Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
The Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Security Management
- Information Security
June 14, 2013
This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …
- Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
- Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
- An Incremental Approach to Building an Information Security Program
April 1, 2013
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…
- 2012 CDS Executive Summary Report
January 24, 2013
This report summarizes results from the EDUCAUSE Core Data Service (CDS) survey. Using a matched set of 616 CDS 2011 and CDS 2012 participating institutions, this year’s report is a detaile…
- Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013
Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…
- IT Service Metrics 101
January 28, 2013
Key Takeaways These guidelines to service metrics explain what to measure and how, when, and why to measure it. Trends reveal the most about services and performan…
- EDUCAUSE Core Data Service 2012 Almanacs
October 29, 2012
These two-page, easy-to-scan summaries distill CDS data in a variety of categories that include IT Financing, IT Staffing, Support Services, and many other service areas. All Non-Speciali…
- National Cyber Security Awareness Month
September 5, 2012
Aimee Larsen Kirkpatrick is Director of Partnership Engagement and Strategic Initiatives for the National Cyber Security Alliance (NCSA). Colleges and universities are a community u…
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…