U.S. Flag Official website of the Department of Homeland Security

Getting Started for Academia

To meet growing technological needs and to protect against evolving cyber threats, DHS is engaging with the academic community to increase cybersecurity awareness, incentivize cybersecurity, encourage the adoption of best practices, and implement a shared sense of responsibility for cybersecurity at universities and colleges. The resources below are available to academia and aligned to the five Cybersecurity Framework Function Areas. Some resources and programs align to more than one Function Area. This page will be updated as additional resources--from DHS, other Federal agencies, and the private sector--are identified.

Engage with the C³ Voluntary Program

In addition to improving cyber risk management across academia, the C³ Voluntary Program also works with academic organizations to extend the reach of the program. If your organization is interested in engaging with the C³ Voluntary Program through activities such as developing a blog post, creating an article for an academic journal, or coordinating a speaking engagement at your institution, please visit the C³ Voluntary Program In the Press page for more details.

On This Page:
Identify
Protect
Detect
Respond

Resources to Identify

Cyber Resilience Review (CRR)

The CRR is a no-cost, voluntary, non-technical assessment to evaluate an organization’s operational resilience and cybersecurity practices. The CRR may be conducted as a self-assessment or as an on-site assessment facilitated by DHS cybersecurity professionals. The CRR assesses enterprise practices and procedures across a range of ten domains including risk management, incident management, service continuity, and others. The assessment is designed to measure existing organizational resilience as well as provide a gap analysis for improvement based on recognized best practices. For additional information please see http://us-cert.gov/ccubedvp/self-service-crr.

Cybersecurity Evaluation Tool (CSET) and On-Site Cybersecurity Consulting

Industrial control systems security posture assessments, offered through CSET, a self-assessment tool. Features include a mapping to control systems standards based on the sector as well as a network architecture mapping tool. The tool can be downloaded for self-use or organizations can request a facilitated site visit, which could include basic security assessments, network architectural review and verification, network scanning using custom tools to identify malicious activity and indicators of compromise, and penetration testing. More information is available at: http://ics-cert.us-cert.gov/assessments.

Industrial Control Systems Computer Emergency Readiness Team (ICS-CERT) Recommended Practices

A list of recommended practices aimed at helping industry understand and prepare for ongoing and emerging control systems cybersecurity issues, vulnerabilities, and mitigation strategies. ICS-CERT works with control systems manufacturers, service providers, researchers, and end users to ensure that the recommended practices are vetted by industry subject matter experts prior to publication. Recommended practices cover topics such as defense-in-depth strategies, cyber forensics, and incident response and are updated on a routine basis to account for emerging issues and practices. Access to recommended practices is provided through: http://ics-cert.us-cert.gov/introduction-recommended-practices

National Cyber Awareness System (NCAS)

The National Cybersecurity and Communications Integration Center (NCCIC) produces advisories, alert & situation reports, analysis report, current activity updates, daily summaries, indicator bulletins, periodic newsletters, recommended practices, Weekly Analytic Synopsis Product (WASP), weekly digests, and year in review to alert partners of emerging cyber threats, vulnerabilities, and current activities. Certain products such as alerts, current activity, bulletins, and tips are released through US-CERT’s NCAS. More information on obtaining NCAS products is available at:

U.S. Computer Emergency Readiness Team (US-CERT) and ICS-CERT Alerts, Bulletins, Tips, and Technical Documents

Access to alerts, bulletins, tips, and technical documents published by ICS-CERT and US-CERT. ICS-CERT also offers an extensive bibliography of relevant standards and references. Both sets of documents and references provide a better understanding of relevant control systems vulnerabilities and the measures critical infrastructure owners and operators can take to address them. More information on ICS-CERT and US-CERT alerts, bulletins, tips, and technical documents is available at: http://ics-cert.us-cert.gov and http://us-cert.gov.    

Cyber Security Advisors (CSAs)

CSAs are regionally located DHS personnel who direct coordination, outreach, and regional support to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s critical infrastructure and State, local, tribal, and territorial (SLTT) governments. CSAs offer immediate and sustained assistance to prepare and protect SLTT and private entities. CSAs bolster the cybersecurity preparedness, risk mitigation, and incident response capabilities of these entities and bring them into closer coordination with the Federal Government. CSAs represent a front line approach and promote resilience of key cyber infrastructures throughout the U.S. and its territories. For more information about CSAs, please email cyberadvisor@hq.dhs.gov.

