SlideShare a Scribd company logo
1 of 7
#NBOA2018 www.NBOAAnnualMeeting.org 1
8:45 – 10:00 am
10:30 – 11:45 am
2:30 – 3:30 pm
Predictive Analytics for
Schools: Technology
Efficacy and Impact
Information Security,
Compliance &
Coverage for
Independent Schools
Cyber-Risk Management
Best Practices for
Independent Schools
Mobile Crisis
Management: Using
Technology to Keep
Everyone Safe
8:45 – 10:00 am
10:30 – 11:45 am
Leveraging Technology
Leadership Through
Partner Relationships
Mitigating Your School's
Digital Risk
Marketing & Technology
Efficiencies to Increase
Community Engagemen
Demystifying PCI
Compliance
Information Technology Track
#NBOA2018 www.NBOAAnnualMeeting.org 2
Predictive Analytics for Schools:
Technology Efficacy and Impact
Tuesday, March 6 | 8:45 am – 10 am
In the past year, members of the Association of Technology Leaders in
Independent Schools (ATLIS) designed and implemented an assessment to
analyze the impact and efficacy of the management of technology programs
from a whole school perspective. They applied augmented intelligence via a
digital decision-making platform and were able to identify the key factors to
success in schools with high scores (program highly aligned with mission).
Learn top takeaways in the areas of academic impact, school operations and
data security.
Sarah Hanawald,
Executive Director, ATLIS
Alex Inman,
President, Educational
Collaborators
William Stites,
Director of Technology,
Montclair Kimberley
Academy
#NBOA2018 www.NBOAAnnualMeeting.org 3
Information Security, Compliance
& Coverage for Independent
SchoolsTuesday, March 6 | 10:30 am – 11:45 am
In recent years there has been an explosive
growth in the amount of data created,
transmitted and stored. Many federal and
state laws impose obligations regarding the
storage and transmission of personal data.
Discover the dangers data storage can pose
for independent schools and review laws
governing privacy and data security.
Examine the steps to mitigate risks and
understand how to best respond in the event
of a data-security breach.
Lisa Braiterman,
Chief Financial & Operations
Officer, Brewster Academy
Jeff Olsen,
Senior Vice President, Fred
C. Church, Inc.
Cameron Shilling,
Director and Chair, Privacy and
Data Security Group, McLane
Middleton, P.A.
#NBOA2018 www.NBOAAnnualMeeting.org 4
Cyber-Risk Management Best
Practices for Independent
SchoolsTuesday, March 6 | 2:30 pm – 3:30 pm
Cyber security is a critical component to risk
management strategies in the independent school
community. With a variety of diverse user profiles
traversing the network, it is increasingly difficult for
business officers and IT managers to secure their
sensitive data. Understand the unique cyber security
threats to independent schools and discover best-
practice tips on securing your school's data and
developing a cyber-risk management strategy. Delve
into such top threats as ransomware/malware,
phishing and compromised business-email attacks.
Find out how to mitigate your risk of a breach.
Robert Olsen, CEO,
COMPASS Cyber Security
Tye Campbell,
Director of Technology,
Gilman School
#NBOA2018 www.NBOAAnnualMeeting.org 5
Mobile Crisis Management: Using
Technology to Keep Everyone Safe
Tuesday, March 6 | 2:30 pm –
3:30 pmYour top priority is the safety of your students, faculty
and staff. You may feel that your current crisis plans are
adequate, but it's important to be aware of the problems
that may arise from purely analog communication
systems. Binder-based plan documents can be useful for
training purposes, but in the event of an actual
emergency, when time is the most precious resource, do
all staff and faculty have access to the binder, poster or
emergency flip chart? Learn how to utilize the
technology that students, faculty and staff carry with
them on a daily basis to help keep everyone safe.
David Marcus,
Campus Business Manager,
de Toledo High School
Nick Mirisis,
VP of Marketing, SchoolDude
#NBOA2018 www.NBOAAnnualMeeting.org 6
Leveraging Technology
Leadership Through Partner
RelationshipsWednesday, March 7 | 8:45 am – 10 am
School administrators often struggle with the
question of which IT functions should be kept in-
house and which should be outsourced. With the
right technology leadership, a balance can be
achieved between outsourcing certain areas and
developing partnerships that blend internal and
external resources. Learn how one school
balanced the outsourcing of its commodity IT
while creating a partnership that leveraged
external expertise and maintained a focus on
educational technology and relationships. Marc Buonocore,
President and Co-
Founder, Eclipse
Integrated Systems
Alex Podchaski, Director
of Technology, Oak Knoll
School of the Holy Child
#NBOA2018 www.NBOAAnnualMeeting.org 7
Mitigating Your
School's Digital Risk
Information Technology
GoldminesWednesday, March 7 | 10:30 am – 11:45 am
Marketing &
Technology Efficiencies
to Increase Community
Engagement
Demystifying PCI
Compliance
For independent schools and their finance
teams, reputation is everything. However,
more and more schools are facing cyber
security threats due to the absences of
clear internal-controls policies, as well as
the implementation of open-source
software and the use of insecure online
payment processors. The risk is high, yet
many school administrators don't know
where to start when it comes to reducing
their risk and ensuring the security of
their information and that of their donors.
Examine the cyber security landscape
facing private education and review
practical steps you can take to mitigate
digital threats to your donor information,
financial records and reputation.
School marketing and communication budgets
are tight. How can school administrators
communicate and market their schools cost
effectively and efficiently? Learn how one
school increased parent engagement by
reviewing marketing strategies and employing
technology. Review opportunities to improve
community relations and discover the specific
ways software and technology have helped
make marketing and communications efficient
and effective.
PCI compliance is a constant concern for
organizations of all sizes. Discover what
PCI compliance means for your school and
how to best approach requirements.
John Linton, Vice
President of Sales &
Operations,
Blackbaud
Rachel Welsh,
Director of Data
Operations and
Digital Strategy,
The Shipley School
Patricia Surin,
Director of
Operations,
Diamond Mind
Dean Quiambao,
Partner, Armanino
LLP

