Educause Security Discussion: by date

366 messages starting Apr 01 19 and ending Jun 28 19
Date index | Thread index | Author index


Monday, 01 April

Re: Malware detection Tom Miller
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley
Summary Report :: Dorkbot Service [MAR 2019-03] Cam Beasley
Re: KnowBe4 Security & Awareness Training Feedback Madl, Michael

Tuesday, 02 April

Interesting Research King, Ronald A.
Re: Interesting Research Brad Judy
Re: Interesting Research Jones, Mark B
Re: Interesting Research Hiram Wong
Re: Interesting Research Gael Frouin
Re: Interesting Research Albrecht, Travis
Re: Interesting Research Laverty, Patrick
Re: Interesting Research Barton, Robert W.
Re: Interesting Research Greg Williams
Re: Interesting Research Ashlar Trystan
Re: Interesting Research John McCabe
Re: Interesting Research Clark Gaylord
Re: SECURITY Digest - 1 Apr 2019 to 2 Apr 2019 - Special issue (#2019-56) Kristi Olson
Re: Interesting Research Bridges, Robert A.
Re: Interesting Research Bridges, Robert A.
Re: Interesting Research Tanner, Andrea
Re: Interesting Research Von Welch (Work)

Wednesday, 03 April

Re: Interesting Research John Chapman
Re: Interesting Reseach Glenn Forbes Fleming Larratt
MSUDenver seeing potential bot-net DDOS Hart, Michael
Re: MSUDenver seeing potential bot-net DDOS Frank Barton
Re: MSUDenver seeing potential bot-net DDOS Frank Barton
Re: MSUDenver seeing potential bot-net DDOS Hart, Michael
Safeguards Rule additional requirements proposal tomorrow Jarret Cummings
Re: MSUDenver seeing potential bot-net DDOS Joseph Tam

Thursday, 04 April

Not using Kaspersky? David Eilken
Re: KnowBe4 Security & Awareness Training Feedback Bumpas, Shana
Cybersecurity Students Pete, Andrew
Re: Cybersecurity Students Greg Williams
TargetX vulnerability post Brian Kelly
Re: Cybersecurity Students Zachary Yamada
Re: Cybersecurity Students Frank Barton

Friday, 05 April

Re: Cybersecurity Students Burns, Denis
Re: Cybersecurity Students Nicholas Garigliano
Re: Cybersecurity Students Pete, Andrew
Re: Cybersecurity Students Brian Basgen
Re: Cybersecurity Students Rob Milman
Re: Cybersecurity Students Giacobe, Nick
Re: Cybersecurity Students Giacobe, Nick
Re: Cybersecurity Students Michael Duff
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Baillio, Aaron
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Michael Duff
Re: Cybersecurity Students Bob Mahoney
Data Protection Officer (DPO) Dave Broucek
Re: [EXTERNAL]Re: [SECURITY] Cybersecurity Students Jessica Murray
Update : TargetX vulnerability post Brian Kelly

Monday, 08 April

Re: TargetX vulnerability post Neal O'Farrell
G Suite marketplace policies and guidelines Kristen Dietiker
Re: TargetX vulnerability post Neal O'Farrell

Tuesday, 09 April

Re: Interesting Research King, Ronald A.
Gmail Options for SPAM and Phishing James Farr
Re: Interesting Research Mark Poepping

Wednesday, 10 April

Distributing initial credential Colin Abbott
Re: Distributing initial credential Scott Stoops

Saturday, 13 April

ClearPass 802.1x and password change/expiry Wessam Maher

Sunday, 14 April

DUO vs Azure/O365 MFA Wessam Maher

Monday, 15 April

EDUCAUSE - Leadership Institute Program Cheryl Washington
Re: EDUCAUSE - Leadership Institute Program Mardecia Bell
Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Jackson, Ms. D'Ann
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Neal O'Farrell
Re: Cyber / Networking Faculty Position - Pikes Peak Community College Johnson Akse, Terri
Social Media Loan Forgiveness Scam Austin Bollinger
Loan Forgiveness Scam Austin Bollinger
Re: DUO vs Azure/O365 MFA Steve Niedzwiecki

Tuesday, 16 April

Re: DUO vs Azure/O365 MFA Telfer, Will
Presenting Enterprise Risk Register to the board? Brian Kelly
Re: Presenting Enterprise Risk Register to the board? Schwartz, John
Re: Presenting Enterprise Risk Register to the board? Dan Jones

Wednesday, 17 April

FMAudit Barton, Robert W.
Re: FMAudit Dale Lee
Re: FMAudit Barton, Robert W.

