Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
The Higher Education Information Security Council (HEISC) supports higher education institutions as they improve information security governance, compliance, data protection, and privacy programs. HEISC accomplishes this work through volunteer groups supported by professional EDUCAUSE staff, as well as collaborations with other organizations that address information security and privacy in higher education. HEISC actively develops and promotes information security leadership, awareness, and understanding; effective practices and policies; and guidance for the protection of critical data, IT assets, and infrastructures.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Where Should You Keep Your Data?
June 25, 2015
"Formal policies on information storage are finally beginning to emerge from federal grant agencies. Federal funding agencies have made it clear that grant proposals must include plans for s…
- IT Security Questionnaire/IT Standards and Requirements Questionnaire
July 14, 2014
The University of Missouri IT Standards and Requirements Questionnaire (ITSRQ), currently in draft form, is predominantly focused on SaaS solutions although it can be readily adapted for other pu…
- Browsing the Web More Securely and More Privately With Firefox On Your Mac
April 28, 2014
This document is meant to help moderately technical users who are security- and privacy-focused make progress toward achieving online security and privacy goals when using an Apple Mac with the M…
- Developing A Comprehensive Privacy Program: A Step-By-Step Guide
December 13, 2013
Daniel Solove wrote Developing A Comprehensive Privacy Program: A Step-By-Step Guide in 2013 for The National Assoication of College and University Attorneys (NACUA). This guide seeks to…
- Overview of Bro
October 30, 2013
An increasing number of institutions are recognizing the need to log network data in large volume and to analyze the data efficiently to detect sophisticated network intrusion attempts affect…
- XSEDE Cloud Survey Report
September 24, 2013
A National Science Foundation-sponsored cloud user survey was conducted from September 2012 to April 2013 by the XSEDE Cloud Integration Investigation Team to better understand how cloud is used …
- Preparing for Back-to-School BYOD
August 8, 2012
With the BYOD trend on campus growing ever stronger, an IT network analyst shares his checklist to help ensure that your campus network is ready to manage the onslaught. …
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- 7 Ways BYOD Could Get You Sued
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
- For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012
Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …