SlideShare a Scribd company logo
1 of 76
Dr. Rachel Levitch
Consultation: G Suite For Education
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 1
Dr. Rachel
Levitch
Specialization
PROFESSION &
SPECIALIZATION
DATA LOSS PREVENTION
CLOUD APPLICATION
SECURITY
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 2
CAREER
Privacy Engineer, Ph D. Specialization in
Learning Technologies and Performance Improvement
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 4
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
SAAS, PAAS, IAAS
Opportunity for Growth and Expansion of Network Load
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
SaaS
• Office365 Apps, Google Drive
Sync Applications, Google Cloud
Search, Google Docs, Google
Sheets, Google Sites, Google
Drawings, Google App Maker,
Google Groups, Classroom,
Google Voice, Google Chat,
Google Meet, Google Jamboard,
Google Hangout, Google Chrome
Browser, Google Cromebook,
Google Drive on the Web
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
PaaS
• Google App Engine. SaaS
product hosted and run all the
applications. Google Cloud
Platform for traffic growth and
continued protection.
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
IaaS
• full control of fine-grained settings.
(cpu-power, memory, hard-drive
capacity,...) and using them however
you like. You can install your own
operating system and fully customize
it however you want, but you also get
the benefit of automatic scaling and
load-balancing. Easy to just take your
own already-existing applications,
convert them to running on the cloud
and reap all benefits along the way!
• Google Container Engine
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
Compliance
Why wait until hacking, data leak, unsecure documentation exchange
and fines are an issue against your company's online reputation?
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
Regulation for Privacy, Protection and Auditing.
Compliance Models
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
State of Connecticut
Department of Education
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 31
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 70
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 71
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 72
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 73
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 74
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 75
Dr. Rachel Levitch
Consultation: G Suite For Education
???
???
???
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 76

More Related Content

What's hot

The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsDelphix
 
A Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product TestingA Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product TestingKevin Fealey
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAVeritas Technologies LLC
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
 
BSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit TrendsBSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit TrendsEd Bellis
 

What's hot (13)

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
A Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product TestingA Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product Testing
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
BSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit TrendsBSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit Trends
 

Similar to Dr levitich Consult G Suite for Education

Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierJoe Hage
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?Albert Hoitingh
 
World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?Angie Clark
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022Radu Vunvulea
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard APAC
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopDenodo
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSAmazon Web Services
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_securityDoina Draganescu
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science WorkbenchNOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science WorkbenchNOVA DATASCIENCE
 

Similar to Dr levitich Consult G Suite for Education (20)

Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
briefing
briefingbriefing
briefing
 
World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science WorkbenchNOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Dr levitich Consult G Suite for Education

  • 1. Dr. Rachel Levitch Consultation: G Suite For Education Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 1
  • 2. Dr. Rachel Levitch Specialization PROFESSION & SPECIALIZATION DATA LOSS PREVENTION CLOUD APPLICATION SECURITY Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 2
  • 3. CAREER Privacy Engineer, Ph D. Specialization in Learning Technologies and Performance Improvement Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
  • 4. Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 4
  • 5. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
  • 6. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
  • 7. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
  • 8. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • a blend of security • visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
  • 9. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
  • 10. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
  • 11. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • a blend of security • visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
  • 12. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
  • 13. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
  • 14. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
  • 15. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
  • 16. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
  • 17. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
  • 18. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
  • 19. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
  • 20. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
  • 21. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
  • 22. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
  • 23. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
  • 24. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
  • 25. SAAS, PAAS, IAAS Opportunity for Growth and Expansion of Network Load Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
  • 26. SaaS • Office365 Apps, Google Drive Sync Applications, Google Cloud Search, Google Docs, Google Sheets, Google Sites, Google Drawings, Google App Maker, Google Groups, Classroom, Google Voice, Google Chat, Google Meet, Google Jamboard, Google Hangout, Google Chrome Browser, Google Cromebook, Google Drive on the Web Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
  • 27. PaaS • Google App Engine. SaaS product hosted and run all the applications. Google Cloud Platform for traffic growth and continued protection. Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
  • 28. IaaS • full control of fine-grained settings. (cpu-power, memory, hard-drive capacity,...) and using them however you like. You can install your own operating system and fully customize it however you want, but you also get the benefit of automatic scaling and load-balancing. Easy to just take your own already-existing applications, convert them to running on the cloud and reap all benefits along the way! • Google Container Engine Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
  • 29. Compliance Why wait until hacking, data leak, unsecure documentation exchange and fines are an issue against your company's online reputation? Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
  • 30. Regulation for Privacy, Protection and Auditing. Compliance Models Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
  • 31. State of Connecticut Department of Education Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 31
  • 32. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
  • 33. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
  • 34. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
  • 35. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
  • 36. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
  • 37. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
  • 38. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
  • 39. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
  • 40. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
  • 41. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
  • 42. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
  • 43. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
  • 44. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
  • 45. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
  • 46. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
  • 47. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
  • 48. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
  • 49. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
  • 50. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
  • 51. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
  • 52. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
  • 53. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
  • 54. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
  • 55. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
  • 56. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
  • 57. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
  • 58. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
  • 59. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
  • 60. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
  • 61. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
  • 62. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
  • 63. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
  • 64. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
  • 65. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
  • 66. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
  • 67. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
  • 68. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
  • 69. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
  • 70. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 70
  • 71. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 71
  • 72. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 72
  • 73. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 73
  • 74. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 74
  • 75. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 75
  • 76. Dr. Rachel Levitch Consultation: G Suite For Education ??? ??? ??? Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 76

Editor's Notes

  1. Dr. Levitch: Specialization for G Suite Education https://rachellevitch.com Privacy Engineering Chief Information Security Governance Executive Board Presenter Compliance Models Training and Education Auditing/Risk