-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Planning [x]
- Cybersecurity (178)
- Security Management (178)
- Policy and Law (67)
- Information Technology Management and Leadership (51)
- Campus Policy and Law (42)
- Security Implementation (42)
- Campus Policies (40)
- Security Awareness (40)
- Security Policies (39)
- Data Security (34)
- Network Security and Applications (34)
- Security Risk Assessment and Analysis (34)
- Federal Policy and Law (32)
- Cybersecurity Policy (28)
- Incident Handling and Response (16)
- Security Architecture (16)
- Planning (14)
- Intrusion Detection and Prevention (10)
- Networking and Emerging Technologies (10)
EDUCAUSE Library Items for Security Planning
-
Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
-
May 14, 2013
This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
Breaches and a Lawsuit: An Institution's Road to Recovery
-
April 17, 2013
|
A session at the Security Professionals Conference
As a result of its breaches and a class action lawsuit, the University of Hawaii has undertaken extensive actions to transform its information security landscape. We will describe the timeline of…
-
Proven Strategies for Web Application Security
-
April 16, 2013
|
A session at the Security Professionals Conference
Web application security is the Sisyphean task facing institutions of all sizes. Approaching web application security is an extremely daunting task. University of Pennsylvania's School of Arts…
-
The Enemy Is Us: Doing the Work of Information Security Better
-
April 17, 2013
|
A session at the Security Professionals Conference
Within information security departments, staff often get so bogged down in "getting the job done" that they can never assess how they are doing their job and whether they can do anything …
-
A Pragmatic Information Security Program for Small Institutions
-
April 16, 2013
|
A session at the Security Professionals Conference
When no one has "information security" in their job title, how can a small institution develop (and maintain) a reasonable IT security profile? An institution's information security …
-
Bootstrapping IT Security
-
March 12, 2013
|
A session at the NERCOMP Annual Conference
This session will cover the history of the Brown Security Round Table, the benefits of this committee, and lessons learned. Come and talk to some of the founding members of this committee to learn …
-
Security on the Cheap: Creating a Cost-Effective Information Security Program
-
May 17, 2012
|
A session at the Security Professionals Conference 2012
Security as presented by vendors boils down to buying the right box or software. We'll take the point of view that effective security can be created using homegrown and open-source solutions i…
-
Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
-
May 16, 2012
|
A session at the Security Professionals Conference 2012
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limi…
-
HEISC Town Hall Webinar: 2012-2013 Strategic Plan
-
January 9, 2012
In this webinar, the Higher Education Information Security Council (HEISC) discussed the following topics; Information security changes in the past 10 years Ongoing challenges for sec…

















