Protecting Student Data: A Cybersecurity Challenge
Strong policies, a commitment to ongoing training of all key stakeholders and up-to-date technology...
Jane LeClair | Chief Operating Officer, Washington Center for Cybersecurity Research & Development
Strong policies, a commitment to ongoing training of all key stakeholders and up-to-date technology...
Tracy Mitrano | Director of Internet Culture Policy and Law, Cornell University
College and university leaders need to ensure they are well aware of state compliance and security...
Quinn Shamblin | Executive Director of Information Services, Boston University
Institutions want to create the easy-to-use, technology-enhanced higher education environment...
Joel Rosenblatt | Director of Computer and Network Security, Columbia University
If an institution is truly committed to system security, leaders must focus on hiring teams that...
Ken Udas | Vice Provost of Digital Learning Initiatives, University of Idaho
— Co-written with Scott Sorley | Executive Director of Information and Communication Technology...
Ken Udas | Vice Provost of Digital Learning Initiatives, University of Idaho
As students demand more self-service options from the university, institutions have to do more to...
Jeremy Epstein | Senior Computer Scientist, SRI International
Postsecondary cyber security in the modern era requires specialist attention; it cannot be a side...
Higher education leaders need to prioritize information security to ensure they can provide...
Clay Wilson | Program Director for Cybersecurity Studies, American Public University System
It’s critical that universities operate with the same attention to cybersecurity as other banking...
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University College
Assessment and authorization of an institution’s security infrastructure is critical to minimizing...
Gary Langsdale | University Risk Officer, Pennsylvania State University
Increasing numbers of administrative processes are taking place online, and postsecondary IT...
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University College
It’s critical to continuously track system and performance metrics, and to record and analyze this...