Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardians, and staff.
Threat Landscape Lessons from IoTs and Honeynets
This talk is aimed at arming IT professionals with insight into WatchGuard’s latest threat security research.
Modern systems in production rely on decades of computer science research. Over time, new architectural patterns emerge that enable more resilient and robust systems. In this talk, we'll discuss some of these patterns from systems I've worked on at Google and the related work that provide insights into the motivations behind them.
GDPR is upon us. But there’s an elephant in the room: multiple silos of test and development data. There’s likely way more islands of it than you think—often containing a treasure trove of all too sensitive, weakly masked ex-production data.
Data Masking With The Delphix Dynamic Data PlatformDelphix
If you’re like most businesses, as much as 80% of sensitive data resides in environments used for development, testing, and reporting. In other words, the majority of your most valuable information exists in some your least secure environments. Discover how the Delphix Dynamic Data Platform addresses this problem head on, providing an integrated solution for identifying, masking, and delivering secure data.
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
Why Your Approach To Data Governance Needs a Major UpdateDelphix
Data is the fuel that powers today’s application-driven businesses. But efficiently governing this data is becoming harder as it grows in volume and proliferates across cloud and on-prem environments. Questions like “Where is my sensitive data located?,” “How do we protect it from breach?” and “How do I ensure the right people have access to it?” are becoming more difficult to answer.
With the clock counting down on enforcement of EU GDPR in May 2018, global businesses are determining how to comply with what may be the most stringent data privacy regulation ever. GDPR and its associated penalties —up to 4% of global revenue—apply to both EU and non-EU businesses alike.
Threat Landscape Lessons from IoTs and Honeynets
This talk is aimed at arming IT professionals with insight into WatchGuard’s latest threat security research.
Modern systems in production rely on decades of computer science research. Over time, new architectural patterns emerge that enable more resilient and robust systems. In this talk, we'll discuss some of these patterns from systems I've worked on at Google and the related work that provide insights into the motivations behind them.
GDPR is upon us. But there’s an elephant in the room: multiple silos of test and development data. There’s likely way more islands of it than you think—often containing a treasure trove of all too sensitive, weakly masked ex-production data.
Data Masking With The Delphix Dynamic Data PlatformDelphix
If you’re like most businesses, as much as 80% of sensitive data resides in environments used for development, testing, and reporting. In other words, the majority of your most valuable information exists in some your least secure environments. Discover how the Delphix Dynamic Data Platform addresses this problem head on, providing an integrated solution for identifying, masking, and delivering secure data.
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
Why Your Approach To Data Governance Needs a Major UpdateDelphix
Data is the fuel that powers today’s application-driven businesses. But efficiently governing this data is becoming harder as it grows in volume and proliferates across cloud and on-prem environments. Questions like “Where is my sensitive data located?,” “How do we protect it from breach?” and “How do I ensure the right people have access to it?” are becoming more difficult to answer.
With the clock counting down on enforcement of EU GDPR in May 2018, global businesses are determining how to comply with what may be the most stringent data privacy regulation ever. GDPR and its associated penalties —up to 4% of global revenue—apply to both EU and non-EU businesses alike.
If you follow the trade press, one theme you hear over and over again is that organizations are drowning in alerts. It’s true that we need technological solutions to prioritize and escalate the most important alerts to our analysts, but the humans have a critical part to play in this process as well. The quicker they are able to make decisions about the alerts they review, the better they are able to keep up. An incident responders’ most common task is alert triage, the process of investigation and escalation that ultimately results in the creation of security incidents. As crucial as this process is, there has been remarkably little written about how to do it correctly and efficiently. In this presentation, learn incident response best practices from Sqrrl security expert, David Bianco.
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
Real World Threat Hunting
Security threats have grown from network annoyances to attacks on sensitive infrastructure; penetrating network perimeters, moving laterally within networks, breaching new device types, and cloaking movements. This presentation will share techniques utilized by Cisco to detect and investigate sophisticated, embedded threats.
The speaker, who has conducted monitoring and investigations on customer networks, will review recent real attacks observed on customer networks, from discovery to remediation, and provide lessons learned. These interactive case examples will highlight how to identify these threats using security intelligence, expert staff, and the Cisco OpenSOC platform.
Examples of attacks and illustrations:
* Sophisticated phishing attacks targeted at customer environments.
* Breaches and data exfiltration resulting from the high-profile HeartBleed and Shellshock vulnerabilities.
* Sophisticated malware targeting financial institutions with the goal of data theft.
