-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
- Podcasts (10)
- Blogs (11)
- Articles, Briefs, Papers, and Reports (60)
- Blogs and Wikis (1)
- Certification, Education, Training and Tutorials (15)
- Effective Practices (2)
- Government Documents, Laws, Testimonies or Reports (3)
- Plans and Guidelines (3)
- Policies and Procedures (5)
- Presentations and Seminars (125)
- Programs and Projects (1)
- RFPs (1)
- Surveys (1)
- Tools (4)
- Videos (4)
- Web Sites (1)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Awareness [x]
- Cybersecurity (248)
- Security Management (248)
- Policy and Law (65)
- Information Technology Management and Leadership (56)
- Network Security and Applications (40)
- Security Planning (40)
- Data Security (39)
- Federal Policy and Law (37)
- Campus Policy and Law (32)
- Security Risk Assessment and Analysis (30)
- Campus Policies (29)
- Executive Security Awareness (23)
- Incident Handling and Response (22)
- Security Policies (20)
- Cybersecurity Policy (19)
- Privacy (19)
- Identity and Access Management (16)
- Security Implementation (16)
- Security Training (14)
Getting Started
The Higher Education Information Security Council offers a variety of cybersecurity awareness resources for colleges and universities that can be adapted to fit the needs of your campus for campaigns during student orientations, National Cyber Security Awareness Month (NCSAM) each October, and throughout the year.
- Cybersecurity Awareness Resource Library
- Executive Security Awareness Resources
- Information Security Awareness Video & Poster Contest
- National Cybersecurity Awareness Month (NCSAM) Resource Kit
- National Cybersecurity Awareness Month (NCSAM) Sample Kit
- Security Awareness Quick Start Guide
- Security Awareness Detailed Instruction Manual
- Speakers Bureau
Updated May 2013
Latest News
Find resources and see what other campuses are doing this October for NCSAM.
NCSAM article in the latest EDUCAUSE Review offers resources and suggestions for campuses to support security awareness efforts in October.
Library Items on this Topic
EDUCAUSE Library Items for Security Awareness
-
Cybersecurity Research Challenges
-
May 8, 2008
Today's most prevalent and widely discussed attacks exploit code-level flaws such as buffer overruns and type-invalid input. We need to anticipate tomorrow's attacks and think beyond buff…
-
NSF Response to 2007 Summit Final Report
-
May 7, 2008
The Cybersecurity Summit meetings have proven to be a useful forum to foster dialog between awardees, cybersecurity experts and NSF. NSF will provide feedback on the 2007 Summit meeting and discuss…
-
The Big Brother Dilemma - Sponsored by CIBER Enterprise Solutions
-
May 29, 2008
|
A session at the Enterprise Information & Technology Conference 2008
We want cameras watching for problems, but we worry that they will observe or disclose things we'd like to keep private. We want network administrators to track harassing e-mail to its source,…
-
A Cybersecurity Agenda for the Next President
-
May 7, 2008
There has been much improvement in securing cyberspace in the last five years, but much still needs to be done. The Center for Strategic and International Studies (CSIS) has established a Commissio…
-
Creating and Maintaining a Security Awareness Program
-
May 5, 2008
|
A session at the Security 2008
Information security and the protection of a university's information assets and ?intellectual property begin with security awareness and education. This session will discuss ?Purdue Universit…
-
Security Uncertainty: What Matters, Motivates, and Moves!
-
May 6, 2008
|
A session at the Security 2008
Good security requires good communications and understanding. It is key to agree on effective and efficient processes and technologies that implement security controls. How do we get senior adminis…
-
Community Aware: Taking Cyber Security Awareness to the Street
-
May 5, 2008
|
A session at the Security 2008
Community members face a sea of confusion when considering how to use the Internet safely. With the advance of broadband Internet into the homes of millions of Americans, how do we as security prof…
-
A Normative Campus Security Agenda
-
May 5, 2008
|
A session at the Security 2008
One of the hardest tasks for security officers is deciding what should be part of the campus security agenda. This presentation will provide a taxonomy of campus IT security issues, including a dis…
-
Is Your Mobile Phone Putting You At Risk?
-
April 28, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have an…
-
It's Past Midnight: Do You Know Where Your Data Are?
-
March 17, 2008
|
A session at the EDUCAUSE Midwest Regional Conference 2008
Since instituting a mandatory review and approval process for all contracts involving IT, we've become aware of how few people know how to prepare a good contract and how few contracts truly p…
















