Educause Security Discussion: by date
366 messages
starting Apr 01 19 and
ending Jun 28 19
Date index |
Thread index |
Author index
Monday, 01 April
Re: Malware detection Tom Miller
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley
Re: KnowBe4 Security & Awareness Training Feedback Madl, Michael
Tuesday, 02 April
Interesting Research King, Ronald A.
Re: Interesting Research Brad Judy
Re: Interesting Research Jones, Mark B
Re: Interesting Research Hiram Wong
Re: Interesting Research Gael Frouin
Re: Interesting Research Albrecht, Travis
Re: Interesting Research Laverty, Patrick
Re: Interesting Research Barton, Robert W.
Re: Interesting Research Greg Williams
Re: Interesting Research Ashlar Trystan
Re: Interesting Research John McCabe
Re: Interesting Research Clark Gaylord
Re: SECURITY Digest - 1 Apr 2019 to 2 Apr 2019 - Special issue (#2019-56) Kristi Olson
Re: Interesting Research Bridges, Robert A.
Re: Interesting Research Bridges, Robert A.
Re: Interesting Research Tanner, Andrea
Re: Interesting Research Von Welch (Work)
Wednesday, 03 April
Re: Interesting Research John Chapman
Re: Interesting Reseach Glenn Forbes Fleming Larratt
MSUDenver seeing potential bot-net DDOS Hart, Michael
Re: MSUDenver seeing potential bot-net DDOS Frank Barton
Re: MSUDenver seeing potential bot-net DDOS Frank Barton
Re: MSUDenver seeing potential bot-net DDOS Hart, Michael
Safeguards Rule additional requirements proposal tomorrow Jarret Cummings
Re: MSUDenver seeing potential bot-net DDOS Joseph Tam
Thursday, 04 April
Not using Kaspersky? David Eilken
Re: KnowBe4 Security & Awareness Training Feedback Bumpas, Shana
Cybersecurity Students Pete, Andrew
Re: Cybersecurity Students Greg Williams
TargetX vulnerability post Brian Kelly
Re: Cybersecurity Students Zachary Yamada
Re: Cybersecurity Students Frank Barton
Friday, 05 April
Re: Cybersecurity Students Burns, Denis
Re: Cybersecurity Students Nicholas Garigliano
Re: Cybersecurity Students Pete, Andrew
Re: Cybersecurity Students Brian Basgen
Re: Cybersecurity Students Rob Milman
Re: Cybersecurity Students Giacobe, Nick
Re: Cybersecurity Students Giacobe, Nick
Re: Cybersecurity Students Michael Duff
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Baillio, Aaron
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Michael Duff
Re: Cybersecurity Students Bob Mahoney
Data Protection Officer (DPO) Dave Broucek
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Jessica Murray
Update : TargetX vulnerability post Brian Kelly
Monday, 08 April
Re: TargetX vulnerability post Neal O'Farrell
G Suite marketplace policies and guidelines Kristen Dietiker
Re: TargetX vulnerability post Neal O'Farrell
Tuesday, 09 April
Re: Interesting Research King, Ronald A.
Gmail Options for SPAM and Phishing James Farr
Re: Interesting Research Mark Poepping
Wednesday, 10 April
Distributing initial credential Colin Abbott
Re: Distributing initial credential Scott Stoops
Saturday, 13 April
ClearPass 802.1x and password change/expiry Wessam Maher
Sunday, 14 April
DUO vs Azure/O365 MFA Wessam Maher
Monday, 15 April
EDUCAUSE - Leadership Institute Program Cheryl Washington
Re: EDUCAUSE - Leadership Institute Program Mardecia Bell
Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Jackson, Ms. D'Ann
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Neal O'Farrell
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri
Social Media Loan Forgiveness Scam Austin Bollinger
Loan Forgiveness Scam Austin Bollinger
Re: DUO vs Azure/O365 MFA Steve Niedzwiecki
Tuesday, 16 April
Re: DUO vs Azure/O365 MFA Telfer, Will
Presenting Enterprise Risk Register to the board? Brian Kelly
Re: Presenting Enterprise Risk Register to the board? Schwartz, John
Re: Presenting Enterprise Risk Register to the board? Dan Jones
Wednesday, 17 April
FMAudit Barton, Robert W.
