-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
- Podcasts (10)
- Blogs (11)
- Articles, Briefs, Papers, and Reports (60)
- Blogs and Wikis (1)
- Certification, Education, Training and Tutorials (15)
- Effective Practices (2)
- Government Documents, Laws, Testimonies or Reports (3)
- Plans and Guidelines (3)
- Policies and Procedures (5)
- Presentations and Seminars (124)
- Programs and Projects (1)
- RFPs (1)
- Surveys (1)
- Tools (4)
- Videos (4)
- Web Sites (1)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Awareness [x]
- Cybersecurity (247)
- Security Management (247)
- Policy and Law (65)
- Information Technology Management and Leadership (56)
- Network Security and Applications (40)
- Security Planning (40)
- Data Security (39)
- Federal Policy and Law (37)
- Campus Policy and Law (32)
- Security Risk Assessment and Analysis (30)
- Campus Policies (29)
- Executive Security Awareness (23)
- Incident Handling and Response (22)
- Security Policies (20)
- Cybersecurity Policy (19)
- Privacy (19)
- Identity and Access Management (16)
- Security Implementation (16)
- Security Training (14)
Introduction
Awareness and training are critical at all stages and levels of information security. For example, upper management needs to learn about the institutional risks; users must be taught how to defend themselves against malicious code; system and network administrators require training to help them maintain and improve the security of the systems they oversee; and information security support staff must be well-versed in all of these areas and have a solid understanding of vulnerability assessment, intrusion detection, incident response, encryption, and authentication.
Resources Developed by the Higher Education Information Security Council (HEISC)
- Cybersecurity Awareness Resource Library
- Executive Security Awareness Resources
- Information Security Poster & Video Contest
- National Cybersecurity Awareness Month (NCSAM) Resource Kit
- National Cybersecurity Awareness Month (NCSAM) Sample Kit
- Security Awareness Quick Start Guide
- Security Awareness Detailed Instruction Manual
College and University Education and Awareness Programs and Resources
- Carnegie Mellon University Software Engineering Institute (SEI) CERT Coordination Center Resources for CSIRTs (Computer Security Incident Response Teams)
- George Mason University Security Awareness
- North Dakota State University ITS Training
- Rochester Institute of Technology Digital Self Defense Training
- Texas A&M University Security Awareness Training
- University of Arizona Information Security Awareness, Education, and Training
- University of Calgary Security Awareness Program
- University of Virginia Security Awareness
- Virginia Tech Awareness Training
Updated October 2012
Latest News
Find resources and see what other campuses are doing this October for NCSAM.
NCSAM article in the latest EDUCAUSE Review offers resources and suggestions for campuses to support security awareness efforts in October.
Library Items on this Topic
EDUCAUSE Library Items for Security Awareness
-
Sample Identity Theft Prevention Program
-
November 18, 2008
This is a sample template for a university Identity Theft Prevention Program. This is a sample template for a university Identity Theft Preventio…
-
2008 National Cybersafety, Cybersecurity, Cyberethics Baseline Study
-
November 18, 2008
Study of the state of Cybersecurity, Cybersafety, and Cyberethics education in K-12 classrooms, including teacher preparedness to teach topics. S…
-
Computer Security Student Video
-
October 30, 2008
|
A session at the EDUCAUSE 2008 Annual Conference
The largest group of victims of identity theft is between the ages of 18 and 29. Students need to understand the risks and how to protect their personal information, computer, and campus networks. …
-
REN-ISAC: Community Support for Cybersecurity Protection and Response
-
November 10, 2008
As with many institutional endeavors, successful practice in cybersecurity requires that the players (individuals and teams) operate in the context of a community that faces similar challenges, o…
-
Soft-Selling Tough Issues
-
October 30, 2008
|
A session at the EDUCAUSE 2008 Annual Conference
LSU's IT communications and security officers joined forces to effectively educate campus populations about IT security threats and best practices. …
-
Georgia State University's IT Procurement Review Process--Practical Approach to Assessing Risks of IT Projects
-
March 17, 2011
In late 2005, the Security Review Policy was adopted by the University, which states "Where appropriate, information security personnel will conduct risk assessments of technologies/processe…
-
Security Metrics: A Solution in Search of a Problem
-
August 4, 2008
© 2008 Joel Rosenblatt. The text of this article is licensed under the Creative Commons Attribution-Share Alike 3.0 license ( http://creativecommons.org/licenses/by-sa/3.0/ ). EDUCAUSE Qu…
-
Policy on Institutional Data
-
October 18, 2007
Ohio State University's policy includes institutional data procedures and resources. It also defines the scope and applicability of the policy, as well as enforcement. …
-
Sensitive Data Best Practices
-
January 10, 2007
Louisiana State University's Best Practices for Sensitive Data covers the following: Electronic Handling, Storage and Disposal; Physical Handling, Storage and Disposal; Security; and Legal D…
-
Is Your Mobile Phone Putting You At Risk?
-
April 28, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have an…

















