John Forker
Re: HECVAT Users List Mark Dieterich
Seeking volunteers to help with doctoral research regarding improving how to start insider threat programs in the private sector Jan Buitron
Re: Seeking volunteers to help with doctoral research regarding improving how to start insider threat programs in the private sector Valdis Kletnieks
Re: Seeking volunteers to help with doctoral research regarding improving how to start insider threat programs in the private sector Jan Buitron

Monday, 26 February

Re: PCI DSS compliance software Joel Garmon
Re: HECVAT Users List Laura Raderman

Tuesday, 27 February

Re: HECVAT Users List Washburn, Ian
Re: HECVAT Users List Tom Horton
HEISC Update, February 2018: New Resources & List Reminders Valerie Vogel

Wednesday, 28 February

Re: HECVAT Users List Theresa Rowe
Question about confidential data in emails. Pesino, Sherry

Thursday, 01 March

Re: HECVAT Users List Penn, Blake C
Re: HECVAT Users List Hart, Michael
Re: HECVAT Users List Theresa Rowe
CIS Controls Cyndie Holmes
Re: Securing Data in SaaS Applications Holmes, Cyndie

Friday, 02 March

Cybersecurity Reports to Board/Audit Committee Carlos S Lobato
Subject: HEISC Quarterly Update, March 2018 Corn, Michael
Re: Cybersecurity Reports to Board/Audit Committee Joanna Grama
Re: Cybersecurity Reports to Board/Audit Committee David Stack

Saturday, 03 March

Re: CIS Controls Sunil Singh
Summary Report :: Dorkbot Service [FEB 2018-02] Cam Beasley

Sunday, 04 March

Re: Question about confidential data in emails. Jones, Mark B
Re: Question about confidential data in emails. Hudson, Edward
Re: Question about confidential data in emails. Jones, Mark B

Monday, 05 March

Re: Question about confidential data in emails. Martinez, Brian
Re: Question about confidential data in emails. Austin Bollinger

Tuesday, 06 March

Re: Question about confidential data in emails. Frank Barton
Re: Question about confidential data in emails. Jones, Mark B
Re: Question about confidential data in emails. Pesino, Sherry
Re: Question about confidential data in emails. Thomas Carter
Re: Question about confidential data in emails. Frank Barton
Who are you training Nathan A. Stuart
Re: Who are you training Hagan, Sean
Director/Manager Level Security Position Information Needed Justin Harwood
Teaching Faculty Positions at Penn State's College of Information Sciences and Technology Nick Giacobe
Re: Director/Manager Level Security Position Information Needed Valerie Vogel

Wednesday, 07 March

Re: Question about confidential data in emails. Kevin Shalla
Re: Who are you training Harris, Brent
Job Posting: Compliance Specialist at Louisiana State University Sumit Jain

Thursday, 08 March

Re: Who are you training Jan Buitron

Friday, 09 March

Info Sec at Small Colleges Davis, Chris
Re: Info Sec at Small Colleges Barton, Robert W.
Re: Info Sec at Small Colleges Ken Connelly
Re: [Newsletter] [SECURITY] Info Sec at Small Colleges Sowjanya O Neill
Re: Info Sec at Small Colleges Colleen Keller
Re: Info Sec at Small Colleges Radhakrishnan, Rashmi
Re: Info Sec at Small Colleges Hagan, Sean
Re: Info Sec at Small Colleges Kurtz, Eric
Re: Info Sec at Small Colleges Joanna Grama
Re: Info Sec at Small Colleges Robert Smith

Saturday, 10 March

Online book about detecting financial fraud Jan Buitron

Sunday, 11 March

Re: Cybersecurity Reports to Board/Audit Committee Mark Reboli

Monday, 12 March

TeamDynamix as a ticket tracking and incident management system for InfoSec José A. Domínguez
Re: TeamDynamix as a ticket tracking and incident management system for InfoSec Jason Fried
Re: HECVAT Users List Ronald King

Tuesday, 13 March

DELL Enterprise Security Suite with Cylance Chris Grooby
Re: DELL Enterprise Security Suite with Cylance Reyor, William F.
Re: DELL Enterprise Security Suite with Cylance Baillio, Aaron
NIST guidelines for passwords Chad Miller
Re: NIST guidelines for passwords Thomas Dugas

Wednesday, 14 March

Re: NIST guidelines for passwords randy

Thursday, 15 March

Tips for using third party survey providers Scott Stoops
Re: Tips for using third party survey providers Laura Raderman
Re: Tips for using third party survey providers Ruth Ginzberg
Re: Tips for using third party survey providers Ken Connelly

Friday, 16 March

Re: TeamDynamix as a ticket tracking and incident management system for InfoSec José A. Domínguez

Monday, 19 March

Information on DLP Deployments Pardonek, Jim
Request for Information - Secure File Transfer Technologies for Research Departments Darren Yezo
Re: Request for Information - Secure File Transfer Technologies for Research Departments Keenan,Paul
Re: Request for Information - Secure File Transfer Technologies for Research Departments Jason Fried
Re: Request for Information - Secure File Transfer Technologies for Research Departments Adam Menos
Re: Request for Information - Secure File Transfer Technologies for Research Departments Pardonek, Jim
Storing SSN on file server Minh Nguyen
Re: Storing SSN on file server Barton, Robert W.
Re: Storing SSN on file server Haselhoff, Brent
Re: Storing SSN on file server Gioia, Matthew P.
Re: Storing SSN on file server Macatiag, Darwin
Re: Storing SSN on file server Kevin Wilcox
Re: Request for Information - Secure File Transfer Technologies for Research Departments Greg Williams
Re: Storing SSN on file server randy
Re: Storing SSN on file server Davis, Kevin

Tuesday, 20 March

Re: HECVAT Users List Steven W Andariese

Wednesday, 21 March

University of California - Information Security Manager Robert Smith

Friday, 23 March

Invitation to participate in EDUCAUSE Core Data Service Content Validation Study Leslie Pearlman

Tuesday, 27 March

Systems Access Policy Madl, Michael
Re: Systems Access Policy Frank Barton
Re: Systems Access Policy Tim Faircloth
Re: Systems Access Policy Ruth Ginzberg
Re: Systems Access Policy Frank Cafasso
HEISC Update, March 2018: New Resources & List Reminders Valerie Vogel
Re: Systems Access Policy Frank Barton
Re: Systems Access Policy Frank Cafasso
Dynamic data collection capabilities? Bridges, Robert A.
On-demand Privilege Escalation Solution for Endpoints Nitin Singh
Re: On-demand Privilege Escalation Solution for Endpoints Davis, Chris

Wednesday, 28 March

Re: Systems Access Policy Boyce, Rori
Re: On-demand Privilege Escalation Solution for Endpoints WALTER KERNER
Re: On-demand Privilege Escalation Solution for Endpoints Shen, Philip (ps7xj)
Re: On-demand Privilege Escalation Solution for Endpoints Biggs, Nathanael
Re: On-demand Privilege Escalation Solution for Endpoints Davis, Chris
Re: On-demand Privilege Escalation Solution for Endpoints Biggs, Nathanael
Re: On-demand Privilege Escalation Solution for Endpoints Shen, Philip (ps7xj)

Thursday, 29 March

Identity Verification Processes Paul Chauvet