Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
Presented at CDEF 16th Meetup at 18 August 2022.
Title:
Privacy-ready Data Protection Program Implementation
Topics:
- Why data protection is important
- Data Privacy Program Domain
- Operationalize Data Privacy Program
- Privacy-aligned Information Security Framework
- Roadmap to Protect Personal Data
- Privacy Management Technology
Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
Presented at CDEF 16th Meetup at 18 August 2022.
Title:
Privacy-ready Data Protection Program Implementation
Topics:
- Why data protection is important
- Data Privacy Program Domain
- Operationalize Data Privacy Program
- Privacy-aligned Information Security Framework
- Roadmap to Protect Personal Data
- Privacy Management Technology
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Overview of National Cybersecurity Strategy 2023.pdfNiloufer Tamboly
An overview of the 2023 National Cybersecurity Strategy, focusing on the innovative solutions that have been introduced to tackle emergent threats in the digital sphere. The strategy emphasizes the importance of public-private partnerships for enhanced security infrastructure and underscores the need for robust education initiatives to ensure comprehensive cybersecurity literacy. As part of the overarching defense plan, a major emphasis is placed on resilience and preparedness to safeguard national interests, individual privacy, and economic stability from cyber threats.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Information Security vs IT - Key Roles & ResponsibilitiesKroll
Marc Brawner is a Principal with Kroll's Cyber Security & Investigations team. In this presentation to the Tennessee Bankers Association, Marc explains the key roles & responsibilities of the information security and information technology teams for increased cyber security
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
This webinar will provide more information on the importance of information security and how you can take security well beyond compliance, an approach on building strong information security, privacy and data governance programs, and the importance of strong data governance in relation to privacy and information security requirements.
The webinar covers
• Information Security
• Importance Of Information Security Today
• Taking Information Security Beyond A Compliance First
• Importance Of Data Governance In Information Security
• Privacy
• Changing And Evolving Privacy Requirements
• Importance Of Data Governance In Privacy
• Data Governance And Data Privacy
• Data Privacy - Data Processing Principles
Presenters:
Moji is a Senior Business Process Analyst working with GemaltoThales, a leading firm in the IT industry. Moji has over fifteen years of experience in leading projects to improve processes, create and implement processes leading to increased revenue generation and eliminate redundancies.
She has a zeal for adding value and increasing revenue for organizations. Moji is very passionate about Data Privacy and its application in business and consumer rights.
Hardeep Mehrotara has 20+ years of senior leadership experience in Information Technology and Cyber Security working for public and private organizations building security programs from the ground up. He has been featured on Canadian television as a cyber expert and provided advice to various communities on implementing cybersecurity strategy, best practices and controls. He has been a co-author on numerous leading industry security control frameworks, technical benchmarks and industry best practice standards.
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/aQcS5-RFIEY
Website link: https://pecb.com/
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
According to Technavio's latest market research report, the data security market value will grow by $2.85 Billion during 2021-2025.
To secure their data, organizations can use the CIA triad, a data security model developed to help the data security market and people deal with various IT security parts.
The webinar covers
• Overview Of CIA
• Description of Data Governance vs Information Security vs Privacy
• Relationship of CIA to Data Governance
• Relationship of CIA to Information Security
• Relationship of CIA to Privacy
• How to Implement and Maintain the CIA model (e.g., PDCA, etc.)
Presenters:
Anthony English
Our presenter for this webinar is Anthony English, one of the top cybersecurity professionals in Atlantic Canada with extensive Canadian and International experience in cybersecurity covering risk assessment, management, mitigation, security testing, business continuity, information security management systems, architecture security reviews, project security, security awareness, lectures, presentations and standards-based compliance.
Date: November 17, 2021
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Youtube video: https://youtu.be/eA8uQhdLZpw
Website link: https://pecb.com/
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Overview of National Cybersecurity Strategy 2023.pdfNiloufer Tamboly
An overview of the 2023 National Cybersecurity Strategy, focusing on the innovative solutions that have been introduced to tackle emergent threats in the digital sphere. The strategy emphasizes the importance of public-private partnerships for enhanced security infrastructure and underscores the need for robust education initiatives to ensure comprehensive cybersecurity literacy. As part of the overarching defense plan, a major emphasis is placed on resilience and preparedness to safeguard national interests, individual privacy, and economic stability from cyber threats.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Information Security vs IT - Key Roles & ResponsibilitiesKroll
Marc Brawner is a Principal with Kroll's Cyber Security & Investigations team. In this presentation to the Tennessee Bankers Association, Marc explains the key roles & responsibilities of the information security and information technology teams for increased cyber security
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
This webinar will provide more information on the importance of information security and how you can take security well beyond compliance, an approach on building strong information security, privacy and data governance programs, and the importance of strong data governance in relation to privacy and information security requirements.