Protective Security Advisors (PSAs)

PSAs are trained critical infrastructure protection and vulnerability mitigation subject matter experts. Regional Directors are Supervisory PSAs, responsible for the activities of eight or more PSAs and geospatial analysts, who ensure all Office of Infrastructure Protection critical infrastructure protection programs and services are delivered to Federal and SLTT stakeholders and private sector owners and operators. The PSA program focuses on physical site security and resiliency assessments, planning and engagement, incident management assistance, and vulnerability and consequence information sharing. For more information about PSAs, visit: http://dhs.gov/protective-security-advisors.

EDUCAUSE Information Security Guide: Effective Practices and Solutions for Higher Education

The Information Security Guide: Effective Practices and Solutions for Higher Education (referred to as "the Guide") is a compendium of information providing guidance on effective approaches to information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council (formerly the Security Task Force). Its content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities.

The content itself is a rich combination of materials written for the Guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. Access the guide at: https://wiki.internet2.edu/confluence/display/itsg2/Home.

Back to Top

Resources to Protect

ICS-CERT Training

Training in industrial control systems security at the overview, intermediate, and advanced levels, including web-based and instructor-led formats. More information on ICS-CERT training opportunities are available at: http://ics-cert.us-cert.gov/training-available-through-ics-cert.

ICS-CERT Recommended Practices

A list of recommended practices aimed at helping industry understand and prepare for ongoing and emerging control systems cybersecurity issues, vulnerabilities, and mitigation strategies. ICS-CERT works with control systems manufacturers, service providers, researchers, and the end user community to ensure that the recommended practices are vetted by industry subject matter experts prior to publication. Recommended practices cover topics such as defense-in-depth strategies, cyber forensics, and incident response, and are updated on a routine basis to account for emerging issues and practices. Access to recommended practices is provided through: http://ics-cert.us-cert.gov/introduction-recommended-practices.

National Cyber Awareness System (NCAS)

The National Cybersecurity and Communications Integration Center (NCCIC) produces advisories, alert & situation reports, analysis report, current activity updates, daily summaries, indicator bulletins, periodic newsletters, recommended practices, Weekly Analytic Synopsis Product (WASP), weekly digests, and year in review to alert partners of emerging cyber threats, vulnerabilities, and current activities. Certain products such as alerts, current activity, bulletins, and tips are released through US-CERT’s NCAS. More information on obtaining NCAS products is available at:

US-CERT and ICS-CERT Alerts, Bulletins, Tips, and Technical Documents

Access to alerts, bulletins, tips, and technical documents published by ICS-CERT and US-CERT. ICS-CERT also offers an extensive bibliography of relevant standards and references. Both sets of documents and references provide a better understanding of relevant control systems vulnerabilities and suggest measures critical infrastructure owners and operators can take to address them. More information on ICS-CERT and US-CERT alerts, bulletins, tips, and technical documents is available at: http://ics-cert.us-cert.gov and http://us-cert.gov.

Cyber Security Advisors (CSAs)

CSAs are regionally located DHS personnel who direct coordination, outreach, and regional support to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s critical infrastructure and SLTT governments. CSAs offer immediate and sustained assistance to prepare and protect SLTT and private entities.  CSAs bolster the cybersecurity preparedness, risk mitigation, and incident response capabilities of these entities and bring them into closer coordination with the Federal Government. CSAs represent a front line approach and promote resilience of key cyber infrastructures throughout the U.S. and its territories. For more information about CSAs, please email cyberadvisor@hq.dhs.gov.

Protective Security Advisors (PSAs)

PSAs are trained critical infrastructure protection and vulnerability mitigation subject matter experts. Regional Directors are Supervisory PSAs, responsible for the activities of eight or more PSAs and geospatial analysts, who ensure all Office of Infrastructure Protection critical infrastructure protection programs and services are delivered to Federal and SLTT stakeholders and private sector owners and operators. The PSA program focuses on physical site security and resiliency assessments, planning and engagement, incident management assistance, and vulnerability and consequence information sharing. For more information about PSAs, visit: http://dhs.gov/protective-security-advisors.

Cybersecurity Information Sharing and Collaboration Program (CISCP)

A no-cost information sharing partnership between enterprises and DHS, CISCP creates shared situational awareness across critical infrastructure communities, enhances cybersecurity collaboration between DHS and critical infrastructure owners and operators, and leverages government and industry subject matter expertise to collaboratively respond to cybersecurity incidents. For more information about CISCP, please email ciscp_coordination@hq.dhs.gov.

Enhanced Cybersecurity Services  (ECS)

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the Federal Government to gain access to a broad range of sensitive and classified cyber threat information. DHS shares this cyber threat information with qualified Commercial Service Providers to better protect critical infrastructure enterprises. More information is available at: http://dhs.gov/enhanced-cybersecurity-services.

