{"id":148,"date":"2009-10-07T01:44:50","date_gmt":"2009-10-07T08:44:50","guid":{"rendered":"http:\/\/www.aarontitus.net\/blog\/?p=148"},"modified":"2010-01-09T10:47:09","modified_gmt":"2010-01-09T17:47:09","slug":"aaron-titus-speaking-at-icamiss","status":"publish","type":"post","link":"http:\/\/www.aarontitus.net\/blog\/2009\/10\/07\/aaron-titus-speaking-at-icamiss\/","title":{"rendered":"Aaron Titus Speaking at ICAMISS"},"content":{"rendered":"<p><em>Note: This article originally appeared on the <a href=\"http:\/\/www.jeffreyneu.com\/20091007237\/Aaron-Titus-Speaking-at-ICAMISS.html\">J.C. Neu &amp; Associates Blog<\/a><\/em><\/p>\n<p>Aaron Titus will be presenting at the International Conference on Applied Modeling &amp; Information Security Systems (<a href=\"http:\/\/www.eiu.edu\/~iasc\/agenda.pdf\" target=\"_blank\" title=\"ICAMISS Schedule\">ICAMISS<\/a>) on October 10, 2009 at the University of Alabama, Birmingham.<\/p>\n<p>The speech will focus on the risks associated with personal information management, especially in an institution of higher education, where information is supposed to flow freely.&nbsp; These are among the policies and behaviors that put information at risk:<\/p>\n<ul>\n<li>Administrative Decentralization<\/li>\n<li>Naive Office Culture<\/li>\n<li>Unprotected &ldquo;Old&rdquo; Data<\/li>\n<li>Shadow Systems<\/li>\n<li>Unregulated Servers<\/li>\n<li>Unsophisticated Privacy Policies<\/li>\n<li>Improper Use of the SSN<\/li>\n<li>Unsanitized Hard Drives and Insecure Laptops<\/li>\n<\/ul>\n<p>The International Conference on Applied Modeling &amp; Information Security Systems is sponsored by the Department of Defense, Krell Institute, NASA-Ames Research Center, Institute of Applied Science &amp; Computation, Eastern Illinois University and University of Alabama at Birmingham.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: This article originally appeared on the J.C. Neu &amp; Associates Blog Aaron Titus will be presenting at the International Conference on Applied Modeling &amp; Information Security Systems (ICAMISS) on October 10, 2009 at the University of Alabama, Birmingham. The speech will focus on the risks associated with personal information management, especially in an institution [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[],"_links":{"self":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/148"}],"collection":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":1,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"predecessor-version":[{"id":149,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/148\/revisions\/149"}],"wp:attachment":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}