The webinar covers
• Information Security
• Importance Of Information Security Today
• Taking Information Security Beyond A Compliance First
• Importance Of Data Governance In Information Security
• Privacy
• Changing And Evolving Privacy Requirements
• Importance Of Data Governance In Privacy
• Data Governance And Data Privacy
• Data Privacy - Data Processing Principles
Presenters:
Moji is a Senior Business Process Analyst working with GemaltoThales, a leading firm in the IT industry. Moji has over fifteen years of experience in leading projects to improve processes, create and implement processes leading to increased revenue generation and eliminate redundancies.
She has a zeal for adding value and increasing revenue for organizations. Moji is very passionate about Data Privacy and its application in business and consumer rights.
Hardeep Mehrotara has 20+ years of senior leadership experience in Information Technology and Cyber Security working for public and private organizations building security programs from the ground up. He has been featured on Canadian television as a cyber expert and provided advice to various communities on implementing cybersecurity strategy, best practices and controls. He has been a co-author on numerous leading industry security control frameworks, technical benchmarks and industry best practice standards.
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/aQcS5-RFIEY
Website link: https://pecb.com/
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
According to Technavio's latest market research report, the data security market value will grow by $2.85 Billion during 2021-2025.
To secure their data, organizations can use the CIA triad, a data security model developed to help the data security market and people deal with various IT security parts.
The webinar covers
• Overview Of CIA
• Description of Data Governance vs Information Security vs Privacy
• Relationship of CIA to Data Governance
• Relationship of CIA to Information Security
• Relationship of CIA to Privacy
• How to Implement and Maintain the CIA model (e.g., PDCA, etc.)
Presenters:
Anthony English
Our presenter for this webinar is Anthony English, one of the top cybersecurity professionals in Atlantic Canada with extensive Canadian and International experience in cybersecurity covering risk assessment, management, mitigation, security testing, business continuity, information security management systems, architecture security reviews, project security, security awareness, lectures, presentations and standards-based compliance.
Date: November 17, 2021
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Youtube video: https://youtu.be/eA8uQhdLZpw
Website link: https://pecb.com/
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
Cyber capability brochure
Cybersecurity Today:
A fresh look at a changing
paradigm for government agencies
The cyber domain presents endless opportunities to
Federal agencies looking for new ways to deliver on their
mission and serve citizens, while reducing operational
risk. Government is investing in new and innovative
technologies that will empower our nation to achieve
more. Next-generation identification systems will
reduce terrorist and criminal activities by improving and
expanding biometric identification and criminal history
information services. “Smart” electric grids will make the
country more energy independent and increase the use
of renewable energies. Intelligent travel systems will make
air travel quicker and safer. Electronic medical records are
improving access to health care and reducing costs. These
investments require up-front planning and preemptive
cybersecurity practices to mitigate the inherit risks
associated with the advance persistent threat.
However, operating in the cyber domain is not without
increased risk. Our cybersecurity efforts are matched — if
not outpaced — by the sophistication on the part of
nimble opponents from other nations, cyber terrorists,
cyber criminal syndicates, malicious insiders, cyber
espionage — not to mention the inadvertent breach.
For better or worse, our cybersecurity efforts are
increasingly interconnected with agency mission
and programs, inextricably linking daily decisions on
performance, workforce management, and information
sharing with threat deterrence at every level of the
organization. By adopting a proactive, performance-
focused, and risk-intelligent approach to cyber initiatives,
leaders can help shape their organizations into more
proactive, agile, and resilient organizations to protect their
people, programs, and mission.
Cyber: The new normal
Cyber is not just a new domain, it is the new normal.
Agency leaders have a critical task ahead of them to
take a fresh look at their personnel, policies, processes,
and systems to synchronize their cyber initiatives and
empower collaboration across departments to protect
people, programs, and mission. To strengthen their cyber
efforts, today’s leaders are helping drive coordination
across functions, agencies, and the private sector toward
a shared cyber competence that enables the mission while
assigning accountability. Here are some actions agencies
should consider:
Treat data like a monetary asset. • Understand the
value of all your agency’s assets and protect what
matters most to the mission and preserve the public’s
trust.
Follow the flow of information• inside and outside of
your agency to identify vulnerabilities; strengthen every
link in the chain.
Do more with identity management.• Identity,
Credentialing, and Access Management (ICAM) offers
new opportunities to expand partnerships and add
services quickly and cost-efficiently.
Make cyber a performance goal.• .
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
Executive panel discussion at the 2010 BDPA Technology Conference on "Federal IT Initiatives".
