Educause Security Discussion: by author

366 messages starting May 08 19 and ending Jun 27 19
Date index | Thread index | Author index


AIS

Re: Which IAM solution do you recommend? AIS (May 08)
Re: GLBA: How are you handling it? AIS (Jun 06)
Re: Which IAM solution do you recommend? AIS (May 10)

Akey, Michael

VPN Concentrator replacement Akey, Michael (May 07)

Albrecht, Travis

Re: Interesting Research Albrecht, Travis (Apr 02)

Alexandre Adao

Re: 2 factor authentication Alexandre Adao (Jun 14)
Re: Proof point vs Mimecast Alexandre Adao (May 24)

Alex Keller

Re: Unknown traffic to known bad actor Alex Keller (May 30)
Re: OpenVAS Alex Keller (May 23)

Alex Lindstrom

Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Alex Lindstrom (Jun 28)

Andregg, Bryan Courtney

Re: Locking Computer Policy Andregg, Bryan Courtney (May 02)

Angel Howard

Re: Server asset inventory tool Angel Howard (Apr 26)

Ashlar Trystan

Re: Interesting Research Ashlar Trystan (Apr 02)

Austin Bollinger

Loan Forgiveness Scam Austin Bollinger (Apr 15)
Social Media Loan Forgiveness Scam Austin Bollinger (Apr 15)

Baillio, Aaron

Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Baillio, Aaron (Apr 05)
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast Baillio, Aaron (May 23)

Bandy, John

Re: VPN Concentrator replacement Bandy, John (May 08)

Barnes, Joe

Job Posting - Cybersecurity Risk Administrative Associate Barnes, Joe (May 09)
Job Posting - University of Illinois - Cybersecurity Specialist Barnes, Joe (Apr 18)

Barton, Robert W.

Re: Prex FR Barton, Robert W. (May 29)
Re: Interesting Research Barton, Robert W. (Apr 02)
OpenVAS Barton, Robert W. (May 23)
FMAudit Barton, Robert W. (Apr 17)
Account Creation, Usage & Inclusion Barton, Robert W. (Jun 10)
Cyber Security Insurance Barton, Robert W. (Jun 24)
Re: FMAudit Barton, Robert W. (Apr 17)

Belford, Jason C. (jcb3zr)

Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Belford, Jason C. (jcb3zr) (May 14)

Ben Marsden

Re: 2 factor authentication Ben Marsden (Jun 07)

Ben Singh (OculusIT)

Re: IAM solution - cloud-based? Ben Singh (OculusIT) (Jun 26)

Bill Thompson

Re: Which IAM solution do you recommend? Bill Thompson (May 10)

Bob Mahoney

Re: Cybersecurity Students Bob Mahoney (Apr 05)

Brad Judy

Re: Interesting Research Brad Judy (Apr 02)
Re: Initial Phishing Simulation - Do you tell them first? Brad Judy (Jun 13)
Re: eDiscovery Solutions Brad Judy (May 29)
SPC possible Sun and Mon night outings Brad Judy (May 10)
Re: Web vulnerability scanning of hosted environments and SAAS Brad Judy (Apr 26)
Incident response and monitoring lead opening Brad Judy (May 13)
Re: Which IAM solution do you recommend? Brad Judy (May 10)
Re: eDiscovery Solutions Brad Judy (May 30)

Brautigam, Keith Adam

Re: Which IAM solution do you recommend? Brautigam, Keith Adam (May 20)

Brian Basgen

Re: Initial Phishing Simulation - Do you tell them first? Brian Basgen (Jun 13)
Re: Cybersecurity Students Brian Basgen (Apr 05)

Brian Clark

Re: 2 factor authentication Brian Clark (Jun 07)
2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)
Re: 2 factor authentication Brian Clark (Jun 07)

Brian Epstein

Re: Wireless Network Rogue Access Points Brian Epstein (May 09)
Re: 2 factor authentication Brian Epstein (Jun 07)
Re: 2 factor authentication Brian Epstein (Jun 07)
Re: VPN Concentrator replacement Brian Epstein (May 07)

Brian Kelly

Presenting Enterprise Risk Register to the board? Brian Kelly (Apr 16)
EDUCAUSE Cybersecurity Program day at IBM X-Force Command Center Brian Kelly (Jun 06)
CISO reporting relationship survey from CIO listserv Brian Kelly (Jun 06)
TargetX vulnerability post Brian Kelly (Apr 04)
Update : TargetX vulnerability post Brian Kelly (Apr 05)

Bridges, Robert A.

