Myths in Information Security

Tuesday, May 02 | 3:15PM–4:15PM | Denver Ballroom 1-3, Lower Level 2
Session Type: Breakout Session
Delivery Format: Industry and Campus Solutions
What is still relevant? Things change over time. The higher education network looks different: between the cloud, BYOD, wireless, and an ever-changing landscape of new attacks and attackers, some of those common truths about protecting your organization's assets no longer apply. We'll take a look at a list of common myths surrounding authentication, the perimeter, antivirus, patching, and network architecture and break them down into a very interactive and entertaining format to help gain perspective on this new environment and how it applies to higher education.

Learn how usable security is the most effective security in practice * Learn how to reduce the burden on faculty, staff, and students by removing older and unneeded barriers * Explore how to provide the open-ended networks higher education users want and still be safe


  • Mark Loveless

    Senior Security Researcher, Cisco Secure
  • Tina Thorstenson

    Retired Deputy CIO & CISO, Arizona State University

Resources & Downloads

  • Myths in Information Security_slides

    1 MB, pdf - Updated on 5/9/2017