Panel members: John James (US Navy), Bob Whitkp (US Navy), Tony McMahon (IRS) and Dr. Anthony Junior (US Navy)
This public policy session on the activities of the Technology Association of Louisville Kentucky (TALK) was presented in June 2022 at the TALK Cyber Security Summit in Louisville, KY.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
WPGC empowers K-12 organizations with robust cybersecurity solutions. Explore effective strategies to safeguard against evolving threats in the educational landscape
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
Michael Goldsmith and I presented an overview of cybersecurity capacity building and current research findings for delegates from across the Commonwealth nations. The first section of slides introduces the Global Cyber Security Capacity Centre (GCSCC), and the second part presents a comparative analysis of the status and impact of capacity building.
A look at why Caribbean cyber security is important, Caribbean experiences achieving cyber security, why an effective strategy is critical and the importance of an effective Information Governance strategy.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
1. Cybersecurity - Strategy, Policy, and Practice:
A K-12 Cross Organizational Imperative
Panel discussion participants:
▪ Dr. Greg Ottinger
▪ Richard Quinones
▪ Lenny Schad
▪ Marlon Shears
Panel moderated by: Dr. Julie A. Evans, CEO, Project Tomorrow
2. Our discussion today:
▪ Let’s get real about the leadership disconnects in K-12 districts
about cybersecurity awareness and preparations
▪ Selected findings from the new Project Tomorrow – iboss
report on K-12 cybersecurity
▪ Experiential insights and wisdom from our panel of district
leaders and national thought leaders
▪ Additional resources for you!
3. Meet our panel of national thought leaders
▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD
▪ Richard Quinones, Senior Vice President, Business Development
Strategist/Thought Leadership, iboss
▪ Lenny Schad, Chief Information and Innovation Officer, District
Administration
▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth
Independent SD
4. “Increasing the security posture within a school
district necessitates deliberate education of
executive leadership so that a common cultural
understanding about the importance of
cybersecurity is adopted across the organization.”
District Technology Leader
Addressing the Leadership Disconnects on Cybersecurity
5. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
About the new research study:
o Part of the larger Speak Up Research Project
o Continuation of a focus on cybersecurity issues since 2017
o Impact of pandemic: increased dependence on technology + increased threat
environment required a deeper examination of the current attitudes and actions
o Call for feedback from K-12 district administrators and technology leaders in
January – May 2021
o 599 respondents from a diverse set of schools and districts nationwide
o Longstanding partnership with iboss
6. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
Creating a Common Culture of
Action Around Cybersecurity
Results from the 2021 Project
Tomorrow – iboss National K-12
Education Cybersecurity Report
Pre-release of the new national report: special opportunity for you!
https://tomorrow.org/speakup/pdfs/Creating-a-Common-
Culture-of-Action-Around-Cybersecurity.pdf
8. ▪ Internet security and web filtering delivered in the
cloud with the largest cloud offering for schools
▪ The leader in K-12 internet security
▪ Currently securing the largest schools, consortiums
and state networks, including:
▪ Chicago Public Schools
▪ Boston Public Schools
▪ Houston ISD, Dallas ISD, Austin ISD, El Paso ISD,
▪ Connecticut Education Network, Utah Education
Network, etc.
▪ Millions of Windows, Apple and Chromebook devices
Secured
8
Students are the new network perimeter. Mobility,
cloud SaaS application use and exponentially
increasing bandwidth make appliance-based
internet security and web filtering strategies
unsustainable.
A shift to cloud-based internet security is no longer
optional and is a requirement to enable digital
learning in the cloud-first future.
About iboss
Industry Recognized as a Leader
For K-12
10. About the Speak Up Research efforts
▪ To learn more about Speak Up
▪ To get a copy of today’s presentation
▪ To get a copy of the new report and
infographic
Please add your name and contact info to
our print sign in sheets or on this online
form.
11. 2021 Project Tomorrow – iboss National K-12 Education Cybersecurity Research Study
Three key insights from the research
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
12. Insights from the new national report
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
We experienced a cyber event almost 2 years
ago that shut us down. As a district we all
went through the process of recovery
together. We have full support of our Cabinet
and Superintendent when it comes to keeping
our network and student data safe.
District Technology Leader
13. Insights from the new national report
1. An effective cybersecurity plan must be rooted in a shared and
realistic sense of concern, responsibility, and accountability
within the district.
What is your current level of concern regarding a potential cyber attack in your district?
13%
39%
46%
21%
44%
22%
Low concern
Moderate concern
High concern
District Administrators Technology Leaders
14. A successful cybersecurity strategy must be cross organizational
Who: All Executives and Board
IT, Operations, Facilities, Finance, Legal, Superintendent, Communications, Board
What: Proactive and Reactive
Planning, Preparation, and Incident Response
How:
Identify risk, communicate the facts, build consensus through partnership
What is job #1 to create an
effective cybersecurity strategy?
