Myths in Information Security

Tuesday, May 02, 2017 | 3:15PM–4:15PM | Denver Ballroom 1-3, Lower Level 2
Session Type: Breakout Session
Delivery Format: Industry and Campus Solutions
What is still relevant? Things change over time. The higher education network looks different: between the cloud, BYOD, wireless, and an ever-changing landscape of new attacks and attackers, some of those common truths about protecting your organization's assets no longer apply. We'll take a look at a list of common myths surrounding authentication, the perimeter, antivirus, patching, and network architecture and break them down into a very interactive and entertaining format to help gain perspective on this new environment and how it applies to higher education.

Outcomes:
Learn how usable security is the most effective security in practice * Learn how to reduce the burden on faculty, staff, and students by removing older and unneeded barriers * Explore how to provide the open-ended networks higher education users want and still be safe

Presenters

  • Mark Loveless

  • Tina Thorstenson

    Retired Deputy CIO & CISO, Arizona State University

Resources & Downloads

  • Myths in Information Security_slides

    1 MB, pdf - Updated on 9/7/2024