CT at the Show

A meeting of minds over shared issues.

Educause Western Regional

Experts on hand

The Spring 2005 Educause Western Regional event, held in San Francisco, offered the comprehensive range of topics and expertise you'd expect to find at the much larger annual meeting, but had the advantages of a smaller, more intimate event. Among many highly focused track presentations,Educause (www.educause.edu) VP Mark Luker's session detailed the latest thinking and initiatives in the area of information security governance,asking,"The Buck Stops Where?"

A balancing act

In a plenary session examining the balance between security and privacy post 9/11, Cornell University (NY) Director of IT Policy and Computer Law and Policy Tracy Mitrano shared the podium with Educause Director of Policy and Networking Programs Steven Worona. To what extent will technology be used to monitor personal information and activities? Higher education has some thinking to do. Worona points out, "We are no longer limited [by the technology] in what we can do; the limitation comes from what we decide to do."

Common challenges

After her highly animated discussion session on data warehousing and data-driven decision-making, San Diego State University's Vice President for Academic Technology Mary Jo Gorney-Moreno told Campus Technology, "One of the things that was really wonderful to learn is that we all have the same questions and issues ... Neither those of us who are working between legacy systems and ERPs, nor those who are three years into an ERP implementation have found a way to use the data for decisions."

Featured

  • abstract graph showing growth

    Where Are You on the Ed Tech Maturity Curve?

    Ed tech maturity models can help institutions map progress and make smarter tech decisions.

  • row of digital padlocks

    2026 Cybersecurity Trends to Watch in Higher Education

    In an open call last month, we asked education and industry leaders for their predictions on the cybersecurity landscape for schools, districts, colleges, and universities in 2026. Here's what they told us.

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.