Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
The Higher Education Information Security Council (HEISC) supports higher education institutions as they improve information security governance, compliance, data protection, and privacy programs. HEISC accomplishes this work through volunteer groups supported by professional EDUCAUSE staff, as well as collaborations with other organizations that address information security and privacy in higher education. HEISC actively develops and promotes information security leadership, awareness, and understanding; effective practices and policies; and guidance for the protection of critical data, IT assets, and infrastructures.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013
Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…
- Amassing Student Data and Dissipating Privacy Rights
January 28, 2013
Marc Rotenberg is Executive Director of the Electronic Privacy Information Center (EPIC) in Washington, D.C. He teaches Information Privacy Law at Georgetown University Law Center. Khali…
- 2012 CDS Executive Summary Report
January 24, 2013
This report summarizes results from the EDUCAUSE Core Data Service (CDS) survey. Using a matched set of 616 CDS 2011 and CDS 2012 participating institutions, this year’s report is a detaile…
- Cloud Security Debate: Cloud Now or Cloud How?
December 10, 2012
During the often-fiery 2012 presidential debate season, a lively debate of a different sort held at Indiana University (IU) featured passionate arguments on the natur…
- EDUCAUSE Core Data Service 2012 Almanacs
October 29, 2012
These two-page, easy-to-scan summaries distill CDS data in a variety of categories that include IT Financing, IT Staffing, Support Services, and many other service areas. All Non-Speciali…
- National Cyber Security Awareness Month
September 5, 2012
Aimee Larsen Kirkpatrick is Director of Partnership Engagement and Strategic Initiatives for the National Cyber Security Alliance (NCSA). Colleges and universities are a community u…
- Preparing for Back-to-School BYOD
August 8, 2012
With the BYOD trend on campus growing ever stronger, an IT network analyst shares his checklist to help ensure that your campus network is ready to manage the onslaught. …
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- Information Systems Risk Assessment
July 24, 2012
This Spotlight bulletin focuses on 2011 CDS survey results related to information systems (IS) risk assessments. Research findings and industry experience demonstrate that conducting a …
- 7 Ways BYOD Could Get You Sued
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…