-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Information Security Governance [x]
- Cybersecurity (31)
- Security Management (31)
- Information Technology Management and Leadership (17)
- Data Security (11)
- Security Planning (10)
- Security Risk Assessment and Analysis (10)
- Policy and Law (8)
- Campus Policy and Law (7)
- Institutional Management (7)
- Security Awareness (7)
- Campus Policies (6)
- Compliance (6)
- Data Administration and Management (6)
- Information Systems and Services (6)
- Data Governance (5)
- Federal Policy and Law (5)
- IT Governance (5)
- Incident Handling and Response (5)
- Risk Management (4)
EDUCAUSE Library Items for Information Security Governance
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
An Incremental Approach to Building an Information Security Program
-
April 1, 2013
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…
-
Understanding and Managing the Risks of Analytics in Higher Education: A Guide
-
June 29, 2012
This guide provides an introduction to the major risk categories faced by a higher education institution considering investments in time, energy, and money in analytics work . Under the ri…
-
Proposed Rule to Safeguard Contractor Information Systems Impact on Higher Education
-
September 10, 2012
The General Services Administration (GSA), Department of Defense (DoD), and National Aeronautics and Space Administration (NASA) have issued a Proposed Rule that would enhance the cybersecuri…
-
Governance, Risk, and Compliance Systems in Higher Education
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
GRC (governance, risk, and compliance) systems are integrated applications that help automate the policy development and dissemination process; the tracking of requirements of law, regulations, s…
-
HEISC Town Hall Webinar: 2012-2013 Strategic Plan
-
January 9, 2012
In this webinar, the Higher Education Information Security Council (HEISC) discussed the following topics; Information security changes in the past 10 years Ongoing challenges for sec…
-
Practical Strategies for Managing Risk in Cloud Computing
-
March 1, 2011
This ECAR research bulletin identifies some key principles on which to base decisions related to security assurance and compliance capabilities in cloud computing environments. It also illustrate…
-
The Use of Social Security Numbers in California Colleges and Universities
-
July 1, 2010
The author's stated intention was "to minimize both the collection and storage of [the SSN] at colleges and universities, given the odds of it being released to unauthorized viewers, b…
-
Changing Mind-Sets in Academia: How ISOs Can Leverage Faculty to Improve Privacy and Security
-
April 14, 2010
|
A session at the Security 2010
While academia is often characterized as a cybersecurity risk to other critical infrastructures because of its values of openness and its lack of centralized control, it is also a national treasure…
-
Higher Education Information Security Governance Guide
-
April 13, 2010
|
A session at the Security 2010
In this session, a new information security governance resource in the EDUCAUSE security guide will be presented. The resource defines information security governance, describes various organizatio…

