Thursday, 18 April

Re: FMAudit Frank Barton
Job Posting - University of Illinois - Cybersecurity Specialist Barnes, Joe
Data Center Forward Proxies/Web Security Gateways Rich Lang

Friday, 19 April

NSU is Hiring Senior Network Engineer and a Project Engineer King, Ronald A.

Tuesday, 23 April

PCI keeping it simple Yost, Davis
Re: PCI keeping it simple Haselhoff, Brent
Re: [External] [SECURITY] PCI keeping it simple Bukaweski, Dylan S
Re: PCI keeping it simple Paul Chauvet
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler
Re: [External] [SECURITY] PCI keeping it simple Ludwig, Linda
Re: [External] [SECURITY] PCI keeping it simple Thierry Lechler

Wednesday, 24 April

Server asset inventory tool Mandi Witkovsky
Re: Gmail Options for SPAM and Phishing James Farr
Grand Rapids, MI job opportunity closing 5/2 - Enterprise Analyst, security emphasis Michael Passer

Thursday, 25 April

Re: Server asset inventory tool Tomassetti, Tina
Re: Server asset inventory tool Cleary, Kevin

Friday, 26 April

Re: Server asset inventory tool Samih Ajrouch
Re: Server asset inventory tool Angel Howard
Re: SECURITY Digest - 24 Apr 2019 to 25 Apr 2019 (#2019-74) Wade Lambert
Web vulnerability scanning of hosted environments and SAAS Jared Evans
Re: Web vulnerability scanning of hosted environments and SAAS Brad Judy
Re: Server asset inventory tool Kevin Wilcox
Re: Server asset inventory tool David Escalante

Monday, 29 April

Re: Server asset inventory tool Paul Chauvet
Re: Server asset inventory tool Clark Gaylord
CALL FOR PROPOSALS: UW-Madison Cybersecurity Lockdown Conference Stefan Wahe
Fwd: Call for Participation Open - Internet2 TechEX 2019 José A . Domínguez

Tuesday, 30 April

Due Diligence, vendor assessments, etc. Frank Barton
Question for those using a FIM for PCI compliance Cathy Hubbs
BCP & DR policy Robert Smith
Re: BCP & DR policy Francisco Chavez
Re: BCP & DR policy JT Moser
Re: DUO vs Azure/O365 MFA Sharkirah Foote

Wednesday, 01 May

Data centers DR Samih Ajrouch
Summary Report :: Dorkbot Service [APR 2019-04] Cam Beasley
Locking Computer Policy Ronald Loneker

Thursday, 02 May

Re: Locking Computer Policy Mandi Witkovsky
Re: Locking Computer Policy Andregg, Bryan Courtney
Re: Locking Computer Policy Tom Miller
Re: Locking Computer Policy Julian Y Koh
Re: [External] [SECURITY] Locking Computer Policy Gregg, Christopher S.
Re: Locking Computer Policy Burns, Denis
Re: Locking Computer Policy Dave Broucek
Personal Email and other Services Petrus Williams
Re: Personal Email and other Services Jeff Choo

Monday, 06 May

Re: Locking Computer Policy Ronald Loneker
Re: Locking Computer Policy Ronald Loneker
Re: Locking Computer Policy King, Ronald A.
Re: Personal Email and other Services King, Ronald A.
Security incident with Nebraska Books/PrismRBS Matthew D Kelly
Re: Personal Email and other Services Valdis Klētnieks

Tuesday, 07 May

Transport rule to put a header on external email Mandi Witkovsky
Re: Transport rule to put a header on external email Madl, Michael
Re: Personal Email and other Services King, Ronald A.
Re: Transport rule to put a header on external email Frank Barton
Re: Transport rule to put a header on external email Coller, Jon
Re: Transport rule to put a header on external email Thomas Carter
CyberStart Program for College Students Valerie Vogel
VPN Concentrator replacement Akey, Michael
Re: VPN Concentrator replacement Telfer, Will
Re: VPN Concentrator replacement Francisco Chavez
Re: VPN Concentrator replacement Brian Epstein

