Myths in Information Security
Tuesday, May 02, 2017 | 3:15PM–4:15PM | Denver Ballroom 1-3, Lower Level 2
Session Type:
Breakout Session
Delivery Format:
Industry and Campus Solutions
What is still relevant? Things change over time. The higher education network looks different: between the cloud, BYOD, wireless, and an ever-changing landscape of new attacks and attackers, some of those common truths about protecting your organization's assets no longer apply. We'll take a look at a list of common myths surrounding authentication, the perimeter, antivirus, patching, and network architecture and break them down into a very interactive and entertaining format to help gain perspective on this new environment and how it applies to higher education.
Outcomes:
Learn how usable security is the most effective security in practice * Learn how to reduce the burden on faculty, staff, and students by removing older and unneeded barriers * Explore how to provide the open-ended networks higher education users want and still be safe
Outcomes:
Learn how usable security is the most effective security in practice * Learn how to reduce the burden on faculty, staff, and students by removing older and unneeded barriers * Explore how to provide the open-ended networks higher education users want and still be safe