SlideShare a Scribd company logo
1 of 28
The EDUCAUSE Security Professionals Experience Brian Moeller, CISSP The Ohio State University
Pre-Conference ,[object Object]
The Keynote ,[object Object],[object Object]
The Botherd is coming! ,[object Object],[object Object],[object Object]
Defining the Security Domain ,[object Object]
PKI at UW-Madison ,[object Object],[object Object],[object Object]
Detection and Investigation of Compromised Hosts on Campus ,[object Object]
Information Sharing the MOREnet Way ,[object Object]
 
Information sharing the MOREnet way: How not to keep secrets Randy Raw Beth Young MOREnet Security  1.800.509.6673 [email_address]
Objectives: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introductions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is MOREnet ,[object Object]
What does the Security office do? ,[object Object],[object Object],[object Object],[object Object]
The “Old Days” ,[object Object],[object Object],[object Object]
What have we done to change? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The “kinder and gentler” security - changing what we do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using our lists for proactive communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Monthly Web Seminars - communicate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Annual Security Symposium - education ,[object Object],[object Object],[object Object],[object Object]
Advanced Security Training - education ,[object Object],[object Object]
Conferences – education/communication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other methods of communications and sharing of information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fee-based Services ,[object Object],[object Object]
Expanding to the security community ,[object Object],[object Object],[object Object],[object Object]
On-going activities ,[object Object],[object Object],[object Object],[object Object]
Is there anything left to do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For more information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
Prediction of terrorist on the basis of semantic association building ontolog...
Prediction of terrorist on the basis of semantic association building ontolog...Prediction of terrorist on the basis of semantic association building ontolog...
Prediction of terrorist on the basis of semantic association building ontolog...Nawaraj Ghimire
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
An adaptive wideband delphi method to study state
An adaptive wideband delphi method to study stateAn adaptive wideband delphi method to study state
An adaptive wideband delphi method to study stateBhavana Raghupatruni
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neriaejay_neri
 

What's hot (20)

Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
Prediction of terrorist on the basis of semantic association building ontolog...
Prediction of terrorist on the basis of semantic association building ontolog...Prediction of terrorist on the basis of semantic association building ontolog...
Prediction of terrorist on the basis of semantic association building ontolog...
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
An adaptive wideband delphi method to study state
An adaptive wideband delphi method to study stateAn adaptive wideband delphi method to study state
An adaptive wideband delphi method to study state
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Jenevie
JenevieJenevie
Jenevie
 

Viewers also liked

Seguridad vial (chus) 4º la feria omar
Seguridad vial (chus) 4º la feria omarSeguridad vial (chus) 4º la feria omar
Seguridad vial (chus) 4º la feria omarcepalpciudadalta
 
Corazon y alteraciones en la anatomia cardiaca
Corazon y alteraciones en la anatomia cardiacaCorazon y alteraciones en la anatomia cardiaca
Corazon y alteraciones en la anatomia cardiacaGerardo Luna
 
Escuela preparatoria estatal n8
Escuela preparatoria estatal n8Escuela preparatoria estatal n8
Escuela preparatoria estatal n8Mint Marruecos
 
Ley para la distribución de participaciones y aportaciones Federales a los Mu...
Ley para la distribución de participaciones y aportaciones Federales a los Mu...Ley para la distribución de participaciones y aportaciones Federales a los Mu...
Ley para la distribución de participaciones y aportaciones Federales a los Mu...sabmpio
 
Guerin Associates 2011
Guerin Associates 2011Guerin Associates 2011
Guerin Associates 2011michaelguerin
 
22400325 952600789-infocat 14 2012
22400325 952600789-infocat 14 201222400325 952600789-infocat 14 2012
22400325 952600789-infocat 14 2012maricarmenrodriguez
 
September Newsletter 2012
September Newsletter 2012September Newsletter 2012
September Newsletter 2012Brad Elliott
 
Hiroshima 1945 2008
Hiroshima 1945   2008Hiroshima 1945   2008
Hiroshima 1945 2008Nuno Costa
 
Handout 12-keselamatan-dan-kesehatan-kerja
Handout 12-keselamatan-dan-kesehatan-kerjaHandout 12-keselamatan-dan-kesehatan-kerja
Handout 12-keselamatan-dan-kesehatan-kerjabeneathz
 
