SlideShare a Scribd company logo
Cybersecurity - Strategy, Policy, and Practice:
A K-12 Cross Organizational Imperative
Panel discussion participants:
▪ Dr. Greg Ottinger
▪ Richard Quinones
▪ Lenny Schad
▪ Marlon Shears
Panel moderated by: Dr. Julie A. Evans, CEO, Project Tomorrow
Our discussion today:
▪ Let’s get real about the leadership disconnects in K-12 districts
about cybersecurity awareness and preparations
▪ Selected findings from the new Project Tomorrow – iboss
report on K-12 cybersecurity
▪ Experiential insights and wisdom from our panel of district
leaders and national thought leaders
▪ Additional resources for you!
Meet our panel of national thought leaders
▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD
▪ Richard Quinones, Senior Vice President, Business Development
Strategist/Thought Leadership, iboss
▪ Lenny Schad, Chief Information and Innovation Officer, District
Administration
▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth
Independent SD
“Increasing the security posture within a school
district necessitates deliberate education of
executive leadership so that a common cultural
understanding about the importance of
cybersecurity is adopted across the organization.”
District Technology Leader
Addressing the Leadership Disconnects on Cybersecurity
2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
About the new research study:
o Part of the larger Speak Up Research Project
o Continuation of a focus on cybersecurity issues since 2017
o Impact of pandemic: increased dependence on technology + increased threat
environment required a deeper examination of the current attitudes and actions
o Call for feedback from K-12 district administrators and technology leaders in
January – May 2021
o 599 respondents from a diverse set of schools and districts nationwide
o Longstanding partnership with iboss
2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
Creating a Common Culture of
Action Around Cybersecurity
Results from the 2021 Project
Tomorrow – iboss National K-12
Education Cybersecurity Report
Pre-release of the new national report: special opportunity for you!
https://tomorrow.org/speakup/pdfs/Creating-a-Common-
Culture-of-Action-Around-Cybersecurity.pdf
Many thanks for you continued support!
▪ Internet security and web filtering delivered in the
cloud with the largest cloud offering for schools
▪ The leader in K-12 internet security
▪ Currently securing the largest schools, consortiums
and state networks, including:
▪ Chicago Public Schools
▪ Boston Public Schools
▪ Houston ISD, Dallas ISD, Austin ISD, El Paso ISD,
▪ Connecticut Education Network, Utah Education
Network, etc.
▪ Millions of Windows, Apple and Chromebook devices
Secured
8
Students are the new network perimeter. Mobility,
cloud SaaS application use and exponentially
increasing bandwidth make appliance-based
internet security and web filtering strategies
unsustainable.
A shift to cloud-based internet security is no longer
optional and is a requirement to enable digital
learning in the cloud-first future.
About iboss
Industry Recognized as a Leader
For K-12
The Most Trusted Name in EDU Cybersecurity.
Trusted to Secure
Millions of Students
Trusted Partner –
Across the Most
State Contracts
Unsurpassed Scalability
and Innovation
▪ Secure more large schools than
any other EDU focused solution
▪ Proven deployments with over
1 million devices and 40+ Gbps
▪ More integration flexibility than
any other solution
▪ Backed by more patents than
any other EDU focused solution
Copyright © 2021 | iboss. All Rights Reserved.
About the Speak Up Research efforts
▪ To learn more about Speak Up
▪ To get a copy of today’s presentation
▪ To get a copy of the new report and
infographic
Please add your name and contact info to
our print sign in sheets or on this online
form.
2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
Three key insights from the research
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
Insights from the new national report
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
We experienced a cyber event almost 2 years
ago that shut us down. As a district we all
went through the process of recovery
together. We have full support of our Cabinet
and Superintendent when it comes to keeping
our network and student data safe.
District Technology Leader
Insights from the new national report
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
What is your current level of concern regarding a potential cyber attack in your district?
13%
39%
46%
21%
44%
22%
Low concern
Moderate concern
High concern
District Administrators Technology Leaders
A successful cybersecurity strategy must be cross organizational
Who: All Executives and Board
IT, Operations, Facilities, Finance, Legal, Superintendent, Communications, Board
What: Proactive and Reactive
Planning, Preparation, and Incident Response
How:
