Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Several Ways to Understand Digital Privacy
April 21, 2011
Data privacy is frequently a confusing subject. This talk will explain why: Privacy comprises many different rights and protections that may apply in many different circumstances. It's fre…
- What Price Insularity? Reflections About Computer Security Failings
January 4, 2008
Why is it risky for technologists to ignore the nontechnical context where their systems will be deployed? Furthermore, what is the risk when policymakers ignore the limits and potential of techn…
- Fight Back Against Identity Theft
January 1, 2006
There's no surefire way to protect yourself from identity theft, but there are steps you can take to minimize the risk of becoming a victim. That is the message of a nationwide education pro…