DHS Academic Engagement

DHS maintains numerous relationships with members of the academic community and directly engages with school administrators, faculty, and students on a range of issues. DHS’s work to support the academic community has resulted in a variety of resources, tools, initiatives, and programs for students, faculty, and academic institutions. To learn more, visit http://dhs.gov/academic-engagement-overview.

Stop.Think.Connect.™ Campaign Academic Alliance

The Stop.Think.Connect.™ Campaign aims to empower Americans to reduce cyber risk online by incorporating safe habits into their online routines. The Stop.Think.Connect.™ Academic Alliance is a nationwide network of non-profit colleges and universities committed to promoting safer online practices. Through the Alliance, universities can connect with DHS and other government, non-profit, and academic partners, use Campaign resources, tools, and subject matter experts, and lead academia in cybersecurity awareness education. For more information on how to get involved with the Academic Alliance, visit http://dhs.gov/stopthinkconnect or email stopthinkconnect@dhs.gov.

National Initiative for Cybersecurity Education (NICE)

Various cybersecurity education and awareness initiatives fall under the umbrella of NICE. This includes the National Initiative for Cybersecurity Careers and Studies (NICCS) Portal, which provides a variety of resources for awareness, training, education, and career development for cybersecurity professionals and the general public. More information is available at: http://niccs.us-cert.gov/education/education-home.

National Initiative for Cybersecurity Careers and Studies (NICCS) Portal

The NICCS portal is the Nation’s one-stop-shop for cybersecurity careers and studies. It connects the public with information on cybersecurity awareness, degree programs, training, careers, and talent management. More information is available at: http://niccs.us-cert.gov.

Cybersecurity Workforce Planning Diagnostic

The Cybersecurity Workforce Planning Diagnostic tool, which was developed by NICE, introduces a qualitative management aid to help organizations identify the data they need to gather to execute effective cybersecurity workforce planning. By considering implications of specific organizational characteristics around two factors– risk exposure (as a function of mission cybersecurity dependence aligned to compliance standards) and risk tolerance– organizations will gain insight into what types of data they need to better plan for and manage their cybersecurity workforce. To learn more, visit: http://niccs.us-cert.gov/careers/cybersecurity-workforce-planning-diagnostic.

National Cybersecurity Workforce Framework

The National Cybersecurity Workforce Framework classifies the typical duties and skill requirements of cybersecurity workers. The Framework is meant to define professional requirements in cybersecurity, much as other professions, such as medicine and law, have done. The Framework organizes cybersecurity into seven high-level Categories, each comprised of several Specialty Areas. Within each Category you'll find a list of Specialty Areas, and clicking on a Specialty Area will reveal the details about that Area. Each Specialty Area detail displays the standard tasks and the knowledge, skills, and abilities needed to successfully complete those tasks. To learn more about the Framework, visit http://niccs.us-cert.gov/training/tc/framework/overview.

National Centers of Academic Excellence (CAE)

The National Security Agency (NSA) and DHS jointly sponsor the National Centers of Academic Excellence in Information Assurance (IA) Education (CAE/IAE), IA 2-year Education (CAE/2Y) and IA Research (CAE/R) programs. The goal of these programs is to reduce vulnerability in our national information infrastructure by promoting higher education and research in IA and producing a growing number of professionals with IA expertise in various disciplines. To learn more, visit http://www.nsa.gov/academia/nat_cae_cyber_ops/index.shtml.

EDUCAUSE Information Security Guide: Effective Practices and Solutions for Higher Education

The Information Security Guide: Effective Practices and Solutions for Higher Education (referred to as "the Guide") is a compendium of information providing guidance on effective approaches to information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council (formerly the Security Task Force). Its content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities.

The content itself is a rich combination of materials written for the Guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. Access the guide at: https://wiki.internet2.edu/confluence/display/itsg2/Home.

Higher Education Information Security Council (HEISC)

Established by EDUCAUSE and Internet2 in July 2000, the HEISC mission is to improve information security, data protection, and privacy programs across the higher education sector. HEISC executes its mission through working groups of volunteers and professional EDUCAUSE staff that coordinate activities and collaborate with partners from government, industry, and other academic organizations. Through the annual Security Professionals Conference and other EDUCAUSE conferences and websites, HEISC actively develops and promotes leadership; awareness and understanding; effective practices and policies; and solutions for the protection of critical data, IT assets, and infrastructures. For more information visit: http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-initiative/about.