Panel discussion
15. Insights from the new national report
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
This is what has worked in our district.
Educate: Build awareness in users of their role
in managing risks. Mitigate: Implement robust
systems to protect data and networks.
Investigate: Provide tools to monitor and
determine system breaches.
District Technology Leader
16. Insights from the new national report
2. The new technology dependence in K-12 education demands that
district leaders re-assess their approach to the management of
their technology assets, both human and digital. This has huge
implications for cybersecurity readiness and preparations.
Are IT department staffing levels adequate to support cybersecurity?
Nearly 6 in 10 technology leaders say that their current staffing
for cybersecurity is not adequate to meet the needs of their district
to protect information assets and resources.
17. Need to look in the mirror to evaluate our
current preparation state for effective
cybersecurity
Develop and execute a comprehensive assessment of operational vulnerabilities
Conduct Districtwide Risk Assessment
PEN Testing
Formal Remediation
Strategy/Plan
Financial Forecasting
Staffing
Consult Outside Experts
Legal
Technical
Communication
Board
Superintendent
Cabinet
IT Department
Panel discussion
18. Insights from the new national report
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
To address these issues, we need sustainability in
the funding for cybersecurity. When budgets are
squeezed, operational costs like cybersecurity are
the first to be hit. Additionally, district leaders need
to enthusiastically embrace and model good
cybersecurity habits and support the technology
leaders in setting expectations for staff. It cannot
just be the technology departments' problem.
District Technology Leader
19. Insights from the new national report
3. Cybersecurity preparation begins with an understanding of the
need to walk the talk with increased funding to support both
readiness and mitigation efforts.
24%
24%
18%
47%
Anticipated budget increase in 2021-22
Anticipated no change in 2021-22 budget
Budget increased in 2020-21
No change in the 2020-21 budget
Do our district budgets for cybersecurity reflect the reality of the situation?
20. How to close the
information and urgency
gap in our district
cybersecurity outlook
Creating a common culture of action around cybersecurity requires a proactive
approach by all leaders
Incident response planning
Cross-organizational cybersecurity committees
Training - IT and all district employees
Consistent transparency and communications
Education of the executive leadership
Commitment to “walk the talk”
Panel discussion
21. National Call to Action for Greater
Awareness and Action on K-12 Cybersecurity
To develop a common language and shared cross-organizational
culture within districts:
1. Why should cybersecurity be a district wide imperative?
2. How do build a shared culture around cybersecurity?
3. What are the best practices to support a healthy cybersecurity
posture within our districts?
22. National Call to Action for Greater
Awareness and Action on K-12 Cybersecurity
Planned activities for 2022 (more to follow):
▪ Discussions, sessions and events at several national conferences
▪ Thought leader articles and blog posts in key publications
▪ Direct support for K-12 district leadership teams
▪ Recommendations on best practices
▪ 2nd annual Project Tomorrow – iboss National K-12 Education
Cybersecurity Research Study (February – May 2022)
23. Speak Up reports, infographics, briefings and data
insights for schools and districts www.tomorrow.org
https://tomorrow.org/speakup/pdfs/Creating-a-Common-
Culture-of-Action-Around-Cybersecurity.pdf
24. iboss Online K-12 Streaming Resources
www.gotostage.com/channel/ibossEDU
Boston Public Schools
Early data/analytics allowed BPS to
identify and locate missing students
Carlsbad Unified School District
Leveraged Chromebook posture to advance
1:1 student learning across all grade levels
Lexington School District
Implemented CIPA compliant device take home
initiatives to leverage a direct to cloud security strategy
Charleston County Schools
Modernized IT Infrastructure to support mobile devices
District Exchange Webinar Series
25. About the Speak Up Research efforts
▪ To learn more about Speak Up
▪ To get a copy of today’s presentation
▪ To get a copy of the new report and
infographic
Please add your name and contact info to
our print sign in sheets or on this online
form.
26. Thank you for joining us today!
Let’s continue this conversation.
▪ Dr. Julie A. Evans, Chief Executive Officer, Project Tomorrow
▪ Dr. Greg Ottinger, former Chief Business Officer, San Diego Unified SD
▪ Richard Quinones, Senior Vice President, Business Development
Strategist/Thought Leadership, iboss
▪ Lenny Schad, Chief Information and Innovation Officer, District
Administration
▪ Marlon Shears, Chief Information Officer/Technology, Fort Worth
Independent SD
27. For more information, please contact:
Dr. Julie A. Evans
Chief Executive Officer, Project Tomorrow
@JulieEvans_PT
jevans@tomorrow.org
949-609-4660 voice