Re: FMAudit Dale Lee
Re: FMAudit Barton, Robert W.
Thursday, 18 April
Re: FMAudit Frank Barton
Job Posting - University of Illinois - Cybersecurity Specialist Barnes, Joe
Data Center Forward Proxies/Web Security Gateways Rich Lang
Friday, 19 April
NSU is Hiring Senior Network Engineer and a Project Engineer King, Ronald A.
Tuesday, 23 April
PCI keeping it simple Yost, Davis
Re: PCI keeping it simple Haselhoff, Brent
Re: [External] [SECURITY] PCI keeping it simple Bukaweski, Dylan S
Re: PCI keeping it simple Paul Chauvet
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler
Re: [External] [SECURITY] PCI keeping it simple Ludwig, Linda
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler
Wednesday, 24 April
Server asset inventory tool Mandi Witkovsky
Re: Gmail Options for SPAM and Phishing James Farr
Grand Rapids, MI job opportunity closing 5/2 - Enterprise Analyst, security emphasis Michael Passer
Thursday, 25 April
Re: Server asset inventory tool Tomassetti, Tina
Re: Server asset inventory tool Cleary, Kevin
Friday, 26 April
Re: Server asset inventory tool Samih Ajrouch
Re: Server asset inventory tool Angel Howard
Re: SECURITY Digest - 24 Apr 2019 to 25 Apr 2019 (#2019-74) Wade Lambert
Web vulnerability scanning of hosted environments and SAAS Jared Evans
Re: Web vulnerability scanning of hosted environments and SAAS Brad Judy
Re: Server asset inventory tool Kevin Wilcox
Re: Server asset inventory tool David Escalante
Monday, 29 April
Re: Server asset inventory tool Paul Chauvet
Re: Server asset inventory tool Clark Gaylord
CALL FOR PROPOSALS: UW-Madison Cybersecurity Lockdown Conference Stefan Wahe
Fwd: Call for Participation Open - Internet2 TechEX 2019 José A . Domínguez
Tuesday, 30 April
Due Diligence, vendor assessments, etc. Frank Barton
Question for those using a FIM for PCI compliance Cathy Hubbs
BCP & DR policy Robert Smith
Re: BCP & DR policy Francisco Chavez
Re: BCP & DR policy JT Moser
Re: DUO vs Azure/O365 MFA Sharkirah Foote
Wednesday, 01 May
Data centers DR Samih Ajrouch
Summary Report :: Dorkbot Service [APR 2019-04] Cam Beasley
Locking Computer Policy Ronald Loneker
Thursday, 02 May
Re: Locking Computer Policy Mandi Witkovsky
Re: Locking Computer Policy Andregg, Bryan Courtney
Re: Locking Computer Policy Tom Miller
Re: Locking Computer Policy Julian Y Koh
Re: [External] [SECURITY] Locking Computer Policy Gregg, Christopher S.
Re: Locking Computer Policy Burns, Denis
Re: Locking Computer Policy Dave Broucek
Personal Email and other Services Petrus Williams
Re: Personal Email and other Services Jeff Choo
Monday, 06 May
Re: Locking Computer Policy Ronald Loneker
Re: Locking Computer Policy Ronald Loneker
Re: Locking Computer Policy King, Ronald A.
Re: Personal Email and other Services King, Ronald A.
Security incident with Nebraska Books/PrismRBS Matthew D Kelly
Re: Personal Email and other Services Valdis Klētnieks
Tuesday, 07 May
Transport rule to put a header on external email Mandi Witkovsky
Re: Transport rule to put a header on external email Madl, Michael
Re: Personal Email and other Services King, Ronald A.
Re: Transport rule to put a header on external email Frank Barton
Re: Transport rule to put a header on external email Coller, Jon
Re: Transport rule to put a header on external email Thomas Carter
CyberStart Program for College Students Valerie Vogel
VPN Concentrator replacement Akey, Michael
Re: VPN Concentrator replacement Telfer, Will
Re: VPN Concentrator replacement Francisco Chavez
Re: VPN Concentrator replacement Brian Epstein
Wednesday, 08 May
Re: VPN Concentrator replacement Bandy, John
Re: VPN Concentrator replacement Mike Wiseman
Re: VPN Concentrator replacement Pardonek, Jim
Re: VPN Concentrator replacement Dugan, Darin D [ITSYS]
Re: VPN Concentrator replacement King, Ronald A.