Re: [EXTERNAL] Re: [SECURITY] Benign samples for testing AV vendors Bridges, Robert A. (May 22)
Benign samples for testing AV vendors Bridges, Robert A. (May 20)
Re: [EXTERNAL] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Bridges, Robert A. (Jun 13)
Re: Interesting Research Bridges, Robert A. (Apr 02)
Re: Interesting Research Bridges, Robert A. (Apr 02)

Bruce Carter

Re: 2 factor authentication Bruce Carter (Jun 14)
Re: 2 factor authentication Bruce Carter (Jun 14)

Bryce Porter

Re: eDiscovery Solutions Bryce Porter (May 29)
eDiscovery Solutions Bryce Porter (May 29)

Bukaweski, Dylan S

Re: [External] [SECURITY] PCI keeping it simple Bukaweski, Dylan S (Apr 23)

Bumpas, Shana

Re: KnowBe4 Security & Awareness Training Feedback Bumpas, Shana (Apr 04)

Burns, Denis

Re: Cybersecurity Students Burns, Denis (Apr 05)
Re: Locking Computer Policy Burns, Denis (May 02)

Cam Beasley

fyi: free community-based vendor assessment tool [ISORA-Lite] Cam Beasley (May 13)
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley (Apr 01)
Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley (Jun 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley (Jun 04)
Summary Report :: Dorkbot Service [APR 2019-04] Cam Beasley (May 01)
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley (Apr 01)

Casanova, Jodi

Phish Hunter Casanova, Jodi (Jun 12)

Cathy Hubbs

Question for those using a FIM for PCI compliance Cathy Hubbs (Apr 30)

Cavender, Terry L

Re: 2 factor authentication Cavender, Terry L (Jun 11)

Chad Tracy

Re: 2 factor authentication Chad Tracy (Jun 07)
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Chad Tracy (May 23)
Done in 60 seconds - who doesn't love a short survey Chad Tracy (May 20)

Cheryl Washington

EDUCAUSE - Leadership Institute Program Cheryl Washington (Apr 15)

Chrisinger, Cory A

Re: Phish Hunter Chrisinger, Cory A (Jun 13)

Chris Wilson

Unknown traffic to known bad actor Chris Wilson (May 30)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson (Jun 04)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson (Jun 04)

Clark Gaylord

Re: Server asset inventory tool Clark Gaylord (Apr 29)
Re: Interesting Research Clark Gaylord (Apr 02)

Cleary, Kevin

Re: Container Security Cleary, Kevin (Jun 04)
Re: Server asset inventory tool Cleary, Kevin (Apr 25)

Colin Abbott

SecureLink vs VPN for privileged vendor access Colin Abbott (May 24)
Distributing initial credential Colin Abbott (Apr 10)

Colleen Keller

Re: Cybersecurity Insurance Colleen Keller (Jun 07)

Coller, Jon

Re: Transport rule to put a header on external email Coller, Jon (May 07)

Conlee, Keith

Re: Training and Compliance Portal Conlee, Keith (Jun 26)

Corley, Robert B (KCTCS)

KY Cybersecurity Summit Corley, Robert B (KCTCS) (Jun 26)

Dale Lee

Re: FMAudit Dale Lee (Apr 17)

Dan Jones

Re: Presenting Enterprise Risk Register to the board? Dan Jones (Apr 16)

Dave Broucek

Re: Locking Computer Policy Dave Broucek (May 02)
Data Protection Officer (DPO) Dave Broucek (Apr 05)
Re: Initial Phishing Simulation - Do you tell them first? Dave Broucek (Jun 13)

David Curry

Job Postings - Privacy Engineer, Privacy & Security Compliance Specialist David Curry (Jun 26)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] David Curry (Jun 04)

David Eilken

Re: Initial Phishing Simulation - Do you tell them first? David Eilken (Jun 17)
Re: Which IAM solution do you recommend? David Eilken (May 09)
Initial Phishing Simulation - Do you tell them first? David Eilken (Jun 12)
Not using Kaspersky? David Eilken (Apr 04)