Wednesday, 08 May

Re: VPN Concentrator replacement Bandy, John
Re: VPN Concentrator replacement Mike Wiseman
Re: VPN Concentrator replacement Pardonek, Jim
Re: VPN Concentrator replacement Dugan, Darin D [ITSYS]
Re: VPN Concentrator replacement King, Ronald A.
Which IAM solution do you recommend? Jared Evans
Re: Which IAM solution do you recommend? Michael William Zimmer
Re: Which IAM solution do you recommend? Thomas Dugas
Re: Which IAM solution do you recommend? Mahmud Rahman
Re: Which IAM solution do you recommend? Miguel Angel Gonzalez de la Torre
Re: Which IAM solution do you recommend? AIS
Please Remove from The List Steven Helwig

Thursday, 09 May

Re: Which IAM solution do you recommend? Leah Lang
Wireless Network Rogue Access Points Perrotti, Gregory
Re: Wireless Network Rogue Access Points Brian Epstein
Re: Transport rule to put a header on external email Erik D Evans
Re: [External] Re: [SECURITY] Transport rule to put a header on external email Gregg, Christopher S.
Job Posting - Cybersecurity Risk Administrative Associate Barnes, Joe
Re: Which IAM solution do you recommend? David Eilken
Re: Which IAM solution do you recommend? Francisco Chavez

Friday, 10 May

Student employees and access to data Pete, Andrew
Re: Student employees and access to data Pesino, Sherry
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data James Valente
Re: [EXTERNAL] Re: [SECURITY] Student employees and access to data Mike Beane
Re: Which IAM solution do you recommend? Brad Judy
Re: Student employees and access to data King, Ronald A.
SPC possible Sun and Mon night outings Brad Judy
Re: Which IAM solution do you recommend? AIS
Re: SPC possible Sun and Mon night outings David Escalante
Re: [External] Re: [SECURITY] Student employees and access to data Gregg, Christopher S.
Re: Student employees and access to data Linc Nesheim
Re: SPC possible Sun and Mon night outings Scott Stoops
Re: Which IAM solution do you recommend? Bill Thompson

Saturday, 11 May

Unofficial SPC event: Joshua Beeman Memorial Fun Run Jesse Bowling

Sunday, 12 May

Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath

Monday, 13 May

Incident response and monitoring lead opening Brad Judy
fyi: free community-based vendor assessment tool [ISORA-Lite] Cam Beasley

Tuesday, 14 May

Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Belford, Jason C. (jcb3zr)
Re: Unofficial SPC event: Joshua Beeman Memorial Fun Run Max McGrath

Monday, 20 May

Senior Cyberinfrastructure Security Architect Paul Howell
Re: Which IAM solution do you recommend? Brautigam, Keith Adam
Done in 60 seconds - who doesn't love a short survey Chad Tracy
Policy Exception vs Risk Acceptance Jessica P Drefs
Benign samples for testing AV vendors Bridges, Robert A.
Digital Risk Protection Inquiry Jackson, Ms. D'Ann
Re: Benign samples for testing AV vendors Frank Barton
Re: Benign samples for testing AV vendors Kevin Wilcox
Re: Benign samples for testing AV vendors John McCabe

Tuesday, 21 May

Job Posting: Director of Information Security for Willams College, Williamstown, MA Emily Harris

Wednesday, 22 May

Re: [EXTERNAL] Re: [SECURITY] Benign samples for testing AV vendors Bridges, Robert A.
Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Gregg, Christopher S.

Thursday, 23 May

Re: [External] [SECURITY] Done in 60 seconds - who doesn't love a short survey Chad Tracy
Proof point vs Mimecast Snook, Allen
Re: Proof point vs Mimecast Taylor Randle
Re: Proof point vs Mimecast O'Callaghan, Daniel
Re: Proof point vs Mimecast Max McGrath
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast Baillio, Aaron
OpenVAS Barton, Robert W.
Re: [EXTERNAL]Re: [SECURITY] Proof point vs Mimecast King, Ronald A.
Re: OpenVAS King, Ronald A.
Re: OpenVAS Alex Keller
Re: Proof point vs Mimecast Jason Edelstein

Friday, 24 May

Re: Proof point vs Mimecast Snook, Allen
Re: Proof point vs Mimecast Frank Barton
Training and Compliance Portal Pardonek, Jim
SecureLink vs VPN for privileged vendor access Colin Abbott
Re: Proof point vs Mimecast Alexandre Adao
Re: [EXTERNAL] [SECURITY] SecureLink vs VPN for privileged vendor access Gene LeDuc