Which IAM solution do you recommend? Jared Evans
Re: Which IAM solution do you recommend? Michael William Zimmer
Re: Which IAM solution do you recommend? Thomas Dugas
Re: Which IAM solution do you recommend? Mahmud Rahman
Re: Which IAM solution do you recommend? Miguel Angel Gonzalez de la Torre
Re: Which IAM solution do you recommend? AIS
Please Remove from The List Steven Helwig
Thursday, 09 May
Re: Which IAM solution do you recommend? Leah Lang
Wireless Network Rogue Access Points Perrotti, Gregory
Re: Wireless Network Rogue Access Points Brian Epstein
Re: Transport rule to put a header on external email Erik D Evans
Re: [External] Re: [SECURITY] Transport rule to put a header on external email Gregg, Christopher S.
Job Posting - Cybersecurity Risk Administrative Associate Barnes, Joe
Re: Which IAM solution do you recommend? David Eilken
Re: Which IAM solution do you recommend? Francisco Chavez
Friday, 10 May
Student employees and access to data Pete, Andrew
Re: Student employees and access to data Pesino, Sherry
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data James Valente
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data Mike Beane
Re: Which IAM solution do you recommend? Brad Judy
Re: Student employees and access to data King, Ronald A.
SPC possible Sun and Mon night outings Brad Judy
Re: Which IAM solution do you recommend? AIS
Re: SPC possible Sun and Mon night outings David Escalante
Re: [External] Re: [SECURITY] Student employees and access to data Gregg, Christopher S.
Re: Student employees and access to data Linc Nesheim
Re: SPC possible Sun and Mon night outings Scott Stoops
Re: Which IAM solution do you recommend? Bill Thompson
Saturday, 11 May
Unofficial SPC event: Joshua Beeman Memorial Fun Run Jesse Bowling
Sunday, 12 May
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath
Monday, 13 May
Incident response and monitoring lead opening Brad Judy
fyi: free community-based vendor assessment tool [ISORA-Lite] Cam Beasley
Tuesday, 14 May
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Belford, Jason C. (jcb3zr)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath
Monday, 20 May
Senior Cyberinfrastructure Security Architect Paul Howell
Re: Which IAM solution do you recommend? Brautigam, Keith Adam
Done in 60 seconds - who doesn't love a short survey Chad Tracy
Policy Exception vs Risk Acceptance Jessica P Drefs
Benign samples for testing AV vendors Bridges, Robert A.
Digital Risk Protection Inquiry Jackson, Ms. D'Ann
Re: Benign samples for testing AV vendors Frank Barton
Re: Benign samples for testing AV vendors Kevin Wilcox
Re: Benign samples for testing AV vendors John McCabe
Tuesday, 21 May
Job Posting: Director of Information Security for Willams College, Williamstown, MA Emily Harris
Wednesday, 22 May
Re: [EXTERNAL] Re: [SECURITY] Benign samples for testing AV vendors Bridges, Robert A.
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Gregg, Christopher S.
Thursday, 23 May
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Chad Tracy
Proof point vs Mimecast Snook, Allen
Re: Proof point vs Mimecast Taylor Randle
Re: Proof point vs Mimecast O'Callaghan, Daniel
Re: Proof point vs Mimecast Max McGrath
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast Baillio, Aaron
OpenVAS Barton, Robert W.
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast King, Ronald A.
Re: OpenVAS King, Ronald A.
Re: OpenVAS Alex Keller
Re: Proof point vs Mimecast Jason Edelstein
Friday, 24 May
Re: Proof point vs Mimecast Snook, Allen
Re: Proof point vs Mimecast Frank Barton
Training and Compliance Portal Pardonek, Jim
SecureLink vs VPN for privileged vendor access Colin Abbott
Re: Proof point vs Mimecast Alexandre Adao
Re: [EXTERNAL] [SECURITY] SecureLink vs VPN for privileged vendor access Gene LeDuc
Tuesday, 28 May
Re: Training and Compliance Portal Eric Epps
Scott Bell Lazar, Edgar (NBCC)
Prex FR Lazar, Edgar (NBCC)
Prex FR Stefan Wahe
Wednesday, 29 May
Re: Prex FR Gavin Wiltshire
Re: Prex FR Barton, Robert W.
