Main Nav

Incident Management and Response Checklist

Rather than waiting for a data breach to happen, consider using an incident checklist to establish a campus incident response team, review your institution's readiness, and develop (or adjust) your incident management and response roadmap. In a recent Security listserv discussion, one campus was seeking an incident response decision tree or process flow to help determine when it's appropriate to perform forensic analysis of a compromised machine that accesses or stores sensitive data.

2013 Security Awareness Video & Poster Contest Winners Announced

Nine winners of the 5th Annual Information Security Awareness Video and Poster Contest have been selected. The winning videos and posters are now available for colleges and universities to use in campus security awareness campaigns during National Cyber Security Awareness Month in October, student orientations, and throughout the year.

Visit the contest's YouTube channel to view or share the 2013 playlist. All 8 posters are available to download using EDUCAUSE ShareFile. The posters can also be shared via Facebook or Pinterest.

Tags from the EDUCAUSE Library

Tags from the Community

Call for Participation: The Multi-Factor Authentication Cohortium

The Internet2 Scalable Privacy Project (ScalePriv), funded with the recent National Strategy for Trusted Identities in Cyberspace (NSTIC) grant to Internet2, is seeking campuses to participate in the Multi-Factor Authentication (MFA) Cohortium*. Applications are open until April 26, 2013 (note the deadline extension).

Meet Us in St. Louis for the 2013 Security Professionals Conference

Security, privacy, and IT professionals from the higher education community will gather in St. Louis next month (April 15-17) for the 2013 Security Professionals Conference. This year's program features several new offerings for face-to-face and online attendees:

Top Information Security Concerns for Researchers

Communicating information security issues with campus researchers is a common challenge in the higher education community. Often, researchers may not see information security or data protection as their concern. A new HEISC resource, Top Information Security Concerns for Researchers: Protecting Your Intellectual Assets, provides 10 sets of questions for researchers to consider about their data while also offering relevant resources for protecting that research data.

Questions or comments about this resource? Please contact us:

Higher Education Activities during Data Privacy Month

Although this is only the second year that colleges and universities are working together to observe and promote Data Privacy Month, many campuses are busy planning local or regional events, tweeting daily with the hashtags #dataprivacy and #dpd13, and writing blogs or articles about data privacy. We hope these activities will encourage you to consider ways to promote Data Privacy Month this year or begin thinking about how yor campus will participate in 2014.

Tags from the Community

January 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase Awareness

Data Privacy Month is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone's priority. Spend the month helping to ensure your campus community is respecting privacy, safeguarding data, and enabling trust. This year’s Data Privacy Month Planning Task Force has selected weekly themes for the higher education community to focus on. Several free webinars will also be offered throughout the month of January.

EDUCAUSE Supports Computer Science Education Week 2012

Computer Science Education Week (CSEdWeek) – December 9-15, 2012 – is a call to action to share information and offer activities that will advocate for computing and elevate computer science education for students at all levels. EDUCAUSE is supporting CSEdWeek because computer science is an important part of information technology, the mechanism our community uses to support the advancement of higher education.

Everyone can participate, and as members of the higher education IT community, we invite you to help lead the charge. Below are a few easy ways to participate.

Tags from the EDUCAUSE Library

NCSAM 2012 is Wrapping Up! What's Next?

National Cyber Security Awareness Month (NCSAM) 2012 is wrapping up, so what’s next?

PTAC Data Breach Response Checklist

The Privacy Technical Assistance Center (PTAC) recently published a Data Breach Response Checklist that institutions of higher education may use to develop a comprehensive data breach response plan. The checklist is meant to be used as a general example illustrating some current industry best practices in data breach response and mitigation applicable to education community. A PDF version is available to download.

Tags from the EDUCAUSE Library