David Escalante

Re: SPC possible Sun and Mon night outings David Escalante (May 10)
Re: Server asset inventory tool David Escalante (Apr 26)

Davis, Ken

Re: Student Identity Verification Davis, Ken (Jun 04)

Dennis Bolton

Re: Initial Phishing Simulation - Do you tell them first? Dennis Bolton (Jun 13)

Dewight Fredrick Kramer

UC Davis Info Sec Job Opportunities Dewight Fredrick Kramer (Jun 03)

Diane Camper

Re: [External] SECURITY Digest - 30 May 2019 to 31 May 2019 (#2019-97) Diane Camper (May 31)
Re: unknown traffic to bad actor Diane Camper (May 31)
Re: unknown traffic to bad actor Diane Camper (May 31)

Dugan, Darin D [ITSYS]

Re: VPN Concentrator replacement Dugan, Darin D [ITSYS] (May 08)
Re: 2 factor authentication Dugan, Darin D [ITSYS] (Jun 14)
Re: Microsoft MFA Opt-In Dugan, Darin D [ITSYS] (May 29)

Emily Harris

Job Posting: Director of Information Security for Willams College, Williamstown, MA Emily Harris (May 21)

Eric Epps

Re: Training and Compliance Portal Eric Epps (May 28)
Re: Training and Compliance Portal Eric Epps (Jun 26)

Eric Sawyer

Re: Initial Phishing Simulation - Do you tell them first? Eric Sawyer (Jun 13)

Eric Weakland

Re: Initial Phishing Simulation - Do you tell them first? Eric Weakland (Jun 13)

Erik D Evans

Re: Transport rule to put a header on external email Erik D Evans (May 09)

Escue, Charles E

Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Escue, Charles E (Jun 28)

Francisco Chavez

Re: Which IAM solution do you recommend? Francisco Chavez (May 09)
Re: a few more 2 factor authentication questions Francisco Chavez (Jun 21)
Re: VPN Concentrator replacement Francisco Chavez (May 07)
Re: BCP & DR policy Francisco Chavez (Apr 30)

Frank Barton

Re: Proof point vs Mimecast Frank Barton (May 24)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton (Jun 04)
Re: Disk encryption Frank Barton (Jun 04)
Due Diligence, vendor assessments, etc. Frank Barton (Apr 30)
Re: Cybersecurity Students Frank Barton (Apr 04)
Re: Benign samples for testing AV vendors Frank Barton (May 20)
Re: MSUDenver seeing potential bot-net DDOS Frank Barton (Apr 03)
Re: FMAudit Frank Barton (Apr 18)
Re: Transport rule to put a header on external email Frank Barton (May 07)
Re: MSUDenver seeing potential bot-net DDOS Frank Barton (Apr 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton (Jun 04)

Gael Frouin

Re: Interesting Research Gael Frouin (Apr 02)

Gavin Wiltshire

Re: Prex FR Gavin Wiltshire (May 29)

Gene LeDuc

Re: [EXTERNAL] [SECURITY] SecureLink Vendor Access Gene LeDuc (Jun 25)
Re: [EXTERNAL] [SECURITY] SecureLink vs VPN for privileged vendor access Gene LeDuc (May 24)

George J. Silowash

Student Identity Verification George J. Silowash (Jun 04)

Giacobe, Nick

Re: Cybersecurity Students Giacobe, Nick (Apr 05)
Re: Cybersecurity Students Giacobe, Nick (Apr 05)

Glenn Forbes Fleming Larratt

Re: Interesting Reseach Glenn Forbes Fleming Larratt (Apr 03)

Gonzalez, Joshua

Re: 2 factor authentication Gonzalez, Joshua (Jun 11)

Gregg, Christopher S.

Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Gregg, Christopher S. (May 22)
Re: [External] Re: [SECURITY] Transport rule to put a header on external email Gregg, Christopher S. (May 09)
Re: [External] [SECURITY] Locking Computer Policy Gregg, Christopher S. (May 02)
Re: [External] Re: [SECURITY] Student employees and access to data Gregg, Christopher S. (May 10)
Re: [External] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Gregg, Christopher S. (Jun 13)
Re: [External] Re: [SECURITY] 2 factor authentication Gregg, Christopher S. (Jun 11)

Greg Williams

Re: Cybersecurity Students Greg Williams (Apr 04)
Re: Interesting Research Greg Williams (Apr 02)

Grilli, Brian Robert

Re: BitLocker Grilli, Brian Robert (Jun 28)

Grinnell, Michael (mg7aa)

SANS SEC401 Training at UVA Grinnell, Michael (mg7aa) (Jun 11)
Re: SANS SEC401 Training at UVA Grinnell, Michael (mg7aa) (Jun 17)

Hagan, Sean

Re: Cybersecurity Insurance Hagan, Sean (Jun 07)

Hall, Rand

Re: Summary Report :: Dorkbot Service [MAY 2019-05] Hall, Rand (Jun 04)

Harry Hoffman

Re: Prex FR Harry Hoffman (May 29)

Hart, Michael

Re: Cybersecurity Insurance Hart, Michael (Jun 07)
Re: MSUDenver seeing potential bot-net DDOS Hart, Michael (Apr 03)
Re: Initial Phishing Simulation - Do you tell them first? Hart, Michael (Jun 13)
MSUDenver seeing potential bot-net DDOS Hart, Michael (Apr 03)

Harvard Townsend

Re: Phish Hunter Harvard Townsend (Jun 12)

Haselhoff, Brent

Re: a few more 2 factor authentication questions Haselhoff, Brent (Jun 21)
Re: PCI keeping it simple Haselhoff, Brent (Apr 23)

Herring, Todd William

SANS / REN-ISAC Partnership Program Herring, Todd William (Jun 05)

Hiram Wong

Re: Interesting Research Hiram Wong (Apr 02)

Jackson, Ms. D'Ann

Re: Cyber / Networking Faculty Position - Pikes Peak Community College Jackson, Ms. D'Ann (Apr 15)
Digital Risk Protection Inquiry Jackson, Ms. D'Ann (May 20)

James Farr

Re: Gmail Options for SPAM and Phishing James Farr (Apr 24)
Gmail Options for SPAM and Phishing James Farr (Apr 09)

James Valente

Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente (Jun 12)
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data James Valente (May 10)
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente (Jun 12)

Jared Evans

Which IAM solution do you recommend? Jared Evans (May 08)
IAM solution - cloud-based? Jared Evans (Jun 26)
Web vulnerability scanning of hosted environments and SAAS Jared Evans (Apr 26)

Jarret Cummings

Re: GLBA: How are you handling it? Jarret Cummings (Jun 06)
Re: GLBA: How are you handling it? Jarret Cummings (Jun 06)
Safeguards Rule additional requirements proposal tomorrow Jarret Cummings (Apr 03)
Re: GLBA: How are you handling it? Jarret Cummings (Jun 07)

Jason Borinski

Container Security Jason Borinski (Jun 03)
Re: Container Security Jason Borinski (Jun 04)

Jason Edelstein

Re: Proof point vs Mimecast Jason Edelstein (May 23)

Jason Fried

Banner 9 - Limiting Access to student records Jason Fried (May 29)
Re: Initial Phishing Simulation - Do you tell them first? Jason Fried (Jun 13)

Jeff Choo

Re: Personal Email and other Services Jeff Choo (May 02)

Jenny Blaine

Re: 2 factor authentication Jenny Blaine (Jun 07)

Jesse Bowling

Unofficial SPC event: Joshua Beeman Memorial Fun Run Jesse Bowling (May 11)

Jessica Murray

Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Jessica Murray (Apr 05)

Jessica P Drefs

Policy Exception vs Risk Acceptance Jessica P Drefs (May 20)

Joey Rego

GLBA: How are you handling it? Joey Rego (Jun 06)

John Chapman

Re: Interesting Research John Chapman (Apr 03)

John McCabe

Re: Interesting Research John McCabe (Apr 02)
Disk encryption John McCabe (Jun 04)
Re: Benign samples for testing AV vendors John McCabe (May 20)

Johnson Akse, Terri

Re: Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri (Apr 15)
Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri (Apr 15)

Jones, Mark B

Re: Interesting Research Jones, Mark B (Apr 02)