Canceled: Scott Bell Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Canceled: Prex FR Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Re: Prex FR Harry Hoffman
Job Posting - DevOPs Network Engineer Paul Howell
Banner 9 - Limiting Access to student records Jason Fried
Microsoft MFA Opt-In Pardonek, Jim
Re: Microsoft MFA Opt-In Kurtz, Eric
Re: Microsoft MFA Opt-In Dugan, Darin D [ITSYS]
eDiscovery Solutions Bryce Porter
Re: eDiscovery Solutions Brad Judy
Job Posting - Director of Information Technology Matt Hall
Re: eDiscovery Solutions Bryce Porter
Thursday, 30 May
Unknown traffic to known bad actor Chris Wilson
Job Posting - Assistant Vice President and CISO at Miami University (Ohio) Seidl, David
Re: Unknown traffic to known bad actor Alex Keller
Re: eDiscovery Solutions Brad Judy
Friday, 31 May
Re: unknown traffic to bad actor Diane Camper
Re: unknown traffic to bad actor Diane Camper
Re: [External] SECURITY Digest - 30 May 2019 to 31 May 2019 (#2019-97) Diane Camper
Monday, 03 June
UC Davis Info Sec Job Opportunities Dewight Fredrick Kramer
Container Security Jason Borinski
Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven
Tuesday, 04 June
Re: Container Security Cleary, Kevin
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson
Student Identity Verification George J. Silowash
Disk encryption John McCabe
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Hall, Rand
Re: Disk encryption Frank Barton
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton
Re: Summary Report :: Dorkbot Service [MAY 2019-05] David Curry
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton
Re: Container Security Jason Borinski
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Valdis Klētnieks
Re: Student Identity Verification Davis, Ken
Wednesday, 05 June
SANS / REN-ISAC Partnership Program Herring, Todd William
Thursday, 06 June
EDUCAUSE Cybersecurity Program day at IBM X-Force Command Center Brian Kelly
GLBA: How are you handling it? Joey Rego
Re: GLBA: How are you handling it? Penn, Blake C
Re: GLBA: How are you handling it? Penn, Blake C
CISO reporting relationship survey from CIO listserv Brian Kelly
Re: GLBA: How are you handling it? AIS
Re: GLBA: How are you handling it? Jarret Cummings
Re: GLBA: How are you handling it? Mark Purcell
Re: GLBA: How are you handling it? Jarret Cummings
Friday, 07 June
Re: GLBA: How are you handling it? Jarret Cummings
2 factor authentication Brian Clark
Cybersecurity Insurance Lance Hourany
Re: Cybersecurity Insurance Pitt, Sharon
Re: Cybersecurity Insurance Colleen Keller
Re: (WARNING) Re: [SECURITY] Cybersecurity Insurance Richard Siedzik
Re: 2 factor authentication Jenny Blaine
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Telfer, Will
Re: 2 factor authentication Ben Marsden
Re: 2 factor authentication Windham, Gary D - (windhamg)
Re: 2 factor authentication Kevin Wilcox
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Kevin Wilcox
Re: Cybersecurity Insurance Hart, Michael
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Telfer, Will
Re: Cybersecurity Insurance Hagan, Sean
Re: 2 factor authentication Brian Epstein
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Brian Epstein
Re: 2 factor authentication Chad Tracy
Monday, 10 June
Re: 2 factor authentication Leah Lang
Account Creation, Usage & Inclusion Barton, Robert W.
Tuesday, 11 June
Re: 2 factor authentication King, Ronald A.
Re: 2 factor authentication Cavender, Terry L
Re: 2 factor authentication Gonzalez, Joshua
Re: [External] Re: [SECURITY] 2 factor authentication Gregg, Christopher S.