Tuesday, 28 May

Re: Training and Compliance Portal Eric Epps
Scott Bell Lazar, Edgar (NBCC)
Prex FR Lazar, Edgar (NBCC)
Prex FR Stefan Wahe

Wednesday, 29 May

Re: Prex FR Gavin Wiltshire
Re: Prex FR Barton, Robert W.
Canceled: Scott Bell Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Canceled: Prex FR Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Scott Bell @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Cancelled: Prex FR @ Wednesday, 29 May 2019 Lazar, Edgar (NBCC)
Re: Prex FR Harry Hoffman
Job Posting - DevOPs Network Engineer Paul Howell
Banner 9 - Limiting Access to student records Jason Fried
Microsoft MFA Opt-In Pardonek, Jim
Re: Microsoft MFA Opt-In Kurtz, Eric
Re: Microsoft MFA Opt-In Dugan, Darin D [ITSYS]
eDiscovery Solutions Bryce Porter
Re: eDiscovery Solutions Brad Judy
Job Posting - Director of Information Technology Matt Hall
Re: eDiscovery Solutions Bryce Porter

Thursday, 30 May

Unknown traffic to known bad actor Chris Wilson
Job Posting - Assistant Vice President and CISO at Miami University (Ohio) Seidl, David
Re: Unknown traffic to known bad actor Alex Keller
Re: eDiscovery Solutions Brad Judy

Friday, 31 May

Re: unknown traffic to bad actor Diane Camper
Re: unknown traffic to bad actor Diane Camper
Re: [External] SECURITY Digest - 30 May 2019 to 31 May 2019 (#2019-97) Diane Camper

Monday, 03 June

UC Davis Info Sec Job Opportunities Dewight Fredrick Kramer
Container Security Jason Borinski
Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Lovaas,Steven

Tuesday, 04 June

Re: Container Security Cleary, Kevin
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson
Student Identity Verification George J. Silowash
Disk encryption John McCabe
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Hall, Rand
Re: Disk encryption Frank Barton
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Cam Beasley
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Chris Wilson
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton
Re: Summary Report :: Dorkbot Service [MAY 2019-05] David Curry
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Frank Barton
Re: Container Security Jason Borinski
Re: Summary Report :: Dorkbot Service [MAY 2019-05] Valdis Klētnieks
Re: Student Identity Verification Davis, Ken

Wednesday, 05 June

SANS / REN-ISAC Partnership Program Herring, Todd William

Thursday, 06 June

EDUCAUSE Cybersecurity Program day at IBM X-Force Command Center Brian Kelly
GLBA: How are you handling it? Joey Rego
Re: GLBA: How are you handling it? Penn, Blake C
Re: GLBA: How are you handling it? Penn, Blake C
CISO reporting relationship survey from CIO listserv Brian Kelly
Re: GLBA: How are you handling it? AIS
Re: GLBA: How are you handling it? Jarret Cummings
Re: GLBA: How are you handling it? Mark Purcell
Re: GLBA: How are you handling it? Jarret Cummings

Friday, 07 June

Re: GLBA: How are you handling it? Jarret Cummings
2 factor authentication Brian Clark
Cybersecurity Insurance Lance Hourany
Re: Cybersecurity Insurance Pitt, Sharon
Re: Cybersecurity Insurance Colleen Keller
Re: (WARNING) Re: [SECURITY] Cybersecurity Insurance Richard Siedzik
Re: 2 factor authentication Jenny Blaine
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Telfer, Will
Re: 2 factor authentication Ben Marsden
Re: 2 factor authentication Windham, Gary D - (windhamg)
Re: 2 factor authentication Kevin Wilcox
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Kevin Wilcox
Re: Cybersecurity Insurance Hart, Michael
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Telfer, Will
Re: Cybersecurity Insurance Hagan, Sean
Re: 2 factor authentication Brian Epstein
Re: 2 factor authentication Brian Clark
Re: 2 factor authentication Brian Epstein
Re: 2 factor authentication Chad Tracy

Monday, 10 June

Re: 2 factor authentication Leah Lang
Account Creation, Usage & Inclusion Barton, Robert W.