Identify risk, communicate the facts, build consensus through partnership
What is job #1 to create an
effective cybersecurity strategy?
Panel discussion
Insights from the new national report
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
This is what has worked in our district.
Educate: Build awareness in users of their role
in managing risks. Mitigate: Implement robust
systems to protect data and networks.
Investigate: Provide tools to monitor and
determine system breaches.
District Technology Leader
Insights from the new national report
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
Are IT department staffing levels adequate to support cybersecurity?
Nearly 6 in 10 technology leaders say that their current staffing
for cybersecurity is not adequate to meet the needs of their district
to protect information assets and resources.
Need to look in the mirror to evaluate our
current preparation state for effective
cybersecurity
Develop and execute a comprehensive assessment of operational vulnerabilities
Conduct Districtwide Risk Assessment
PEN Testing
Formal Remediation
Strategy/Plan
Financial Forecasting
Staffing
Consult Outside Experts
Legal
Technical
Communication
Board
Superintendent
Cabinet
IT Department
Panel discussion
Insights from the new national report
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
To address these issues, we need sustainability in
the funding for cybersecurity. When budgets are
squeezed, operational costs like cybersecurity are
the first to be hit. Additionally, district leaders need
to enthusiastically embrace and model good
cybersecurity habits and support the technology
leaders in setting expectations for staff. It cannot
just be the technology departments' problem.
District Technology Leader
Insights from the new national report
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
24%
24%
18%
47%
Anticipated budget increase in 2021-22
Anticipated no change in 2021-22 budget
Budget increased in 2020-21
No change in the 2020-21 budget
Do our district budgets for cybersecurity reflect the reality of the situation?
How to close the
information and urgency
gap in our district
cybersecurity outlook
Creating a common culture of action around cybersecurity requires a proactive
approach by all leaders
Incident response planning
Cross-organizational cybersecurity committees
Training - IT and all district employees
Consistent transparency and communications
Education of the executive leadership
Commitment to “walk the talk”
Panel discussion
National Call to Action for Greater
Awareness and Action on K-12 Cybersecurity
To develop a common language and shared cross-organizational
culture within districts:
1. Why should cybersecurity be a district wide imperative?
2. How do build a shared culture around cybersecurity?
3. What are the best practices to support a healthy cybersecurity
posture within our districts?
National Call to Action for Greater
Awareness and Action on K-12 Cybersecurity
Planned activities for 2022 (more to follow):
▪ Discussions, sessions and events at several national conferences
▪ Thought leader articles and blog posts in key publications
▪ Direct support for K-12 district leadership teams
▪ Recommendations on best practices
▪ 2nd annual Project Tomorrow – iboss National K-12 Education
Cybersecurity Research Study (February – May 2022)
Speak Up reports, infographics, briefings and data
insights for schools and districts www.tomorrow.org
https://tomorrow.org/speakup/pdfs/Creating-a-Common-
Culture-of-Action-Around-Cybersecurity.pdf
iboss Online K-12 Streaming Resources
www.gotostage.com/channel/ibossEDU
Boston Public Schools
Early data/analytics allowed BPS to
identify and locate missing students
Carlsbad Unified School District
Leveraged Chromebook posture to advance
1:1 student learning across all grade levels
Lexington School District
Implemented CIPA compliant device take home
initiatives to leverage a direct to cloud security strategy
Charleston County Schools
Modernized IT Infrastructure to support mobile devices
District Exchange Webinar Series
About the Speak Up Research efforts
▪ To learn more about Speak Up
▪ To get a copy of today’s presentation
▪ To get a copy of the new report and
infographic
Please add your name and contact info to
our print sign in sheets or on this online
form.
Thank you for joining us today!
Let’s continue this conversation.
▪ Dr. Julie A. Evans, Chief Executive Officer, Project Tomorrow
▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD
▪ Richard Quinones, Senior Vice President, Business Development
Strategist/Thought Leadership, iboss
▪ Lenny Schad, Chief Information and Innovation Officer, District
Administration
▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth
Independent SD
For more information, please contact:
Dr. Julie A. Evans
Chief Executive Officer, Project Tomorrow
@JulieEvans_PT
jevans@tomorrow.org
949-609-4660 voice

More Related Content

What's hot

COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.ppt
Emmacuet
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
Neha Agarwal
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
Arul Nambi
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
Niloufer Tamboly
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
Monica Kambala
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecturepcherukumalla
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 

What's hot (20)

COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.ppt
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Database security
Database securityDatabase security
Database security
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Cobit
CobitCobit
Cobit
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Information Security
Information SecurityInformation Security
Information Security
 

Similar to Cybersecurity - Strategy, Policy and Practice

Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
Julie Evans
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 Cybersecurity
Julie Evans
 
1674749167063.pdf
1674749167063.pdf1674749167063.pdf
1674749167063.pdf
Alemayehu
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
sri_ias
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
Cisco Enterprise Networks
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
ucisa
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Silvia Cardona
 
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
JISC RSC Eastern
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
Christofer Felix
 
Creating Mobile Experience
Creating Mobile ExperienceCreating Mobile Experience
Creating Mobile Experience
Cisco Middle East
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
Dawn Yankeelov
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
Scientia Groups
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
meetsolanki44
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 

Similar to Cybersecurity - Strategy, Policy and Practice (20)

Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
Getting Real About K-12 Cybersecurity
Getting Real About K-12 CybersecurityGetting Real About K-12 Cybersecurity
Getting Real About K-12 Cybersecurity
 
1674749167063.pdf
1674749167063.pdf1674749167063.pdf
1674749167063.pdf
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
National Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdfNational Cyber Security Strategy 2020 DSCI submission.pdf
National Cyber Security Strategy 2020 DSCI submission.pdf
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
 
Creating Mobile Experience
Creating Mobile ExperienceCreating Mobile Experience
Creating Mobile Experience
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber Readiness Index 2.0
Cyber Readiness Index 2.0Cyber Readiness Index 2.0
Cyber Readiness Index 2.0
 

More from Julie Evans

Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdfReading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
Julie Evans
 
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
Julie Evans
 
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
Julie Evans
 
Designing a Better School Learning Impact 2022-Part 2
Designing a Better School Learning Impact 2022-Part 2Designing a Better School Learning Impact 2022-Part 2
Designing a Better School Learning Impact 2022-Part 2
Julie Evans
 
Defining Student Engagement Learning Impact 2022-Part 1
Defining Student Engagement Learning Impact 2022-Part 1Defining Student Engagement Learning Impact 2022-Part 1
Defining Student Engagement Learning Impact 2022-Part 1
Julie Evans
 
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder FeedbackConnecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
Julie Evans
 
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder FeedbackConnecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
Julie Evans
 
Are You As Smart As A 6th Grader About Digital Learning?
Are You As Smart As A 6th Grader About Digital Learning?Are You As Smart As A 6th Grader About Digital Learning?
Are You As Smart As A 6th Grader About Digital Learning?
Julie Evans
 
Five Year Study Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
Five Year Study  Preparing KentuckyTeachers for Mobile Anytime Anywhere LearningFive Year Study  Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
Five Year Study Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
Julie Evans
 
Building Teacher Competency, Confidence and Comfort
Building Teacher Competency, Confidence and ComfortBuilding Teacher Competency, Confidence and Comfort
Building Teacher Competency, Confidence and Comfort
Julie Evans
 
Connecting the Dots Between Equity and Communications
Connecting the Dots Between Equity and CommunicationsConnecting the Dots Between Equity and Communications
Connecting the Dots Between Equity and Communications
Julie Evans
 
Leading Towards Equity & Student Agency
Leading Towards Equity & Student AgencyLeading Towards Equity & Student Agency
Leading Towards Equity & Student Agency
Julie Evans
 
FETC 2022 10 Questions Workshop
FETC 2022 10 Questions WorkshopFETC 2022 10 Questions Workshop
FETC 2022 10 Questions Workshop
Julie Evans
 
Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022 Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022
Julie Evans
 
Fetc 2022 10 Questions Workshop
Fetc 2022 10 Questions WorkshopFetc 2022 10 Questions Workshop
Fetc 2022 10 Questions Workshop
Julie Evans
 
Fetc 2022 Building Teacher Capacity
Fetc 2022 Building Teacher CapacityFetc 2022 Building Teacher Capacity
Fetc 2022 Building Teacher Capacity
Julie Evans
 
Fetc 2022 Leadership Workshop
Fetc 2022 Leadership WorkshopFetc 2022 Leadership Workshop
Fetc 2022 Leadership Workshop
Julie Evans
 
Fetc 2022 Computational Thinking
Fetc 2022 Computational ThinkingFetc 2022 Computational Thinking
Fetc 2022 Computational Thinking
Julie Evans
 
About Speak UpWebinar December 2021
About Speak UpWebinar December 2021About Speak UpWebinar December 2021
About Speak UpWebinar December 2021
Julie Evans
 
Speak Up Congressional Briefing Oct 20 2021
Speak Up Congressional Briefing Oct 20 2021Speak Up Congressional Briefing Oct 20 2021
Speak Up Congressional Briefing Oct 20 2021
Julie Evans
 

More from Julie Evans (20)

Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdfReading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
Reading the Tea Leaves Speak Up Findings Julie Evans August 2022.pdf
 
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
NSPRA Crossroad for Innovation and Transformation by Julie Evans July 18, 2022
 
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
Student Preferences in Learning Learning Impact 2022 Student Voices Discussio...
 
Designing a Better School Learning Impact 2022-Part 2
Designing a Better School Learning Impact 2022-Part 2Designing a Better School Learning Impact 2022-Part 2
Designing a Better School Learning Impact 2022-Part 2
 
Defining Student Engagement Learning Impact 2022-Part 1
Defining Student Engagement Learning Impact 2022-Part 1Defining Student Engagement Learning Impact 2022-Part 1
Defining Student Engagement Learning Impact 2022-Part 1
 
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder FeedbackConnecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and AASL Stakeholder Feedback
 
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder FeedbackConnecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
Connecting the Dots: The Speak Up Research Project and TCEA Stakeholder Feedback
 
Are You As Smart As A 6th Grader About Digital Learning?
Are You As Smart As A 6th Grader About Digital Learning?Are You As Smart As A 6th Grader About Digital Learning?
Are You As Smart As A 6th Grader About Digital Learning?
 
Five Year Study Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
Five Year Study  Preparing KentuckyTeachers for Mobile Anytime Anywhere LearningFive Year Study  Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
Five Year Study Preparing KentuckyTeachers for Mobile Anytime Anywhere Learning
 
Building Teacher Competency, Confidence and Comfort
Building Teacher Competency, Confidence and ComfortBuilding Teacher Competency, Confidence and Comfort
Building Teacher Competency, Confidence and Comfort
 
Connecting the Dots Between Equity and Communications
Connecting the Dots Between Equity and CommunicationsConnecting the Dots Between Equity and Communications
Connecting the Dots Between Equity and Communications
 
Leading Towards Equity & Student Agency
Leading Towards Equity & Student AgencyLeading Towards Equity & Student Agency
Leading Towards Equity & Student Agency
 
FETC 2022 10 Questions Workshop
FETC 2022 10 Questions WorkshopFETC 2022 10 Questions Workshop
FETC 2022 10 Questions Workshop
 
Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022 Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022
 
Fetc 2022 10 Questions Workshop
Fetc 2022 10 Questions WorkshopFetc 2022 10 Questions Workshop
Fetc 2022 10 Questions Workshop
 
Fetc 2022 Building Teacher Capacity
Fetc 2022 Building Teacher CapacityFetc 2022 Building Teacher Capacity
Fetc 2022 Building Teacher Capacity
 
Fetc 2022 Leadership Workshop
Fetc 2022 Leadership WorkshopFetc 2022 Leadership Workshop
Fetc 2022 Leadership Workshop
 
Fetc 2022 Computational Thinking
Fetc 2022 Computational ThinkingFetc 2022 Computational Thinking
Fetc 2022 Computational Thinking
 
About Speak UpWebinar December 2021
About Speak UpWebinar December 2021About Speak UpWebinar December 2021
About Speak UpWebinar December 2021
 
Speak Up Congressional Briefing Oct 20 2021
Speak Up Congressional Briefing Oct 20 2021Speak Up Congressional Briefing Oct 20 2021
Speak Up Congressional Briefing Oct 20 2021
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Cybersecurity - Strategy, Policy and Practice

  • 1. Cybersecurity - Strategy, Policy, and Practice: A K-12 Cross Organizational Imperative Panel discussion participants: ▪ Dr. Greg Ottinger ▪ Richard Quinones ▪ Lenny Schad ▪ Marlon Shears Panel moderated by: Dr. Julie A. Evans, CEO, Project Tomorrow
  • 2. Our discussion today: ▪ Let’s get real about the leadership disconnects in K-12 districts about cybersecurity awareness and preparations ▪ Selected findings from the new Project Tomorrow – iboss report on K-12 cybersecurity ▪ Experiential insights and wisdom from our panel of district leaders and national thought leaders ▪ Additional resources for you!
  • 3. Meet our panel of national thought leaders ▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD ▪ Richard Quinones, Senior Vice President, Business Development Strategist/Thought Leadership, iboss ▪ Lenny Schad, Chief Information and Innovation Officer, District Administration ▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth Independent SD
  • 4. “Increasing the security posture within a school district necessitates deliberate education of executive leadership so that a common cultural understanding about the importance of cybersecurity is adopted across the organization.” District Technology Leader Addressing the Leadership Disconnects on Cybersecurity
  • 5. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study About the new research study: o Part of the larger Speak Up Research Project o Continuation of a focus on cybersecurity issues since 2017 o Impact of pandemic: increased dependence on technology + increased threat environment required a deeper examination of the current attitudes and actions o Call for feedback from K-12 district administrators and technology leaders in January – May 2021 o 599 respondents from a diverse set of schools and districts nationwide o Longstanding partnership with iboss
  • 6. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study Creating a Common Culture of Action Around Cybersecurity Results from the 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Report Pre-release of the new national report: special opportunity for you! https://tomorrow.org/speakup/pdfs/Creating-a-Common- Culture-of-Action-Around-Cybersecurity.pdf
  • 7. Many thanks for you continued support!
  • 8. ▪ Internet security and web filtering delivered in the cloud with the largest cloud offering for schools ▪ The leader in K-12 internet security ▪ Currently securing the largest schools, consortiums and state networks, including: ▪ Chicago Public Schools ▪ Boston Public Schools ▪ Houston ISD, Dallas ISD, Austin ISD, El Paso ISD, ▪ Connecticut Education Network, Utah Education Network, etc. ▪ Millions of Windows, Apple and Chromebook devices Secured 8 Students are the new network perimeter. Mobility, cloud SaaS application use and exponentially increasing bandwidth make appliance-based internet security and web filtering strategies unsustainable. A shift to cloud-based internet security is no longer optional and is a requirement to enable digital learning in the cloud-first future. About iboss Industry Recognized as a Leader For K-12
  • 9. The Most Trusted Name in EDU Cybersecurity. Trusted to Secure Millions of Students Trusted Partner – Across the Most State Contracts Unsurpassed Scalability and Innovation ▪ Secure more large schools than any other EDU focused solution ▪ Proven deployments with over 1 million devices and 40+ Gbps ▪ More integration flexibility than any other solution ▪ Backed by more patents than any other EDU focused solution Copyright © 2021 | iboss. All Rights Reserved.
  • 10. About the Speak Up Research efforts ▪ To learn more about Speak Up ▪ To get a copy of today’s presentation ▪ To get a copy of the new report and infographic Please add your name and contact info to our print sign in sheets or on this online form.
  • 11. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study Three key insights from the research 1. An effective cybersecurity plan must be rooted in a shared and realistic sense of concern, responsibility, and accountability within the district. 2. The new technology dependence in K-12 education demands that district leaders re-assess their approach to the management of their technology assets, both human and digital. This has huge implications for cybersecurity readiness and preparations. 3. Cybersecurity preparation begins with an understanding of the need to walk the talk with increased funding to support both readiness and mitigation efforts.
  • 12. Insights from the new national report 1. An effective cybersecurity plan must be rooted in a shared and realistic sense of concern, responsibility, and accountability within the district. We experienced a cyber event almost 2 years ago that shut us down. As a district we all went through the process of recovery together. We have full support of our Cabinet and Superintendent when it comes to keeping our network and student data safe. District Technology Leader
  • 13. Insights from the new national report 1. An effective cybersecurity plan must be rooted in a shared and realistic sense of concern, responsibility, and accountability within the district. What is your current level of concern regarding a potential cyber attack in your district? 13% 39% 46% 21% 44% 22% Low concern Moderate concern High concern District Administrators Technology Leaders
  • 14. A successful cybersecurity strategy must be cross organizational Who: All Executives and Board IT, Operations, Facilities, Finance, Legal, Superintendent, Communications, Board What: Proactive and Reactive Planning, Preparation, and Incident Response How: Identify risk, communicate the facts, build consensus through partnership What is job #1 to create an effective cybersecurity strategy? Panel discussion
