-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Planning [x]
- Cybersecurity (175)
- Security Management (175)
- Policy and Law (66)
- Information Technology Management and Leadership (50)
- Campus Policy and Law (42)
- Security Implementation (41)
- Campus Policies (40)
- Security Awareness (40)
- Security Policies (39)
- Security Risk Assessment and Analysis (34)
- Data Security (33)
- Network Security and Applications (32)
- Federal Policy and Law (31)
- Cybersecurity Policy (27)
- Incident Handling and Response (15)
- Security Architecture (15)
- Planning (14)
- Information Security Governance (10)
- Networking and Emerging Technologies (10)
EDUCAUSE Library Items for Security Planning
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
The Enemy Is Us: Doing the Work of Information Security Better
-
April 17, 2013
|
A session at the Security Professionals Conference
Within information security departments, staff often get so bogged down in "getting the job done" that they can never assess how they are doing their job and whether they can do anythin…
-
A Pragmatic Information Security Program for Small Institutions
-
April 16, 2013
|
A session at the Security Professionals Conference
When no one has "information security" in their job title, how can a small institution develop (and maintain) a reasonable IT security profile? An institution's information security …
-
Bootstrapping IT Security
-
March 12, 2013
|
A session at the NERCOMP Annual Conference
This session will cover the history of the Brown Security Round Table, the benefits of this committee, and lessons learned. Come and talk to some of the founding members of this committee to learn …
-
Security on the Cheap: Creating a Cost-Effective Information Security Program
-
May 17, 2012
|
A session at the Security Professionals Conference 2012
Security as presented by vendors boils down to buying the right box or software. We'll take the point of view that effective security can be created using homegrown and open-source solutions i…
-
Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limi…
-
HEISC Town Hall Webinar: 2012-2013 Strategic Plan
-
January 9, 2012
In this webinar, the Higher Education Information Security Council (HEISC) discussed the following topics; Information security changes in the past 10 years Ongoing challenges for sec…
-
2012 Planning Guide: Identity and Privacy
-
December 12, 2011
After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continui…
-
There's a Party in Security and Everyone's Invited
-
October 21, 2011
|
A session at the EDUCAUSE 2011 Annual Conference
The increase of security threats on campuses and the tightening of budgets require IT security programs to get creative. How do you balance the reactive work with the proactive initiatives? The Uni…
-
Cybersecurity Outlook for 2011 - Sponsored by Trustwave
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
This keynote will highlight national initiatives such as the National Strategy on Trusted Identities in Cyberspace, the Homeland Security Presidential Directive (HSPD) 12, and the National Initiati…

