Back to Top

Resources to Detect

Cybersecurity Information Sharing and Collaboration Program (CISCP)

A no-cost information sharing partnership between enterprises and DHS, CISCP creates shared situational awareness across critical infrastructure communities, enhances cybersecurity collaboration between DHS and critical infrastructure owners and operators, and leverages government and industry subject matter expertise to collaboratively respond to cybersecurity incidents. For more information about CISCP, please email ciscp_coordination@hq.dhs.gov.

Enhanced Cybersecurity Services  (ECS)

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the Federal Government to gain access to a broad range of sensitive and classified cyber threat information. DHS shares this cyber threat information with qualified Commercial Service Providers to better protect critical infrastructure enterprises. More information is available at: http://dhs.gov/enhanced-cybersecurity-services.

EDUCAUSE Information Security Guide: Effective Practices and Solutions for Higher Education

The Information Security Guide: Effective Practices and Solutions for Higher Education (referred to as "the Guide") is a compendium of information providing guidance on effective approaches to information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council (formerly the Security Task Force). Its content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities.

The content itself is a rich combination of materials written for the Guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. Access the guide at: https://wiki.internet2.edu/confluence/display/itsg2/Home.

Back to Top

Resources to Respond

Cybersecurity Information Sharing and Collaboration Program (CISCP)

A no-cost information sharing partnership between enterprises and DHS, CISCP creates shared situational awareness across critical infrastructure communities, enhances cybersecurity collaboration between DHS and critical infrastructure owners and operators, and leverages government and industry subject matter expertise to collaboratively respond to cybersecurity incidents. For more information about CISCP, please email ciscp_coordination@hq.dhs.gov.

Cyber Security Advisors (CSAs)

CSAs are regionally located DHS personnel who direct coordination, outreach, and regional support to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s critical infrastructure and SLTT governments. CSAs offer immediate and sustained assistance to prepare and protect SLTT and private entities. CSAs bolster the cybersecurity preparedness, risk mitigation, and incident response capabilities of these entities and bring them into closer coordination with the Federal Government. CSAs represent a front line approach and promote resilience of key cyber infrastructures throughout the U.S. and its territories. For more information about CSAs, please email cyberadvisor@hq.dhs.gov.

Protective Security Advisors (PSAs)

PSAs are trained critical infrastructure protection and vulnerability mitigation subject matter experts. Regional Directors are Supervisory PSAs, responsible for the activities of eight or more PSAs and geospatial analysts, who ensure all Office of Infrastructure Protection critical infrastructure protection programs and services are delivered to Federal and SLTT stakeholders and private sector owners and operators. The PSA program focuses on physical site security and resiliency assessments, planning and engagement, incident management assistance, and vulnerability and consequence information sharing. For more information about PSAs, visit: http://dhs.gov/protective-security-advisors.

Enhanced Cybersecurity Services (ECS)

ECS is a voluntary information sharing program that assists critical infrastructure owners and operators as they improve the protection of their systems from unauthorized access, exploitation, or data exfiltration. DHS works with cybersecurity organizations from across the Federal Government to gain access to a broad range of sensitive and classified cyber threat information. DHS shares this cyber threat information with qualified Commercial Service Providers to better protect critical infrastructure enterprises. More information is available at: http://dhs.gov/enhanced-cybersecurity-services.

Cyber Incident Response and Analysis

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) offers incident response services to critical infrastructure asset owners that are experiencing impacts from cyber attacks. Services include digital media and malware analysis, identification of the source of an incident, analyzing the extent of the compromise, and developing strategies for recovery and improving defenses. Incident response teams also provide concepts for improving intrusion detection capabilities and ways to eliminate vulnerabilities and minimize losses from a cyber attack. For more information or to request response services, email: ics-cert@hq.dhs.gov.

National Centers of Academic Excellence (CAE)

The National Security Agency (NSA) and DHS jointly sponsor the National Centers of Academic Excellence in Information Assurance (IA) Education (CAE/IAE), IA 2-year Education (CAE/2Y) and IA Research (CAE/R) programs. The goal of these programs is to reduce vulnerability in our national information infrastructure by promoting higher education and research in IA and producing a growing number of professionals with IA expertise in various disciplines. To learn more, visit http://nsa.gov/academia/nat_cae_cyber_ops/index.shtml.

EDUCAUSE Information Security Guide: Effective Practices and Solutions for Higher Education

The Information Security Guide: Effective Practices and Solutions for Higher Education (referred to as "the Guide") is a compendium of information providing guidance on effective approaches to information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council (formerly the Security Task Force). Its content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities.

The content itself is a rich combination of materials written for the Guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. Access the guide at: https://wiki.internet2.edu/confluence/display/itsg2/Home.

Back to Top

 

Back to Top