Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by Publications
Filter by Library Taxonomy
- Cybersecurity [x]
- Policy and Law [x]
- Authentication (2)
- Authorization (2)
- Directories (2)
- Federal Policy and Law (2)
- Federal Privacy Law (2)
- Federated Identity Management (2)
- Identity Theft (2)
- Identity and Access Management (2)
- Middleware (2)
- Network Applications (2)
- Network Security and Applications (2)
- Networking and Emerging Technologies (2)
- Single Sign On (SSO) (2)
- Identity Management Policy (1)
- Infographics (1)
- Information Technology Management and Leadership (1)
- Research (1)
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Who Should Get In?
June 1, 2011
Back to ECAR 2011 Identity Management Research Hub This chart reflects findings from the ECAR 2011 research of identity management (…
- Identity Management in Higher Education, 2011 Report
June 1, 2011
Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…