New Resources:
- Information Security Program Self-Assessment Tool
- Hot Topics (including cloud, encryption, malware, mobile devices, printers/copiers, social networking, statewide longitudinal data systems, & tips for traveling abroad)
- Mentoring Toolkit
- Mobile Internet Device Security Guidelines
- Sensitive Data Exposure Incident Checklist
- Toolkit for New CISOs
- Top Information Security Concerns for Researchers
The following list includes resources developed or collected by the Higher Education Information Security Council (HEISC).
- Business Continuity Planning Toolkit
- Collaborating with Faculty
- Confidential Data Handling Blueprint
- Cybersecurity Awareness Resource Library
- Data Classification Toolkit
- Data Incident Notification Toolkit
- Data Protection Contractual Language: Common Themes and Examples
- E-Discovery Toolkit
- Effective Security Metrics
- Electronic Records Management Toolkit
- Encryption 101
- Governance, Risk, and Compliance (GRC) Systems FAQ
- Guidelines for Data De-Identification or Anonymization
- Guidelines for Information Media Sanitization
- Guidelines for Responding to Compulsory Legal Requests for Information
- Hot Topics
- Information Security Governance
- Information Security Program Self-Assessment Tool
- Mobile Internet Device Security Guidelines
- National Cyber Security Awareness Month (NCSAM) Resource Kit
- National Cyber Security Awareness Month (NCSAM) Sample Kit
- Developing Your Campus Information Security Website
- Outline of Model Security Policy Elements
- PCI DSS (Payment Card Industry Data Security Standard) Resource Page
- Records Retention and Disposition Toolkit
- Risk Assessment Consultants
- Risk Assessment Sample RFPs
- Risk Assessment Tools
- Risk Management Framework
- Security Awareness Detailed Instruction Manual
- Security Awareness Quick Start Guide
- Sensitive Data Exposure Incident Checklist
- Speakers Bureau
- Top Information Security Concerns for Campus Executives & Data Stewards
- Top Information Security Concerns for HR Leaders & Process Participants
- Top Information Security Concerns for Researchers
- Two-Factor Authentication
Questions or comments? Contact us.
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).