Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Privacy Issues Associated with the Use of Biometrics in Higher Education: Risks and Best Practices
November 18, 2010
The emergence of biometric technologies offers organizations, including colleges and universities, potential new tools for confirming identity in contexts such as ensuring campus security, provid…
- Spotlight On Identity Management: Identity Management at USC: Collaboration, Governance, and Access
August 8, 2008
Identity and access management (IAM) at USC has been a policy-driven, grassroots effort for the past five years. During that time collaborative committees with representatives from many academic …
- Spotlight On Identity Management: Penn State's Identity and Access Management Initiative
March 14, 2008
With demands for identity and access management (IAM) paralleling the explosive growth in online interactions, it is imperative that existing business systems, infrastructure, planning, and techn…
- Spotlight On Identity Management: The Challenges of Creating an Identity Management Infrastructure for the University of California
February 5, 2008
Using the University employee self-service application as an example, we will discuss the organizational, political, and operational challenges that are being faced in the creation of UCTrust, th…
- Spotlight On Identity Management: A Case for Collaborative Identity Management in a Complex Decentralized Environment
January 18, 2008
Using the identity life cycle of the Cornell student as a use case, we will discuss the value of approaching identity management as a collective responsibility. The business and IT sides of the h…
- PKI Implementation at the University of Wisconsin-Madison
January 1, 2006
This session provides a practical example of how the University of Wisconsin–Madison researched various PKI system models and deployed a managed solution to issue digital certificates to encryp…