Higher Ed Information Security Council Contest Seeks Student Videos

Malware dressed like ninjas; a talking computer that warns its owner not to walk away, leaving it behind; a lone guy in a cavernous room using social engineering by phone to obtain private information from an unsuspecting student. These are the topics of a few of last year's winners in a video competition hosted by the EDUCAUSE & Internet2 Higher Education Information Security Council (HEISC). The latest contest was announced as part of October's National Cyber Security Awareness Month (NCSAM), an event promoted by Homeland Security and intended to draw attention to information security, data protection, and privacy programs.

EDUCAUSE is a higher education IT community, and Internet2 is a consortium of universities working with government and private industry entities on advanced networking technologies.

The contest seeks videos two minutes or less, 30-second public service announcements, or posters developed by college students to inform other students about safe computing practices.

The top three winners in each category will receive cash prizes--$2,000 for the top video and the top announcement and $1,500 for the top poster. The winners will also be featured on the HEISC Web site and may be used in campus security awareness campaigns.

The deadline for entries is March 8, 2013. Rules are available at educause.edu and last year's winners may be viewed on YouTube, Facebook, and Pinterest.

HEISC was formed in 2000 specifically to address the common security ailments of the higher education sector. The latest priorities focus on bring-your-own-device programs and cloud computing. The NCSAM website includes an online resource kit with templates, checklists, guidelines, training materials, and other tools contributed by Educause member universities and colleges.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • glowing digital brain above a chessboard with data charts and flowcharts

    Why AI Strategy Matters (and Why Not Having One Is Risky)

    If your institution hasn't started developing an AI strategy, you are likely putting yourself and your stakeholders at risk, particularly when it comes to ethical use, responsible pedagogical and data practices, and innovative exploration.

  • abstract pattern of cybersecurity, ai and cloud imagery

    OpenAI Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • abstract AI pattern

    Meta Forms 'Superintelligence Group' to Pursue Artificial General Intelligence

    Meta CEO Mark Zuckerberg is assembling a new team focused on achieving artificial general intelligence (AGI), amid internal dissatisfaction with the performance of its current AI offerings. The team, known internally as the superintelligence group, is part of a broader effort to enhance Meta’s AI capabilities.

  • Jasper Halekas, instrument lead for the Analyzer for Cusp Electrons (ACE), checks final calibration. ACE was designed and built at the University of Iowa for the TRACERS mission.

    TRACERS: The University of Iowa Leads NASA-Funded Space Weather Research with Twin Satellites

    Working in tandem, the recently launched TRACERS satellites enable new measurement strategies that will produce significant data for the study of space weather. And as lead institution for the mission, the University of Iowa upholds its long-held value of bringing research collaborations together with academics.