Tuesday, 11 June

Re: 2 factor authentication King, Ronald A.
Re: 2 factor authentication Cavender, Terry L
Re: 2 factor authentication Gonzalez, Joshua
Re: [External] Re: [SECURITY] 2 factor authentication Gregg, Christopher S.
SANS SEC401 Training at UVA Grinnell, Michael (mg7aa)

Wednesday, 12 June

SANS Security Awareness Summit, August 7-8 in San Diego Valerie Vogel
Phish Hunter Casanova, Jodi
Re: Phish Hunter Harvard Townsend
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente
Re: [EXTERNAL] [SECURITY] Phish Hunter James Valente
Managed services provider question Pete, Andrew
Re: 2 factor authentication Seth A. Shestack
Re: 2 factor authentication Odi Iancu
Re: Managed services provider question Tom Miller
Re: Managed services provider question Pete, Andrew
Initial Phishing Simulation - Do you tell them first? David Eilken

Thursday, 13 June

Re: Initial Phishing Simulation - Do you tell them first? Scott Stoops
Re: Initial Phishing Simulation - Do you tell them first? Dennis Bolton
Re: Initial Phishing Simulation - Do you tell them first? Sonder, Henk E.
Re: Initial Phishing Simulation - Do you tell them first? Ken Connelly
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell
Re: Initial Phishing Simulation - Do you tell them first? Hart, Michael
Re: Managed services provider question Tom Miller
Re: Initial Phishing Simulation - Do you tell them first? Neal O'Farrell
Re: Managed services provider question Pete, Andrew
Re: Managed services provider question Sonder, Henk E.
Re: Initial Phishing Simulation - Do you tell them first? Brian Basgen
Re: Initial Phishing Simulation - Do you tell them first? Eric Weakland
Re: Initial Phishing Simulation - Do you tell them first? Valerie Vogel
Re: Initial Phishing Simulation - Do you tell them first? Jason Fried
Re: [External] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Gregg, Christopher S.
Re: Initial Phishing Simulation - Do you tell them first? Brad Judy
Re: Initial Phishing Simulation - Do you tell them first? Dave Broucek
Re: [EXTERNAL] Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Bridges, Robert A.
Re: Initial Phishing Simulation - Do you tell them first? Rob Milman
Re: Initial Phishing Simulation - Do you tell them first? Eric Sawyer
Re: (WARNING) Re: [SECURITY] Initial Phishing Simulation - Do you tell them first? Richard Siedzik
Re: Phish Hunter Chrisinger, Cory A

Friday, 14 June

Re: 2 factor authentication Alexandre Adao
Re: 2 factor authentication Bruce Carter
Re: 2 factor authentication Matt Boeckner
Re: 2 factor authentication Bruce Carter
Re: 2 factor authentication Dugan, Darin D [ITSYS]

Monday, 17 June

Re: SANS SEC401 Training at UVA Grinnell, Michael (mg7aa)
Re: Initial Phishing Simulation - Do you tell them first? David Eilken
[Registration Reminder] REN-ISAC Workshop @ Purdue University Ft. Wayne: 7/9/19 Sarah Bigham

Tuesday, 18 June

Re: Initial Phishing Simulation - Do you tell them first? Watkins, Jameson

Friday, 21 June

a few more 2 factor authentication questions Schnitzer, Lawrence
Re: a few more 2 factor authentication questions Haselhoff, Brent
Re: a few more 2 factor authentication questions Telfer, Will
Re: a few more 2 factor authentication questions Francisco Chavez
Re: Phish Hunter Menne, Michael S
Announcing our July 18 Coffee Shop on Preparing for NCSAM! Valerie Vogel

Monday, 24 June

Cyber Security Insurance Barton, Robert W.

Tuesday, 25 June

SecureLink Vendor Access Larry K. Emmons
Re: [EXTERNAL] [SECURITY] SecureLink Vendor Access Gene LeDuc

Wednesday, 26 June

Job Postings - Privacy Engineer, Privacy & Security Compliance Specialist David Curry
KY Cybersecurity Summit Corley, Robert B (KCTCS)
Re: Training and Compliance Portal Conlee, Keith
Re: Training and Compliance Portal Neal O'Farrell
Re: Training and Compliance Portal Eric Epps
IAM solution - cloud-based? Jared Evans
Re: IAM solution - cloud-based? Mahmud Rahman
Re: IAM solution - cloud-based? Ben Singh (OculusIT)

Thursday, 27 June

HECVAT and HECVAT lite Threshold Zeshan Siddiqui
Re: HECVAT and HECVAT lite Threshold Quackenbush, Darlene H - quackedh

Friday, 28 June

Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Escue, Charles E
Re: [External] Re: [SECURITY] HECVAT and HECVAT lite Threshold Alex Lindstrom
BitLocker St-Jean, Daniel
Re: BitLocker Grilli, Brian Robert