More Related Content

What's hot

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Secure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeSecure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeUnify
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarClaudia Warwar
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied TechnologyKarlyseRahming
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Enhance Systems Pvt. Ltd.
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety InfographicuKnow.com
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksMark D. Webster, Ph.D.
 
Nominet Trust Lunchtime Briefing
Nominet Trust Lunchtime BriefingNominet Trust Lunchtime Briefing
Nominet Trust Lunchtime BriefingDannno
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsBitglass
 

What's hot (19)

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
Security economics
Security economicsSecurity economics
Security economics
 
Secure your network to secure your reputation and your income
Secure your network to secure your reputation and your incomeSecure your network to secure your reputation and your income
Secure your network to secure your reputation and your income
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Online Safety Index for Parents
Online Safety Index for ParentsOnline Safety Index for Parents
Online Safety Index for Parents
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
Cyber security brochure(1)
Cyber security brochure(1)Cyber security brochure(1)
Cyber security brochure(1)
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
Nominet Trust Lunchtime Briefing
Nominet Trust Lunchtime BriefingNominet Trust Lunchtime Briefing
Nominet Trust Lunchtime Briefing
 
Technology specialist
Technology specialistTechnology specialist
Technology specialist
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 

Similar to 2018 NBOA Annual Meeting Information Technology Track

AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docxArindamGhosal6
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...Bloxx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risksijtsrd
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 IssuePatrick Spencer
 

Similar to 2018 NBOA Annual Meeting Information Technology Track (20)

AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 

More from National Business Officers Association (NBOA) (9)

2016 Business Officer Institute Onsite Program
2016 Business Officer Institute Onsite Program2016 Business Officer Institute Onsite Program
2016 Business Officer Institute Onsite Program
 
NBOA 2017: Business Operations Track
NBOA 2017: Business Operations TrackNBOA 2017: Business Operations Track
NBOA 2017: Business Operations Track
 
Business Office NOW Philadelphia
Business Office NOW PhiladelphiaBusiness Office NOW Philadelphia
Business Office NOW Philadelphia
 
2016 National Business Officers Association (NBOA) Annual Meeting Facilities ...
2016 National Business Officers Association (NBOA) Annual Meeting Facilities ...2016 National Business Officers Association (NBOA) Annual Meeting Facilities ...
2016 National Business Officers Association (NBOA) Annual Meeting Facilities ...
 
2016 National Business Officers Association (NBOA) Annual Meeting Accounting ...
2016 National Business Officers Association (NBOA) Annual Meeting Accounting ...2016 National Business Officers Association (NBOA) Annual Meeting Accounting ...
2016 National Business Officers Association (NBOA) Annual Meeting Accounting ...
 
Redefining the Library of the Future
Redefining the Library of the FutureRedefining the Library of the Future
Redefining the Library of the Future
 
After School with Cheryl Hammond Hopewell
After School with Cheryl Hammond HopewellAfter School with Cheryl Hammond Hopewell
After School with Cheryl Hammond Hopewell
 
Intro to the 2015 nboa financial position survey
Intro to the 2015 nboa financial position surveyIntro to the 2015 nboa financial position survey
Intro to the 2015 nboa financial position survey
 
The Inclusive School: Navigating Sexuality and Gender Diversity Issues on Campus
The Inclusive School: Navigating Sexuality and Gender Diversity Issues on CampusThe Inclusive School: Navigating Sexuality and Gender Diversity Issues on Campus
The Inclusive School: Navigating Sexuality and Gender Diversity Issues on Campus
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

