Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardians, and staff.
3. CAREER
Privacy Engineer, Ph D. Specialization in
Learning Technologies and Performance Improvement
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
5. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
6. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
7. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
8. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
9. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
10. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
11. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
12. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
13. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
14. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
15. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
16. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
17. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
18. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
19. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
20. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
21. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
22. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
23. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
24. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
25. SAAS, PAAS, IAAS
Opportunity for Growth and Expansion of Network Load
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
26. SaaS
• Office365 Apps, Google Drive
Sync Applications, Google Cloud
Search, Google Docs, Google
Sheets, Google Sites, Google
Drawings, Google App Maker,
Google Groups, Classroom,
Google Voice, Google Chat,
Google Meet, Google Jamboard,
Google Hangout, Google Chrome
Browser, Google Cromebook,
Google Drive on the Web
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
27. PaaS
• Google App Engine. SaaS
product hosted and run all the
applications. Google Cloud
Platform for traffic growth and
continued protection.
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
28. IaaS
• full control of fine-grained settings.
(cpu-power, memory, hard-drive
capacity,...) and using them however
you like. You can install your own
operating system and fully customize
it however you want, but you also get
the benefit of automatic scaling and
load-balancing. Easy to just take your
own already-existing applications,
convert them to running on the cloud
and reap all benefits along the way!
• Google Container Engine
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
29. Compliance
Why wait until hacking, data leak, unsecure documentation exchange
and fines are an issue against your company's online reputation?
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
30. Regulation for Privacy, Protection and Auditing.
Compliance Models
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
32. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
33. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
34. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
35. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
36. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
37. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
38. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
39. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
40. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
41. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
42. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
43. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
44. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
45. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
46. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
47. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
48. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
49. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
50. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
51. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
52. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
53. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
54. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
55. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
56. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
57. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
58. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
59. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
60. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
61. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
62. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
63. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
64. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
65. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
66. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
67. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
68. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
69. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
Dr. Levitch: Specialization for G Suite Education
https://rachellevitch.com
Privacy Engineering
Chief Information Security
Governance
Executive Board Presenter
Compliance Models
Training and Education
Auditing/Risk