Logo

In The Cloud: Cloud Security Hygiene in Higher Education - Shared screen with speaker view
EDUCAUSE Tech Support, Jody Tracy
38:08
Feel free to introduce yourself or chat with attendees. Tweet your thoughts and reflections using this hashtag: #EDUCAUSEwebinar.
EDUCAUSE Tech Support, Jody Tracy
38:25
Be sure to select “Panelists and Attendees” from the dropdown so we can see your comments.
EDUCAUSE Tech Support, Jody Tracy
38:40
If you have any technical difficulties, please send a private chat to “Panelists.”
EDUCAUSE Tech Support, Jody Tracy
38:51
Recordings and resources from this session will be available on the on the EDUCAUSE event archive page:https://events.educause.edu/webinar/2021/in-the-cloud-cloud-security-hygiene-in-higher-education
EDUCAUSE Moderator, Jason Martin
40:46
Thank you everyone. Please make sure to complete our poll questions if you haven’t.
EDUCAUSE Tech Support, Jody Tracy
40:47
To open captioning in a separate, adjustable browser, please click on the arrow next to the “cc” button at the bottom of your window and select “View Full Transcript.”
EDUCAUSE Tech Support, Jody Tracy
41:29
Thank you to everyone who’s just joining us! Please use the chat to introduce yourself, ask questions, and make comments. Be sure to select “Panelists and Attendees” from the dropdown so we can see your comments.
EDUCAUSE Moderator, Jason Martin
01:02:06
Please feel free to send us any questions you have for Corey and Michael in the chat.
EDUCAUSE Tech Support, Jody Tracy
01:16:34
Thank you for your questions and comments so far. Be sure to select “Panelists and Attendees” from the dropdown so we can see your comments.
Jim Moore
01:19:54
CMMC level 3 has seen adoption in a variety of contexts. But the CMMC was developed more from an on-premise perspective. The CSA CCM is much more cloud focus, but doesn’t address some of the basics of CMMC. I hacked together a hybrid control set, but wondered if anyone is doing a more systematic approach.
CJ Whitfield
01:22:03
Can you comment on data at-rest encryption as a mechanism to better secure the data, and if self-managed keys are better than provider managed keys. If I aim to reduce the exfiltration threat then encryption is one path.
EDUCAUSE Tech Support, Jody Tracy
01:26:37
Later today
EDUCAUSE Tech Support, Jody Tracy
01:26:48
Recordings and resources from this session will be available on the on the EDUCAUSE event archive page:https://events.educause.edu/webinar/2021/in-the-cloud-cloud-security-hygiene-in-higher-education
Jim Moore
01:27:10
Can you give me the reference to the Zero Trust Policy framework that you mentioned in response to my question?
EDUCAUSE Tech Support, Jody Tracy
01:27:47
Thank you for your participation! Before leaving, please don’t forget to fill out our evaluation: https://survey.alchemer.com/s3/6179044/IC2118
EDUCAUSE Tech Support, Jody Tracy
01:28:17
Recordings and resources from this session will be available on the on the EDUCAUSE event archive page:https://events.educause.edu/webinar/2021/in-the-cloud-cloud-security-hygiene-in-higher-education
EDUCAUSE Tech Support, Jody Tracy
01:28:26
Thank you for your participation! Before leaving, please don’t forget to fill out our evaluation: https://survey.alchemer.com/s3/6179044/IC2118
EDUCAUSE Tech Support, Jody Tracy
01:28:35
Our next Industry & Campus Solutions webinar entitled, “Shaping Privacy Policy and Legislation in Higher Education” will be held on June 22nd at 1pm ET. https://events.educause.edu/webinar/2021/shaping-privacy-policy-and-legislation-in-higher-education