2018 NBOA Annual Meeting Information Technology Track

  • 1. #NBOA2018 www.NBOAAnnualMeeting.org 1 8:45 – 10:00 am 10:30 – 11:45 am 2:30 – 3:30 pm Predictive Analytics for Schools: Technology Efficacy and Impact Information Security, Compliance & Coverage for Independent Schools Cyber-Risk Management Best Practices for Independent Schools Mobile Crisis Management: Using Technology to Keep Everyone Safe 8:45 – 10:00 am 10:30 – 11:45 am Leveraging Technology Leadership Through Partner Relationships Mitigating Your School's Digital Risk Marketing & Technology Efficiencies to Increase Community Engagemen Demystifying PCI Compliance Information Technology Track
  • 2. #NBOA2018 www.NBOAAnnualMeeting.org 2 Predictive Analytics for Schools: Technology Efficacy and Impact Tuesday, March 6 | 8:45 am – 10 am In the past year, members of the Association of Technology Leaders in Independent Schools (ATLIS) designed and implemented an assessment to analyze the impact and efficacy of the management of technology programs from a whole school perspective. They applied augmented intelligence via a digital decision-making platform and were able to identify the key factors to success in schools with high scores (program highly aligned with mission). Learn top takeaways in the areas of academic impact, school operations and data security. Sarah Hanawald, Executive Director, ATLIS Alex Inman, President, Educational Collaborators William Stites, Director of Technology, Montclair Kimberley Academy
  • 3. #NBOA2018 www.NBOAAnnualMeeting.org 3 Information Security, Compliance & Coverage for Independent SchoolsTuesday, March 6 | 10:30 am – 11:45 am In recent years there has been an explosive growth in the amount of data created, transmitted and stored. Many federal and state laws impose obligations regarding the storage and transmission of personal data. Discover the dangers data storage can pose for independent schools and review laws governing privacy and data security. Examine the steps to mitigate risks and understand how to best respond in the event of a data-security breach. Lisa Braiterman, Chief Financial & Operations Officer, Brewster Academy Jeff Olsen, Senior Vice President, Fred C. Church, Inc. Cameron Shilling, Director and Chair, Privacy and Data Security Group, McLane Middleton, P.A.
  • 4. #NBOA2018 www.NBOAAnnualMeeting.org 4 Cyber-Risk Management Best Practices for Independent SchoolsTuesday, March 6 | 2:30 pm – 3:30 pm Cyber security is a critical component to risk management strategies in the independent school community. With a variety of diverse user profiles traversing the network, it is increasingly difficult for business officers and IT managers to secure their sensitive data. Understand the unique cyber security threats to independent schools and discover best- practice tips on securing your school's data and developing a cyber-risk management strategy. Delve into such top threats as ransomware/malware, phishing and compromised business-email attacks. Find out how to mitigate your risk of a breach. Robert Olsen, CEO, COMPASS Cyber Security Tye Campbell, Director of Technology, Gilman School
  • 5. #NBOA2018 www.NBOAAnnualMeeting.org 5 Mobile Crisis Management: Using Technology to Keep Everyone Safe Tuesday, March 6 | 2:30 pm – 3:30 pmYour top priority is the safety of your students, faculty and staff. You may feel that your current crisis plans are adequate, but it's important to be aware of the problems that may arise from purely analog communication systems. Binder-based plan documents can be useful for training purposes, but in the event of an actual emergency, when time is the most precious resource, do all staff and faculty have access to the binder, poster or emergency flip chart? Learn how to utilize the technology that students, faculty and staff carry with them on a daily basis to help keep everyone safe. David Marcus, Campus Business Manager, de Toledo High School Nick Mirisis, VP of Marketing, SchoolDude
  • 6. #NBOA2018 www.NBOAAnnualMeeting.org 6 Leveraging Technology Leadership Through Partner RelationshipsWednesday, March 7 | 8:45 am – 10 am School administrators often struggle with the question of which IT functions should be kept in- house and which should be outsourced. With the right technology leadership, a balance can be achieved between outsourcing certain areas and developing partnerships that blend internal and external resources. Learn how one school balanced the outsourcing of its commodity IT while creating a partnership that leveraged external expertise and maintained a focus on educational technology and relationships. Marc Buonocore, President and Co- Founder, Eclipse Integrated Systems Alex Podchaski, Director of Technology, Oak Knoll School of the Holy Child
  • 7. #NBOA2018 www.NBOAAnnualMeeting.org 7 Mitigating Your School's Digital Risk Information Technology GoldminesWednesday, March 7 | 10:30 am – 11:45 am Marketing & Technology Efficiencies to Increase Community Engagement Demystifying PCI Compliance For independent schools and their finance teams, reputation is everything. However, more and more schools are facing cyber security threats due to the absences of clear internal-controls policies, as well as the implementation of open-source software and the use of insecure online payment processors. The risk is high, yet many school administrators don't know where to start when it comes to reducing their risk and ensuring the security of their information and that of their donors. Examine the cyber security landscape facing private education and review practical steps you can take to mitigate digital threats to your donor information, financial records and reputation. School marketing and communication budgets are tight. How can school administrators communicate and market their schools cost effectively and efficiently? Learn how one school increased parent engagement by reviewing marketing strategies and employing technology. Review opportunities to improve community relations and discover the specific ways software and technology have helped make marketing and communications efficient and effective. PCI compliance is a constant concern for organizations of all sizes. Discover what PCI compliance means for your school and how to best approach requirements. John Linton, Vice President of Sales & Operations, Blackbaud Rachel Welsh, Director of Data Operations and Digital Strategy, The Shipley School Patricia Surin, Director of Operations, Diamond Mind Dean Quiambao, Partner, Armanino LLP