Label: information

Content with label information in Information Security Guide (See content from all spaces)
Related Labels: issues, practice, awareness, legislative, effective, case, pii, encryption, leaders, laws, background, navigation, security, privacy, system, participants, guide, presentations, read-me, more »

Page: Developing Your Campus Information Security Website
an effort to help institutions create effective information security websites that are informative and helpful to their users, the Higher Education Information Security Council has compiled a list of common features and effective practices that can serve as an outline for a college or university ...
Other labels: campus, security, website, organization, elements, recommended, practices, checklist
Page: GRC FAQ
Other Hot Topics: itsg2:Cloud Computing Security \ itsg2:Cloud Data Storage Solutions \ itsg2:Community Based Security Awareness \ Copier and MultiFunction Device Security itsg2:Copier and MFD Security \ itsg2:Full Disk Encryption \ Managing ...
Other labels: educause, heisc, security, higher, education, hot, topics, grc
Page: Guidelines for Information Media Sanitization
Practical Information Media Sanitization Guidelines for Higher Education {}Version 2.0: September 2009{} Background Much sensitive and private information at educational institutions is recorded and maintained outside central information technology systems on various desktop and portable devices and removable ...
Other labels: media, sanitization, practical, guidelines, higher, education, computer, disposal
Home page: Home
educauseheader.jpg! Find answers to frequently asked security questions and get an overview of the guide using this handy infographic InfoSec Guide Infographic.jpg. \\ Read the Overview itsg2:Overview to the Guide, which describes how the guide is organized and how to find information ...
Other labels: iso27002, security, guide, effective, practices, solutions, higher, education
Page: Hot Topics
page provides resources for hot topics related to security, privacy, identity, and compliance in the higher education community. Most of these topics started as questions posed to the EDUCAUSE Security Discussion Group listserv http://www.educause.edu/groups/security. If you'd like to see ...
Other labels: hot, topics, higher, education, security, educause, heisc, current
Page: Implementing Information Security Governance Using ISO 27000
Last Updated: October 2008{} Case Study Implementing Information Security Governance Using ISO 27000 Background GSU's CIO sponsored the ISO 27001 certification initiative at Georgia State University in mid 2007 and the Information Security Department and Office ...
Other labels: case, study, effective, practice, security, governance, risk, management
Page: Incident Checklist
Sensitive Data Exposure Incident Checklist Version 1.1: May 2013 We recommend reading the purpose statement, introduction, overview, and suggestions for how to use the checklist before downloading a copy #download. Purpose To provide a toolkit that includes resources, procedures ...
Other labels: security, sensitive, data, personal, pii, exposure, incident, checklist
Page: Information Security Governance
Information Security Governance What is Information Security Governance and What it is Not #what Why Information Security Governance is Needed #buyin How to Govern Information Security #components   Organizational Structure #org   Roles and Responsibilities #roles ...
Other labels: security, governance, organizational, structure, roles, responsibilities, strategic, planning
Page: Information Security Incident Management (ISO 13)
Table of Contents #Overview \ #Standards \ #Getting Started \ #Resources Preparation, Detection, and Reporting #PrepDetectReport (ISO 13.1) Response and Improvement #ResponseImprove (ISO 13.2) If you're currently dealing with a security incident, remember these four basic tips: 1) Don't panic ...
Other labels: security, incident, management, preparation, detection, reporting, response, process
Page: Information Security Risk Assessment Consultants
Background Sometimes, when an institution decides it may need outside assistance in managing or performing some aspect of a risk assessment (either institutionwide or for selected segments of the institution) it is unsure how to start the process of even seeking viable consultants. As an ...
Other labels: security, risk, assessment, consultants, background, educause, heisc