SANS SEC401 Training at UVA Grinnell, Michael (mg7aa)
Wednesday, 12 June
SANS Security Awareness Summit, August 7-8 in San Diego Valerie Vogel
Phish Hunter Casanova, Jodi
Re: Phish Hunter Harvard Townsend
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente
Managed services provider question Pete, Andrew
Re: 2 factor authentication Seth A. Shestack
Re: 2 factor authentication Odi Iancu
Re: Managed services provider question Tom Miller
Re: Managed services provider question Pete, Andrew
Initial Phishing Simulation - Do you tell them first? David Eilken
Thursday, 13 June
Re: Initial Phishing Simulation - Do you tell them first? Scott Stoops
Re: Initial Phishing Simulation - Do you tell them first? Dennis Bolton
Re: Initial Phishing Simulation - Do you tell them first? Sonder, Henk E.
Re: Initial Phishing Simulation - Do you tell them first? Ken Connelly
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell
Re: Initial Phishing Simulation - Do you tell them first? Hart, Michael
Re: Managed services provider question Tom Miller
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell
Re: Managed services provider question Pete, Andrew
Re: Managed services provider question Sonder, Henk E.
Re: Initial Phishing Simulation - Do you tell them first? Brian Basgen
Re: Initial Phishing Simulation - Do you tell them first? Eric Weakland
Re: Initial Phishing Simulation - Do you tell them first? Valerie Vogel
Re: Initial Phishing Simulation - Do you tell them first? Jason Fried
Re: [External] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Gregg, Christopher S.
Re: Initial Phishing Simulation - Do you tell them first? Brad Judy
Re: Initial Phishing Simulation - Do you tell them first? Dave Broucek
Re: [EXTERNAL] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Bridges, Robert A.
Re: Initial Phishing Simulation - Do you tell them first? Rob Milman
Re: Initial Phishing Simulation - Do you tell them first? Eric Sawyer
Re: (WARNING) Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Richard Siedzik
Re: Phish Hunter Chrisinger, Cory A
Friday, 14 June
Re: 2 factor authentication Alexandre Adao
Re: 2 factor authentication Bruce Carter
Re: 2 factor authentication Matt Boeckner
Re: 2 factor authentication Bruce Carter
Re: 2 factor authentication Dugan, Darin D [ITSYS]
Monday, 17 June
Re: SANS SEC401 Training at UVA Grinnell, Michael (mg7aa)
Re: Initial Phishing Simulation - Do you tell them first? David Eilken
[Registration Reminder] REN-ISAC Workshop @ Purdue University Ft. Wayne: 7/9/19 Sarah Bigham
Tuesday, 18 June
Re: Initial Phishing Simulation - Do you tell them first? Watkins, Jameson
Friday, 21 June
a few more 2 factor authentication questions Schnitzer, Lawrence
Re: a few more 2 factor authentication questions Haselhoff, Brent
Re: a few more 2 factor authentication questions Telfer, Will
Re: a few more 2 factor authentication questions Francisco Chavez
Re: Phish Hunter Menne, Michael S
Announcing our July 18 Coffee Shop on Preparing for NCSAM! Valerie Vogel
Monday, 24 June
Cyber Security Insurance Barton, Robert W.
Tuesday, 25 June
SecureLink Vendor Access Larry K. Emmons
Re: [EXTERNAL] [SECURITY] SecureLink Vendor Access Gene LeDuc
Wednesday, 26 June
Job Postings - Privacy Engineer, Privacy & Security Compliance Specialist David Curry
KY Cybersecurity Summit Corley, Robert B (KCTCS)
Re: Training and Compliance Portal Conlee, Keith
Re: Training and Compliance Portal Neal O'Farrell
Re: Training and Compliance Portal Eric Epps
IAM solution - cloud-based? Jared Evans
Re: IAM solution - cloud-based? Mahmud Rahman
Re: IAM solution - cloud-based? Ben Singh (OculusIT)
Thursday, 27 June
HECVAT and HECVAT lite Threshold Zeshan Siddiqui
Re: HECVAT and HECVAT lite Threshold Quackenbush, Darlene H - quackedh
Friday, 28 June
Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Escue, Charles E
Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Alex Lindstrom
BitLocker St-Jean, Daniel
Re: BitLocker Grilli, Brian Robert