* Use of full packet capture to identify data exfiltration.
Organizations that have employees who are committed to maintaining online hygiene are better able to protect themselves and others from cyber attacks.
Staying safe online requires ongoing oversight at each touchpoint - from buying and setting up new devices, to ensuring day-to-day activities are not putting anyone at risk.
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsDelphix
Paying attention to data privacy and security is no longer optional. From a mega breach at Equifax to emerging regulations such as GDPR, data security is driving both today’s headlines and the IT initiatives of tomorrow. Join us for a fascinating discussion on how data privacy and security have evolved in 2017—and what to expect in 2018.
A Stratagem on Strategy: Rolling Security Testing into Product TestingKevin Fealey
Commercial software products rely on formal test strategies to describe who will perform testing, when testing will occur, the process that will be followed, the depth of testing, and more. Test strategies are extended by test plans that detail specific tests that will be executed and how success will be measured. Test strategies and plans support objectively evaluating that software meets requirements and functions properly.
Conversely, security teams think about where security gates should be in the SDLC and deploy SAST, DAST, IAST, manual testing, or a combination. Rarely is it considered what level of coverage these methods provide, and output from security testing is not mapped back to requirements. Compared to other teams involved in the SDLC, security seems to just be winging their test strategies and plans.
Especially in a DevOps environment where silos are broken and responsibilities are shared across dev, ops, test, and security, use of common methodologies will help to reduce confusion and improve pipeline throughput.
During this talk we will discuss:
- What are test strategies and how are they used by product teams to provide consistency in testing (something security generally lacks)?
- What are test plans and how are they used by product teams to enable visibly strong test coverage (something security also lacks)?
- In a DevOps environment, what is security’s role in existing test strategies?
- How can security teams leverage test plans to provide better visibility on test coverage and map findings back to requirements to reduce confusion and demonstrate security value to stakeholders throughout the value stream?
- What other lessons can we learn from how dev, ops, and test support quality deliveries that can enable more effective and efficient security (e.g. security as code)?
Slide deck from a series of webinars which were held in June 2020 on 'The avoidable security risks of remote working', following the outbreak of Covid-19.
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
Organizations receive an overwhelming amount of alerts every day from their SIEMs, IPS/IDS, next gen firewalls, etc. Result is too many alerts and not enough manpower, visibility across the organization or enough context to make the right decisions.
We look at every stage of the attack lifecycle…and on every port and protocol. With Fidelis there’s no place for attackers to hide.
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
Rick Holland of Forrester Research shares the results of his investigation into why targeted attacks on employees of businesses are increasing despite there being more information security products than ever.
Presented by Duo Security with guests Forrester Research and University of Tennessee, Knoxville
Agenda and Presenters
* How To Stop Targeted Attacks and Avoid “Expense In Depth” with Strong Authentication
Rick Holland, Principal Analyst, Forrester Research
* How Duo Helps You Avoid “Expense In Depth”
Brian Kelly, Principal Product Marketing Manager , Duo Security
* A Case for Multi-factor Authentication
Bob Hillhouse, Associate CIO and CISO University of Tennessee, Knoxville
Information security is not about reacting to attacks. Information security is about analyzing patterns and predicting potential threats by expanding the defense perimeter beyond the traditional borders.
World Wide Technology: Is backing up to the cloud right for you?Angie Clark
Data protection and retention is critically important for commercial and public sector organizations alike. In fact, it is said that three things keep a CIO up at night: data failure, time to recovery and ensuring IT is able to meet recovery point objectives.
Today, if you have a failure, the amount of time the business is without the data can determine if you need to start looking for a new job…
This presentation will help the attendees:
• Evaluate the business case for targeting your backups to the cloud
• Identify candidate data sets for cloud backup and assess opportunities and readiness
• Mitigate the challenges of backing up to the cloud
• Build a roadmap to your cloud implementation
WWT also provides some real-world experience via use cases and introduces several tools and methodologies used to evaluate, plan and execute your journey to cloud backup in this presentation.
To find out more about WWT’s Data Protection team, log on to wwt.com.
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
Axis Technology and Skytap provide tips on how masked test data management eliminates the possibility of exposure of sensitive information to either hackers or malicious insiders, increases security and compliance, and allows dev/test teams to perform more complete and continuous testing in the cloud.
Secure Application Development InfoShare 2022Radu Vunvulea
This session aims to identify the tools that help us build secure applications and environments for Azure during the development journey. The focus is on the developers and the tools we can use to ensure that our code is secure and aligned with all the available best practices and recommendations.