José A . Domínguez

Fwd: Call for Participation Open - Internet2 TechEX 2019 José A . Domínguez (Apr 29)

Joseph Tam

Re: MSUDenver seeing potential bot-net DDOS Joseph Tam (Apr 03)

JT Moser

Re: BCP & DR policy JT Moser (Apr 30)

Julian Y Koh

Re: Locking Computer Policy Julian Y Koh (May 02)

Ken Connelly

Re: Initial Phishing Simulation - Do you tell them first? Ken Connelly (Jun 13)

Kevin Wilcox

Re: 2 factor authentication Kevin Wilcox (Jun 07)
Re: Benign samples for testing AV vendors Kevin Wilcox (May 20)
Re: Server asset inventory tool Kevin Wilcox (Apr 26)
Re: 2 factor authentication Kevin Wilcox (Jun 07)

King, Ronald A.

Re: Interesting Research King, Ronald A. (Apr 09)
Re: Locking Computer Policy King, Ronald A. (May 06)
Re: VPN Concentrator replacement King, Ronald A. (May 08)
NSU is Hiring Senior Network Engineer and a Project Engineer King, Ronald A. (Apr 19)
Re: Personal Email and other Services King, Ronald A. (May 06)
Interesting Research King, Ronald A. (Apr 02)
Re: 2 factor authentication King, Ronald A. (Jun 11)
Re: Student employees and access to data King, Ronald A. (May 10)
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast King, Ronald A. (May 23)
Re: Personal Email and other Services King, Ronald A. (May 07)
Re: OpenVAS King, Ronald A. (May 23)

Kristen Dietiker

G Suite marketplace policies and guidelines Kristen Dietiker (Apr 08)

Kristi Olson

Re: SECURITY Digest - 1 Apr 2019 to 2 Apr 2019 - Special issue (#2019-56) Kristi Olson (Apr 02)

Kurtz, Eric

Re: Microsoft MFA Opt-In Kurtz, Eric (May 29)

Lance Hourany

Cybersecurity Insurance Lance Hourany (Jun 07)

Larry K. Emmons

SecureLink Vendor Access Larry K. Emmons (Jun 25)

Laverty, Patrick

Re: Interesting Research Laverty, Patrick (Apr 02)

Lazar, Edgar (NBCC)

Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Scott Bell Lazar, Edgar (NBCC) (May 28)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Canceled: Prex FR Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Canceled: Scott Bell Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Prex FR Lazar, Edgar (NBCC) (May 28)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC) (May 29)

Leah Lang

Re: 2 factor authentication Leah Lang (Jun 10)
Re: Which IAM solution do you recommend? Leah Lang (May 09)

Linc Nesheim

Re: Student employees and access to data Linc Nesheim (May 10)

Lovaas,Steven

Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven (Jun 03)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven (Jun 03)

Ludwig, Linda

Re: [External] [SECURITY] PCI keeping it simple Ludwig, Linda (Apr 23)

Madl, Michael

Re: Transport rule to put a header on external email Madl, Michael (May 07)
Re: KnowBe4 Security & Awareness Training Feedback Madl, Michael (Apr 01)

Mahmud Rahman

Re: Which IAM solution do you recommend? Mahmud Rahman (May 08)
Re: IAM solution - cloud-based? Mahmud Rahman (Jun 26)

Mandi Witkovsky

Re: Locking Computer Policy Mandi Witkovsky (May 02)
Transport rule to put a header on external email Mandi Witkovsky (May 07)
Server asset inventory tool Mandi Witkovsky (Apr 24)

Mardecia Bell

Re: EDUCAUSE - Leadership Institute Program Mardecia Bell (Apr 15)

Mark Poepping

Re: Interesting Research Mark Poepping (Apr 09)

Mark Purcell

Re: GLBA: How are you handling it? Mark Purcell (Jun 06)

Matt Boeckner

Re: 2 factor authentication Matt Boeckner (Jun 14)

Matt Hall

Job Posting - Director of Information Technology Matt Hall (May 29)

Matthew D Kelly

Security incident with Nebraska Books/PrismRBS Matthew D Kelly (May 06)

Max McGrath

Re: Proof point vs Mimecast Max McGrath (May 23)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath (May 12)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath (May 14)

