Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Presentations
Filter by Library Taxonomy
- Cybersecurity [x]
- Security Planning [x]
- Security Management (56)
- Policy and Law (17)
- Information Technology Management and Leadership (14)
- Network Security and Applications (12)
- Security Awareness (11)
- Campus Policies (10)
- Campus Policy and Law (10)
- Data Security (10)
- Security Implementation (10)
- Security Policies (10)
- Security Risk Assessment and Analysis (9)
- Federal Policy and Law (6)
- Cybersecurity Policy (5)
- Institutional Management (5)
- Identity and Access Management (3)
- Intrusion Detection and Prevention (3)
- Planning (3)
- Security Architecture (3)
The higher education sector plays an important role in the cybersecurity of America. Through its core mission of teaching and learning, higher education is the main source of future leaders, innovators, and the technical workforce. Through research, higher education is the basic source of much of our new knowledge and future technologies. Colleges and universities also operate some of the world's largest collections of computers and high-speed networks. This resource page provides information related to all aspects of cybersecurity for higher education, with an emphasis on strategies, policies, and other tools that will assist institutions of higher education to prevent, detect, and respond to vulnerabilities that threaten college and university computers and networks.
EDUCAUSE is actively involved with this area through the EDUCAUSE/Internet2 Higher Education Information Security Council (formerly the Security Task Force).
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
View past and future security-related events.
InCommon will be heavily involved in a $1.8 million grant awarded to Internet2 to build a consistent and robust privacy infrastructure. Partners include Carnegie Mellon, Brown, University of Texas...
Virginia Tech has become the first identity provider to achieve Bronze and Silver certification as part of the InCommon Assurance Program.
The annual EDUCAUSE Conference in Denver will provide an opportunity to explore the range and depth of issues that campuses must consider as they build...
Find a variety of E12 security and privacy-related sessions in Denver or online.
Find resources and see what other campuses are doing this October for NCSAM.
NCSAM article in the latest EDUCAUSE Review offers resources and suggestions for campuses to support security awareness efforts in October.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- A Normative Campus Security Agenda
May 5, 2008
A session at the Security 2008
One of the hardest tasks for security officers is deciding what should be part of the campus security agenda. This presentation will provide a taxonomy of campus IT security issues, including a dis…
- A Pragmatic Information Security Program for Small Institutions
April 16, 2013
A session at the Security Professionals Conference
When no one has "information security" in their job title, how can a small institution develop (and maintain) a reasonable IT security profile? An institution's information security …
- Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
May 16, 2012
A session at the Security Professionals Conference 2012
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limi…
- Automated Network Isolation at Indiana University
April 11, 2006
A session at the Security 2006
This presentation will describe the recent network isolation mechanism put in place at Indiana University. The project provides a means of automatically or manually isolating a device by IP address…
- Bagels and Schmear: Cybersecurity Planning and Statutory Compliance for Homeland Security Research Initiatives
April 11, 2006
A session at the Security 2006
Positioning a research organization for statutory compliance where select agents are the primary component requires extensive planning and partnering between academic research areas and enterprise …
- Breakout Session Reports
December 13, 2005
A brief report from each of the five breakout session leads A brief report from each of the five breakout session leads …
- Building More Secure Information Systems
December 12, 2005
The National Institute of Standards and Technology (NIST) is leading the development of key information security standards and guidelines as part of its Federal Information Security Management Act …
- Changing Mind-Sets in Academia: How ISOs Can Leverage Faculty to Improve Privacy and Security
April 14, 2010
A session at the Security 2010
While academia is often characterized as a cybersecurity risk to other critical infrastructures because of its values of openness and its lack of centralized control, it is also a national treasure…
- Conceptual Model for Information Security Strategy
April 4, 2005
A session at the Security 2005
This session will describe the development, use, and benefits of threeconceptual models for information security: a security strategy andpolicy system, an index of threat levels and defenses, and h…
- Cybersecurity Outlook for 2011 - Sponsored by Trustwave
April 5, 2011
A session at the Security Professionals Conference 2011
This keynote will highlight national initiatives such as the National Strategy on Trusted Identities in Cyberspace, the Homeland Security Presidential Directive (HSPD) 12, and the National Initiati…