Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Privacy and Security in Higher Education: Filling the Policy Vacuum
August 7, 2007
A session at the Seminars on Academic Computing 2007
Colleges and universities possess an exceptional volume and variety of personal information. Our stewardship of such information has been inconsistent and inadequate, and we often implement new tec…
- Identity Management Systems: Components and Constituents
January 1, 2004
A key component of infrastructure plans is well-managed access to services that protect online resources and user privacy while enabling ease of use and collaborative applications. This session wil…
- Leading by Example: The Case for IT Security in Academia
January 1, 2004
Academia has a unique role to play in increasing global cybersecurity. Equipping graduates with the principles of secure coding is the single most critical factor in improved cybersecurity for all.…
- IT Security Investments: Paths to Success
January 1, 2004
The first step is getting campus stakeholders to understand why security is important. The next step is to translate awareness into an institutional strategy. By what process do you acquire the nec…
- Web Sign-on Solutions with Pubcookie & Shibboleth
January 1, 2003
Authenticate locally, act globally: that's the Shibboleth way. But where does local Web sign-on begin and end? And how do institutions safeguard end-user privacy while encouraging more user gl…
- Managing Security Issues without Compromising Creativity
January 1, 2002
In light of recent events, there is an increasing need for colleges and universities (and an increasing pressure on higher education generally) to implement effective procedures, programs and strat…