Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- 8 Mobile Device Security Steps
October 1, 2013
A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps
Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …
- Security, Privacy and Policy: Special Expert Q&A Session
April 28, 2011
Listen to an informal Q&A session on today's theme of Security, Privacy and Policy. Listen to an informal Q&A session on today…
- Smartphone Privacy & Security: What Should We Teach Our Users?
April 28, 2011
Mobile Computing: A 5 Day Sprint—Thursday, April 28 Information security takes on new dimensions in a mobile context. Protection of sensitive data, IT systems, and user privacy requi…
- Several Ways to Understand Digital Privacy
April 21, 2011
Data privacy is frequently a confusing subject. This talk will explain why: Privacy comprises many different rights and protections that may apply in many different circumstances. It's fre…
- Location-Sharing Technologies: Privacy Risks and Controls
July 27, 2010
Due to the ability of cell phone providers to use cell phone towers to pinpoint usersâ€™ locations, the increasing popularity of GPS capabilities in cell phones, and the rise of cell phones …