Menne, Michael S

Re: Phish Hunter Menne, Michael S (Jun 21)

Michael Duff

Re: Cybersecurity Students Michael Duff (Apr 05)
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Michael Duff (Apr 05)

Michael Passer

Grand Rapids, MI job opportunity closing 5/2 - Enterprise Analyst, security emphasis Michael Passer (Apr 24)

Michael William Zimmer

Re: Which IAM solution do you recommend? Michael William Zimmer (May 08)

Miguel Angel Gonzalez de la Torre

Re: Which IAM solution do you recommend? Miguel Angel Gonzalez de la Torre (May 08)

Mike Beane

Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data Mike Beane (May 10)

Mike Wiseman

Re: VPN Concentrator replacement Mike Wiseman (May 08)

Neal O'Farrell

Re: Training and Compliance Portal Neal O'Farrell (Jun 26)
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell (Jun 13)
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Neal O'Farrell (Apr 15)
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell (Jun 13)
Re: TargetX vulnerability post Neal O'Farrell (Apr 08)
Re: TargetX vulnerability post Neal O'Farrell (Apr 08)

Nicholas Garigliano

Re: Cybersecurity Students Nicholas Garigliano (Apr 05)

O'Callaghan, Daniel

Re: Proof point vs Mimecast O'Callaghan, Daniel (May 23)

Odi Iancu

Re: 2 factor authentication Odi Iancu (Jun 12)

Pardonek, Jim

Training and Compliance Portal Pardonek, Jim (May 24)
Microsoft MFA Opt-In Pardonek, Jim (May 29)
Re: VPN Concentrator replacement Pardonek, Jim (May 08)

Paul Chauvet

Re: PCI keeping it simple Paul Chauvet (Apr 23)
Re: Server asset inventory tool Paul Chauvet (Apr 29)

Paul Howell

Senior Cyberinfrastructure Security Architect Paul Howell (May 20)
Job Posting - DevOPs Network Engineer Paul Howell (May 29)

Penn, Blake C

Re: GLBA: How are you handling it? Penn, Blake C (Jun 06)
Re: GLBA: How are you handling it? Penn, Blake C (Jun 06)

Perrotti, Gregory

Wireless Network Rogue Access Points Perrotti, Gregory (May 09)

Pesino, Sherry

Re: Student employees and access to data Pesino, Sherry (May 10)

Pete, Andrew

Re: Managed services provider question Pete, Andrew (Jun 13)
Re: Cybersecurity Students Pete, Andrew (Apr 05)
Managed services provider question Pete, Andrew (Jun 12)
Student employees and access to data Pete, Andrew (May 10)
Re: Managed services provider question Pete, Andrew (Jun 12)
Cybersecurity Students Pete, Andrew (Apr 04)

Petrus Williams

Personal Email and other Services Petrus Williams (May 02)

Pitt, Sharon

Re: Cybersecurity Insurance Pitt, Sharon (Jun 07)

Quackenbush, Darlene H - quackedh

Re: HECVAT and HECVAT lite Threshold Quackenbush, Darlene H - quackedh (Jun 27)

Richard Siedzik

Re: (WARNING) Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Richard Siedzik (Jun 13)
Re: (WARNING) Re: [SECURITY] Cybersecurity Insurance Richard Siedzik (Jun 07)

Rich Lang

Data Center Forward Proxies/Web Security Gateways Rich Lang (Apr 18)

Robert Smith

BCP & DR policy Robert Smith (Apr 30)

Rob Milman

Re: Initial Phishing Simulation - Do you tell them first? Rob Milman (Jun 13)
Re: Cybersecurity Students Rob Milman (Apr 05)

Ronald Loneker

Re: Locking Computer Policy Ronald Loneker (May 06)
Locking Computer Policy Ronald Loneker (May 01)
Re: Locking Computer Policy Ronald Loneker (May 06)

Samih Ajrouch

Data centers DR Samih Ajrouch (May 01)
Re: Server asset inventory tool Samih Ajrouch (Apr 26)

Sarah Bigham

[Registration Reminder] REN-ISAC Workshop @ Purdue University Ft. Wayne: 7/9/19 Sarah Bigham (Jun 17)

Schnitzer, Lawrence

a few more 2 factor authentication questions Schnitzer, Lawrence (Jun 21)

