Cybersecurity is a top of mind issue for all CIOs, and higher education is no exception. As in other sectors, cyber-attacks in higher education are directly and indirectly related to…
Beyond Security: Overcoming Additional Risks Associated with Institutional Data Analytics
James Wiley | Eduventures Principal Analyst, National Research Center for College & University AdmissionsThe advantages of leveraging Big Data in the higher education context are becoming increasingly clear to college and university leaders. From helping to drive student persistence and success to informing…
As you go about your normal life, everything that you do online leaves “digital breadcrumbs” that can be collected and analyzed. The common buzzwords for this process are Big Data,…
Big Data and Big Risks: Protecting Higher Education from Cyberattack
Teju Herath | Associate Professor of Information Systems in the Goodman School of Business, Brock UniversityColleges and universities today are collecting and storing huge amounts of data. Leading institutions are also analyzing and leveraging data for all kinds of different purposes, and the number of…
Protecting Student Data: A Cybersecurity Challenge
Jane LeClair | Chief Operating Officer, Washington Center for Cybersecurity Research & DevelopmentCloud Shift Requires Vendor Leadership and New Procurement Processes
Tracy Mitrano | Director of Internet Culture Policy and Law, Cornell UniversityNavigating Risk Management Challenges in Today’s Highly Complex Environment
Tim Wiseman | Assistant Vice Chancellor for Enterprise Risk Management, East Carolina UniversityCreating a Cohesive Student Experience While Keeping Security in Check
Quinn Shamblin | Executive Director of Information Services, Boston UniversityBuilding Your Team: The Ins and Outs of Higher Ed IT Security
Joel Rosenblatt | Director of Computer and Network Security, Columbia UniversityCyber-Risk: Balancing Access, Security and Privacy (Part 2)
Ken Udas | Higher Education Itinerant & Adjunct Professor, University of Southern QueenslandCyber-Risk: Privacy, Access and Student-Customer Expectations (Part 1)
Ken Udas | Higher Education Itinerant & Adjunct Professor, University of Southern Queensland Scott SorleyBringing Cybersecurity to the Forefront
Jeremy Epstein | Senior Computer Scientist, SRI InternationalPrevention Better Than Cure: Security Breaches Cost Higher Ed
Novadean Watson-Stone | Program Director for Information Technology, American Public University SystemThe following email Q&A is with Clay Wilson, cybersecurity program director at the American Public University System. Student information security has risen to become one of the leading areas of…
Cybersecurity: Assessment and Authorization
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeFederal agencies are required by law to undergo a detailed and systematic security assessment process to demonstrate compliance with security standards. This process is known as the assessment and authorization—or…
The following interview is with Gary Langsdale, university risk officer at Penn State University. IT security is becoming a hot topic for higher education leaders across the country, especially as…
Cybersecurity: Audit and Accountability
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeDetermined hackers will always develop new ways to circumvent security measures, which means institutions need to audit their security measures regularly to test their effectiveness. Auditing will also ensure that…