  • 15. Insights from the new national report 2. The new technology dependence in K-12 education demands that district leaders re-assess their approach to the management of their technology assets, both human and digital. This has huge implications for cybersecurity readiness and preparations. This is what has worked in our district. Educate: Build awareness in users of their role in managing risks. Mitigate: Implement robust systems to protect data and networks. Investigate: Provide tools to monitor and determine system breaches. District Technology Leader
  • 16. Insights from the new national report 2. The new technology dependence in K-12 education demands that district leaders re-assess their approach to the management of their technology assets, both human and digital. This has huge implications for cybersecurity readiness and preparations. Are IT department staffing levels adequate to support cybersecurity? Nearly 6 in 10 technology leaders say that their current staffing for cybersecurity is not adequate to meet the needs of their district to protect information assets and resources.
  • 17. Need to look in the mirror to evaluate our current preparation state for effective cybersecurity Develop and execute a comprehensive assessment of operational vulnerabilities Conduct Districtwide Risk Assessment PEN Testing Formal Remediation Strategy/Plan Financial Forecasting Staffing Consult Outside Experts Legal Technical Communication Board Superintendent Cabinet IT Department Panel discussion
  • 18. Insights from the new national report 3. Cybersecurity preparation begins with an understanding of the need to walk the talk with increased funding to support both readiness and mitigation efforts. To address these issues, we need sustainability in the funding for cybersecurity. When budgets are squeezed, operational costs like cybersecurity are the first to be hit. Additionally, district leaders need to enthusiastically embrace and model good cybersecurity habits and support the technology leaders in setting expectations for staff. It cannot just be the technology departments' problem. District Technology Leader
  • 19. Insights from the new national report 3. Cybersecurity preparation begins with an understanding of the need to walk the talk with increased funding to support both readiness and mitigation efforts. 24% 24% 18% 47% Anticipated budget increase in 2021-22 Anticipated no change in 2021-22 budget Budget increased in 2020-21 No change in the 2020-21 budget Do our district budgets for cybersecurity reflect the reality of the situation?
  • 20. How to close the information and urgency gap in our district cybersecurity outlook Creating a common culture of action around cybersecurity requires a proactive approach by all leaders Incident response planning Cross-organizational cybersecurity committees Training - IT and all district employees Consistent transparency and communications Education of the executive leadership Commitment to “walk the talk” Panel discussion
  • 21. National Call to Action for Greater Awareness and Action on K-12 Cybersecurity To develop a common language and shared cross-organizational culture within districts: 1. Why should cybersecurity be a district wide imperative? 2. How do build a shared culture around cybersecurity? 3. What are the best practices to support a healthy cybersecurity posture within our districts?
  • 22. National Call to Action for Greater Awareness and Action on K-12 Cybersecurity Planned activities for 2022 (more to follow): ▪ Discussions, sessions and events at several national conferences ▪ Thought leader articles and blog posts in key publications ▪ Direct support for K-12 district leadership teams ▪ Recommendations on best practices ▪ 2nd annual Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study (February – May 2022)
  • 23. Speak Up reports, infographics, briefings and data insights for schools and districts www.tomorrow.org https://tomorrow.org/speakup/pdfs/Creating-a-Common- Culture-of-Action-Around-Cybersecurity.pdf
  • 24. iboss Online K-12 Streaming Resources www.gotostage.com/channel/ibossEDU Boston Public Schools Early data/analytics allowed BPS to identify and locate missing students Carlsbad Unified School District Leveraged Chromebook posture to advance 1:1 student learning across all grade levels Lexington School District Implemented CIPA compliant device take home initiatives to leverage a direct to cloud security strategy Charleston County Schools Modernized IT Infrastructure to support mobile devices District Exchange Webinar Series
  • 25. About the Speak Up Research efforts ▪ To learn more about Speak Up ▪ To get a copy of today’s presentation ▪ To get a copy of the new report and infographic Please add your name and contact info to our print sign in sheets or on this online form.
  • 26. Thank you for joining us today! Let’s continue this conversation. ▪ Dr. Julie A. Evans, Chief Executive Officer, Project Tomorrow ▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD ▪ Richard Quinones, Senior Vice President, Business Development Strategist/Thought Leadership, iboss ▪ Lenny Schad, Chief Information and Innovation Officer, District Administration ▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth Independent SD
  • 27. For more information, please contact: Dr. Julie A. Evans Chief Executive Officer, Project Tomorrow @JulieEvans_PT jevans@tomorrow.org 949-609-4660 voice