Schwartz, John

Re: Presenting Enterprise Risk Register to the board? Schwartz, John (Apr 16)

Scott Stoops

Re: Initial Phishing Simulation - Do you tell them first? Scott Stoops (Jun 13)
Re: Distributing initial credential Scott Stoops (Apr 10)
Re: SPC possible Sun and Mon night outings Scott Stoops (May 10)

Seidl, David

Job Posting - Assistant Vice President and CISO at Miami University (Ohio) Seidl, David (May 30)

Seth A. Shestack

Re: 2 factor authentication Seth A. Shestack (Jun 12)

Sharkirah Foote

Re: DUO vs Azure/O365 MFA Sharkirah Foote (Apr 30)

Snook, Allen

Re: Proof point vs Mimecast Snook, Allen (May 24)
Proof point vs Mimecast Snook, Allen (May 23)

Sonder, Henk E.

Re: Managed services provider question Sonder, Henk E. (Jun 13)
Re: Initial Phishing Simulation - Do you tell them first? Sonder, Henk E. (Jun 13)

Stefan Wahe

Prex FR Stefan Wahe (May 28)
CALL FOR PROPOSALS: UW-Madison Cybersecurity Lockdown Conference Stefan Wahe (Apr 29)

Steven Helwig

Please Remove from The List Steven Helwig (May 08)

Steve Niedzwiecki

Re: DUO vs Azure/O365 MFA Steve Niedzwiecki (Apr 15)

St-Jean, Daniel

BitLocker St-Jean, Daniel (Jun 28)

Tanner, Andrea

Re: Interesting Research Tanner, Andrea (Apr 02)

Taylor Randle

Re: Proof point vs Mimecast Taylor Randle (May 23)

Telfer, Will

Re: a few more 2 factor authentication questions Telfer, Will (Jun 21)
Re: 2 factor authentication Telfer, Will (Jun 07)
Re: DUO vs Azure/O365 MFA Telfer, Will (Apr 16)
Re: 2 factor authentication Telfer, Will (Jun 07)
Re: VPN Concentrator replacement Telfer, Will (May 07)

Thierry Lechler

Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler (Apr 23)
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler (Apr 23)

Thomas Carter

Re: Transport rule to put a header on external email Thomas Carter (May 07)

Thomas Dugas

Re: Which IAM solution do you recommend? Thomas Dugas (May 08)

Tomassetti, Tina

Re: Server asset inventory tool Tomassetti, Tina (Apr 25)

Tom Miller

Re: Malware detection Tom Miller (Apr 01)
Re: Managed services provider question Tom Miller (Jun 12)
Re: Locking Computer Policy Tom Miller (May 02)
Re: Managed services provider question Tom Miller (Jun 13)

Valdis Klētnieks

Re: Personal Email and other Services Valdis Klētnieks (May 06)
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Valdis Klētnieks (Jun 04)

Valerie Vogel

SANS Security Awareness Summit, August 7-8 in San Diego Valerie Vogel (Jun 12)
Re: Initial Phishing Simulation - Do you tell them first? Valerie Vogel (Jun 13)
CyberStart Program for College Students Valerie Vogel (May 07)
Announcing our July 18 Coffee Shop on Preparing for NCSAM! Valerie Vogel (Jun 21)

Von Welch (Work)

Re: Interesting Research Von Welch (Work) (Apr 02)

Wade Lambert

Re: SECURITY Digest - 24 Apr 2019 to 25 Apr 2019 (#2019-74) Wade Lambert (Apr 26)

Watkins, Jameson

Re: Initial Phishing Simulation - Do you tell them first? Watkins, Jameson (Jun 18)

Wessam Maher

DUO vs Azure/O365 MFA Wessam Maher (Apr 14)
ClearPass 802.1x and password change/expiry Wessam Maher (Apr 13)

Windham, Gary D - (windhamg)

Re: 2 factor authentication Windham, Gary D - (windhamg) (Jun 07)

Yost, Davis

PCI keeping it simple Yost, Davis (Apr 23)

Zachary Yamada

Re: Cybersecurity Students Zachary Yamada (Apr 04)

Zeshan Siddiqui

HECVAT and HECVAT lite Threshold Zeshan Siddiqui (Jun 27)