Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- EDUCAUSE Quarterly Magazine, Volume 33, Number 3, 2010
September 22, 2010
Reflections on Play, Pedagogy, and World of Wa…
- Helping Secure the Internet with DNSSEC
September 22, 2010
Key Takeaways The Domain Name System (DNS) suffers from vulnerabilities that when exploited can have devastating effects on the affected institutions and their communities. DNS Security…
- Complex Systems, Simplified Operations
December 22, 2009
Key Takeaways As organizations adopt a decentralized model based on distributed systems with a wide variety of configurations, staffing the operations center with personnel possessing the n…
- Identity Management and Trust Services: Foundations for Cloud Computing
September 4, 2009
©2009 Jack Suess and Kevin Morooney. The text of this article is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License ( http://creativecommons.org…
- On People, the Death of Privacy, and Data Pollution
March 14, 2008
© 2008 Bruce Schneier EDUCAUSE Review, vol. 43, no. 2 (March/April 2008) On People, the Death of Privacy, and Data Pollution Bruce Schneier Bruce Schneier is Chief Tec…
- A Security Checklist for ERP Implementations
November 9, 2007
Current Issues A Security Checklist for ERP Implementations A study of ERP security issues produced a checklist that shows institutions what to look for while letting vendors know what camp…
- Naughty Bit
July 6, 2007
© 2007 Steve Worona. The text of this article is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License ( http://creativecommons.org/licenses/by-nc-nd/3.0/ ).…
- Do You Know Where Your Data Are?
January 1, 2006
Viewpoint Do You Know Where Your Data Are? A useful new tool in the information security kit—outbound content monitoring and filtering—can help prevent sensitive data loss B y C…
- Helping Students Adapt to Computer-Based Encrypted Examinations
January 1, 2006
Helping Students Adapt to Computer-Based Encrypted Examinations Faculty can promote student acceptance of computer-based exams through training and encouragement By Lori Baker-Eveleth , …
- Leading by Example: The Case for IT Security in Academia
January 1, 2005
© 2005 Mary Ann Davidson EDUCAUSE Review, vol. 40, no. 1 (January/February 2005): 14–23. Leading by Example: The Case for IT Security in Academia Mary Ann Davidson Mary Ann D…