RESOURCES
Learn, protect, and stay informed
Explore cybersecurity and privacy resources from the Clearinghouse and industry experts designed to help you understand risks, adopt best practices, and make informed decisions.
RESOURCES
Learn, protect, and stay informed
Explore cybersecurity and privacy resources from the Clearinghouse and industry experts designed to help you understand risks, adopt best practices, and make informed decisions.
Clearinghouse Resources
Watch our on-demand webinars
SOC Report
Through its SOC2 Type 2 report and publicly available through its SOC3 report, the Clearinghouse demonstrates how it meets the controls related to the Trust Services Criteria, as defined by the American Institute of Certified Public Accountants (AICPA): security, availability, processing integrity, and confidentiality.
Privacy & Security from our blog
Cybersecurity at the Clearinghouse: A Look Back at 2025
The National Student Clearinghouse Office of Cybersecurity was named a Top 50 Information Security Team for the second consecutive year. This recognition highlights their dedication to maintaining the highest cybersecurity standards — and is among their key wins in 2025.
Building a Cyber-Ready Campus
Institutions face increasing cybersecurity threats, like ransomware and data breaches, requiring a culture of cyber readiness that emphasizes people and habits alongside technology. In our webinar, “The Cyber Ready Campus: Empowering Higher Ed Staff for Digital Defense,” a panel of cybersecurity experts highlighted practical strategies to empower higher education staff in defending digital assets.
Don’t Get Spooked by a Third-Party Vendor
Working with a third-party vendor is a strategic decision that significantly impacts your organization’s data security. There are five critical security areas to address before signing a contract that will help you manage third-party risk and protect sensitive information.
Addressing Credential Fraud in Higher Education
In a recent webinar, higher education and security professionals unpacked the evolving issue of credential fraud. They talked about real world examples and identified ways to combat it, such as using verification services at the Clearinghouse.
Industry Resources
Send a subscription request from a valid .edu email address to m365-sec-join@lists.ren-isac.net. This group is open to higher education professionals. You do not need to be a member of REN-ISAC to participate.