Story board daniel herbert
Story board  daniel herbertStory board  daniel herbert
Story board daniel herbertrhsmediastudies
 
Pigmentantes y saborizantes utilizados en nutrición animal
Pigmentantes y saborizantes utilizados en nutrición animalPigmentantes y saborizantes utilizados en nutrición animal
Pigmentantes y saborizantes utilizados en nutrición animaldiegoruiz007
 
Evualacion diagnostica de informatica
Evualacion diagnostica de informaticaEvualacion diagnostica de informatica
Evualacion diagnostica de informaticaMint Marruecos
 
Gaceta extraordinaria 6126 ley-ilicitos-cambiarios
Gaceta extraordinaria 6126 ley-ilicitos-cambiariosGaceta extraordinaria 6126 ley-ilicitos-cambiarios
Gaceta extraordinaria 6126 ley-ilicitos-cambiariosAura Palermo
 
Taller inventario 5 puntos 21010100203
Taller inventario 5 puntos   21010100203Taller inventario 5 puntos   21010100203
Taller inventario 5 puntos 21010100203alejandrozabalita92
 
O cenário negocial e a metodologia dos 7 a´s ®
O cenário negocial e a metodologia dos 7 a´s ®O cenário negocial e a metodologia dos 7 a´s ®
O cenário negocial e a metodologia dos 7 a´s ®Ernesto Costa Santos
 

Viewers also liked (20)

Seguridad vial (chus) 4º la feria omar
Seguridad vial (chus) 4º la feria omarSeguridad vial (chus) 4º la feria omar
Seguridad vial (chus) 4º la feria omar
 
biodiversity
biodiversitybiodiversity
biodiversity
 
Corazon y alteraciones en la anatomia cardiaca
Corazon y alteraciones en la anatomia cardiacaCorazon y alteraciones en la anatomia cardiaca
Corazon y alteraciones en la anatomia cardiaca
 
México extrategias economicas y politicas
México extrategias economicas y politicasMéxico extrategias economicas y politicas
México extrategias economicas y politicas
 
Escuela preparatoria estatal n8
Escuela preparatoria estatal n8Escuela preparatoria estatal n8
Escuela preparatoria estatal n8
 
Ley para la distribución de participaciones y aportaciones Federales a los Mu...
Ley para la distribución de participaciones y aportaciones Federales a los Mu...Ley para la distribución de participaciones y aportaciones Federales a los Mu...
Ley para la distribución de participaciones y aportaciones Federales a los Mu...
 
Guerin Associates 2011
Guerin Associates 2011Guerin Associates 2011
Guerin Associates 2011
 
22400325 952600789-infocat 14 2012
22400325 952600789-infocat 14 201222400325 952600789-infocat 14 2012
22400325 952600789-infocat 14 2012
 
Www ada #11
Www ada #11Www ada #11
Www ada #11
 
September Newsletter 2012
September Newsletter 2012September Newsletter 2012
September Newsletter 2012
 
Hiroshima 1945 2008
Hiroshima 1945   2008Hiroshima 1945   2008
Hiroshima 1945 2008
 
Handout 12-keselamatan-dan-kesehatan-kerja
Handout 12-keselamatan-dan-kesehatan-kerjaHandout 12-keselamatan-dan-kesehatan-kerja
Handout 12-keselamatan-dan-kesehatan-kerja
 
Story board daniel herbert
Story board  daniel herbertStory board  daniel herbert
Story board daniel herbert
 
INFORMATICA
INFORMATICAINFORMATICA
INFORMATICA
 
Pigmentantes y saborizantes utilizados en nutrición animal
Pigmentantes y saborizantes utilizados en nutrición animalPigmentantes y saborizantes utilizados en nutrición animal
Pigmentantes y saborizantes utilizados en nutrición animal
 
Exposició de treballs recerca (curs 2011-2012)
Exposició de treballs recerca (curs 2011-2012)Exposició de treballs recerca (curs 2011-2012)
Exposició de treballs recerca (curs 2011-2012)
 
Evualacion diagnostica de informatica
Evualacion diagnostica de informaticaEvualacion diagnostica de informatica
Evualacion diagnostica de informatica
 
Gaceta extraordinaria 6126 ley-ilicitos-cambiarios
Gaceta extraordinaria 6126 ley-ilicitos-cambiariosGaceta extraordinaria 6126 ley-ilicitos-cambiarios
Gaceta extraordinaria 6126 ley-ilicitos-cambiarios
 
