Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Library Taxonomy
- Cybersecurity [x]
- Network Security and Applications [x]
- Networking and Emerging Technologies (2)
- Advanced Networking (1)
- DNSSEC (1)
- Federated Identity Management (1)
- Identity and Access Management (1)
- Intrusion Detection and Prevention (1)
- Network Infrastructure and Equipment (1)
- Network Management (1)
- Network Planning (1)
- Servers (1)
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- 7 Things You Should Know About IPv6
April 20, 2011
The rapid expansion in the use of the Internet, coupled with explosive growth in the number of devices that access it, has prompted development of a new protocol, IPv6. Apart from adding subs…
- 7 Things You Should Know About DNSSEC
January 15, 2010
The Domain Name System (DNS) uses a distributed network of name servers to translate text-based web addresses into IP addresses, directing Internet traffic to proper servers. DNS was built withou…
- 7 Things You Should Know About Federated Identity Management
September 10, 2009
Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources. With an enterprise identity management …