Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Creating the IT Architecture for the Connected Age
August 1, 2013
Beyond MOOCs: Is IT Creating a New, Connected Age? A 3 Day Sprint - August 1st, 2013 The last day of the EDUCAUSE Sprint 2013 features Tracy Futhey, vice president for informatio…
- Location, Location, Location
January 30, 2014
A session at the EDUCAUSE LIVE! - Location, Location, Location
Two contradicting federal court decisions in December 2013 focus on whether the National Security Agency's massive data collection program is constitutional because it does not probe into th…
- Privacy and the Connected Campus
May 21, 2013
As students, scholars, and administrators use today’s connected online tools , they leave behind a “ data exhaust ” that can reveal a surprisingly detailed picture of individual activi…
- 8 Mobile Device Security Steps
October 1, 2013
A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps
Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …
- Lawful Access: Issues and Challenges for Universities
April 7, 2011
This presentation will focus on the discrete types of legal process or demands that universities are likely to see from law enforcement and civil parties ; the types of situations when such de…
- Government Access to Electronic Communications—Updating the Rules
June 9, 2010
The Electronic Communications Privacy Act (ECPA) was a forward-looking statute when enacted in 1986. It specified standards for law enforcement access to e-mail and other electronic communication…
- Lessons Learned on the Road to PCI Compliance
September 5, 2007
Many of us are working within our institutions to achieve Payment Card Industry (PCI) compliance. We see a number of merchants on campuses with different business needs, systems, and vendor relat…