-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (14)
- Blogs (53)
- Articles, Briefs, Papers, and Reports (68)
- Blogs and Wikis (2)
- Books and Monographs (2)
- Effective Practices (2)
- Government Documents, Laws, Testimonies or Reports (18)
- Letters (2)
- Plans and Guidelines (4)
- Policies and Procedures (13)
- Presentations and Seminars (95)
- Programs and Projects (3)
- Tools (3)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Cybersecurity Policy [x]
- Federal Policy and Law (288)
- Policy and Law (288)
- Cybersecurity (220)
- Security Management (162)
- Data Security (77)
- PCI DSS (59)
- Federal Privacy Law (52)
- Information Technology Management and Leadership (51)
- Privacy (41)
- Campus Policy and Law (40)
- Campus Policies (38)
- Data Breach (35)
- ID Theft Red Flags (30)
- Network Security and Applications (29)
- Security Policies (29)
- Incident Handling and Response (28)
- Security Planning (28)
- Identity and Access Management (21)
- Networking and Emerging Technologies (19)
EDUCAUSE Library Items for Cybersecurity Policy
-
PCI DSS
-
PCI DSS True Introduction The Payment Card Industry …
-
ID Theft Red Flags
-
ID Theft Red Flags True On December 18, 2010, President …
-
Data Breach
-
Data Breach True Sources of Data Security Breaches …
-
Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
-
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
Privacy and Security Initiatives and Recommendations from the U.S. Department of Education
-
February 26, 2013
Key Takeaways At EDUCAUSE 2012, U.S. Department of Education speakers discussed new privacy and security initiatives, as well as offering recommendations on navigating privacy ef…
-
Incident Management and Response Checklist
-
May 6, 2013
Rather than waiting for a data breach to happen, consider using an incident checklist to establish a campus incident response team, review your institution's readiness, and develop (or a…
-
Managing Risk and Compliance by Implementing DLP to Ensure Data Security
-
April 16, 2013
|
A session at the Security Professionals Conference
Did a university e-mail contain employee PII data? Did we just FTP a file that contains alumni PCI data? In this seminar, you will learn how Saint Louis University increased its ability to prevent …
-
Cyber War: You're Doing It Wrong! - Sponsored by Aegis Identity Software
-
April 16, 2013
|
A session at the Security Professionals Conference
No matter how you slice it, cyber war is technologically and militarily impractical. We've been talking about it for a long time, but the discussion has been (and still is) misleading and inac…
-
EDUCAUSE Submits Comments to NIST on Cybersecurity Framework
-
April 9, 2013
EDUCAUSE submitted comments on behalf of the Higher Education Information Security Council (HEISC) to address several questions raised by a NIST Request for Information concerning sta…

















