Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Catch a clue from an EDU: Universities that get security right
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In th…
- Be Prepared
August 19, 2010
The first rule of incident management is to accept that you will have an incident. Use these five best practices to get your institution ready. T…
- Cybersecurity: How safe are your data?
April 28, 2010
In an article in Nature , Jeffrey Perkel reports that many scientists want to keep their data and resources free; cybersecurity specialists want them under lock and key. …
- At Least It Wasnâ€™t a Football Weekend: The Notre Dame Tunnel Fire
October 6, 2009
This ECAR research bulletin discusses how the University of Notre Dame created and refined its incident response plan, how the utility tunnel fire of August 28, 2009, played out within that fram…
- Securing Institutional Data: Letâ€™s Make It Everyoneâ€™s Business
May 5, 2009
Â This ECAR research bulletin discusses the costs of preventing data loss in terms of people, processes, and technology. It focuses on principles to guide decision making in higher education an…
- 2008 NSF Cybersecurity Summit Report
November 19, 2008
The 2008 NSF Cybersecurity Summit was held May 7-8 in Crystal City, Virginia. The purpose was to bring together stakeholders from the university and government research communities to establish …
- Out of the Breach and into the Fire
September 15, 2008
© 2008 Heidi Wachs, Kent Wada, and Timothy Lance. The text of this article is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License ( http://creat…
- Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008
This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…
- Do Emergency Text Messaging Systems Put Students in More Danger?
August 4, 2008
Â© 2008 John Bambenek and Agnieszka Klus. The text of this article is licensed under the Creative Commons Attribution 3.0 license ( http://creativecommons.org/licenses/by/3.0/ ). EDUCAUS…
- 2008 Data Breach Investigations Report
July 1, 2008
The 2008 Data Breach Investigations Report draws from over 500 forensic engagements handled by the Verizon Business Investigative Response team over a four-year period. Tens of thousands of data …