Taller inventario 5 puntos 21010100203
Taller inventario 5 puntos   21010100203Taller inventario 5 puntos   21010100203
Taller inventario 5 puntos 21010100203
 
O cenário negocial e a metodologia dos 7 a´s ®
O cenário negocial e a metodologia dos 7 a´s ®O cenário negocial e a metodologia dos 7 a´s ®
O cenário negocial e a metodologia dos 7 a´s ®
 

Similar to The EDUCAUSE Security Professionals Experience [ppt]

2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
www.more.net | University of Missouri
www.more.net | University of Missouriwww.more.net | University of Missouri
www.more.net | University of Missouriwebhostingguy
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03kbzdox ivanovich
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015eFax Corporate®
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 

Similar to The EDUCAUSE Security Professionals Experience [ppt] (20)

Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
www.more.net | University of Missouri
www.more.net | University of Missouriwww.more.net | University of Missouri
www.more.net | University of Missouri
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Network Security
Network SecurityNetwork Security
Network Security
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 

More from Videoguy

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresVideoguy
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingVideoguy
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streamingVideoguy
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideoguy
 
Video Streaming
Video StreamingVideo Streaming
Video StreamingVideoguy
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader AudienceVideoguy
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Videoguy
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGVideoguy
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingVideoguy
 
Application Brief
Application BriefApplication Brief
Application BriefVideoguy
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Videoguy
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second LifeVideoguy
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming SoftwareVideoguy
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoguy
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video FormatenVideoguy
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareVideoguy
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxVideoguy
 

More from Videoguy (20)

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_Pres
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video Streaming
 
Adobe
AdobeAdobe
Adobe
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streaming
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A Survey
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader Audience
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video Streaming
 
Application Brief
Application BriefApplication Brief
Application Brief
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second Life
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming Software
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions Cookbook
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video Formaten
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming Software
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - Firefox
 

The EDUCAUSE Security Professionals Experience [ppt]

  • 1. The EDUCAUSE Security Professionals Experience Brian Moeller, CISSP The Ohio State University
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.  
  • 10. Information sharing the MOREnet way: How not to keep secrets Randy Raw Beth Young MOREnet Security 1.800.509.6673 [email_address]
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Editor's Notes

  1. I decided to do this just for fun. I was quite surprised. 6 groups, capture the flag Although the exploits that were used were ‘classics’, they still can be found…
  2. Dan Larkin - former private investigator Got his start modifying video cameras, installing into clocks and light fixtures. Began his career with FBI, started IC3 Cybercrime is 3rd highest priority, only after Counterterrorism and Counterintelligence -- HIGHER than Organized Crime (6), White Collar Crime (7) and Major Theft and Violent Crime! IC3 has 6 agents, 33 analysts, and has arrested more than 6,000 cybercriminals in the past 3 years, and currently have a caseload of ~2,800 cases.
  3. Primarily from the helpdesk perspective, not a lot of technical information… It was, however, in the “baseline technologies” track…
  4. Classification schemes gone wrong. Attempt to define the authoratitive purvue gone wrong.
  5. Really hesitant to go to this one
  6. Daniel Adinolfi Lots of free tools Not doing it perfectly But doing a pretty good job
  7. MOREnet = Missouri OARnet Provides I2, k-12 connectivity HE connectivity, government, health care provider, Vid-conf, training, technical support Capabilities to assist w/incident response, Law enforcement Liasion, and has a responsibility for security knowledge transfer
  8. Established in 1991 unit within the University of Missouri We are the registered Whois owner of all of the IP address space and get all of the abuse@ e-mail for all of this IP space MOREnet is not a private Internet service provider and does not provide services, including dial-up access, on an individual basis.
  9. Hello, this is MOREnet security. Oh NO, not you guys! No one wanted to see us coming, even other MOREnet employees. We were the “NO” guys. More tickets were better…..but not really
  10. Created and communicated Security roadmap to member groups
  11. GNN – has decreased the nuisance ticket counts. This accounted for >50% of our daily tickets prior to implementation. Voluntary sign-up and we have 225 of approximately 750 organizations
  12. Advanced security training has been requested by MOREnet members for a long time, especially Higher Ed
  13. Passwords for chocolate
  14. All MOREnet security staff are secure Infragard members Randy is on the Infragard board of directors