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS June webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on information labels. Video recording is available at www.ciaopsacademy.com
If you follow the trade press, one theme you hear over and over again is that organizations are drowning in alerts. It’s true that we need technological solutions to prioritize and escalate the most important alerts to our analysts, but the humans have a critical part to play in this process as well. The quicker they are able to make decisions about the alerts they review, the better they are able to keep up. An incident responders’ most common task is alert triage, the process of investigation and escalation that ultimately results in the creation of security incidents. As crucial as this process is, there has been remarkably little written about how to do it correctly and efficiently. In this presentation, learn incident response best practices from Sqrrl security expert, David Bianco.
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
Real World Threat Hunting
Security threats have grown from network annoyances to attacks on sensitive infrastructure; penetrating network perimeters, moving laterally within networks, breaching new device types, and cloaking movements. This presentation will share techniques utilized by Cisco to detect and investigate sophisticated, embedded threats.
The speaker, who has conducted monitoring and investigations on customer networks, will review recent real attacks observed on customer networks, from discovery to remediation, and provide lessons learned. These interactive case examples will highlight how to identify these threats using security intelligence, expert staff, and the Cisco OpenSOC platform.
Examples of attacks and illustrations:
* Sophisticated phishing attacks targeted at customer environments.
* Breaches and data exfiltration resulting from the high-profile HeartBleed and Shellshock vulnerabilities.
* Sophisticated malware targeting financial institutions with the goal of data theft.
* Use of full packet capture to identify data exfiltration.
Organizations that have employees who are committed to maintaining online hygiene are better able to protect themselves and others from cyber attacks.
Staying safe online requires ongoing oversight at each touchpoint - from buying and setting up new devices, to ensuring day-to-day activities are not putting anyone at risk.
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsDelphix
Paying attention to data privacy and security is no longer optional. From a mega breach at Equifax to emerging regulations such as GDPR, data security is driving both today’s headlines and the IT initiatives of tomorrow. Join us for a fascinating discussion on how data privacy and security have evolved in 2017—and what to expect in 2018.
A Stratagem on Strategy: Rolling Security Testing into Product TestingKevin Fealey
Commercial software products rely on formal test strategies to describe who will perform testing, when testing will occur, the process that will be followed, the depth of testing, and more. Test strategies are extended by test plans that detail specific tests that will be executed and how success will be measured. Test strategies and plans support objectively evaluating that software meets requirements and functions properly.
Conversely, security teams think about where security gates should be in the SDLC and deploy SAST, DAST, IAST, manual testing, or a combination. Rarely is it considered what level of coverage these methods provide, and output from security testing is not mapped back to requirements. Compared to other teams involved in the SDLC, security seems to just be winging their test strategies and plans.
Especially in a DevOps environment where silos are broken and responsibilities are shared across dev, ops, test, and security, use of common methodologies will help to reduce confusion and improve pipeline throughput.
During this talk we will discuss:
- What are test strategies and how are they used by product teams to provide consistency in testing (something security generally lacks)?
- What are test plans and how are they used by product teams to enable visibly strong test coverage (something security also lacks)?
- In a DevOps environment, what is security’s role in existing test strategies?
- How can security teams leverage test plans to provide better visibility on test coverage and map findings back to requirements to reduce confusion and demonstrate security value to stakeholders throughout the value stream?
- What other lessons can we learn from how dev, ops, and test support quality deliveries that can enable more effective and efficient security (e.g. security as code)?
Slide deck from a series of webinars which were held in June 2020 on 'The avoidable security risks of remote working', following the outbreak of Covid-19.
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
Organizations receive an overwhelming amount of alerts every day from their SIEMs, IPS/IDS, next gen firewalls, etc. Result is too many alerts and not enough manpower, visibility across the organization or enough context to make the right decisions.
We look at every stage of the attack lifecycle…and on every port and protocol. With Fidelis there’s no place for attackers to hide.
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
Rick Holland of Forrester Research shares the results of his investigation into why targeted attacks on employees of businesses are increasing despite there being more information security products than ever.
Presented by Duo Security with guests Forrester Research and University of Tennessee, Knoxville
Agenda and Presenters
* How To Stop Targeted Attacks and Avoid “Expense In Depth” with Strong Authentication
Rick Holland, Principal Analyst, Forrester Research
* How Duo Helps You Avoid “Expense In Depth”
Brian Kelly, Principal Product Marketing Manager , Duo Security
* A Case for Multi-factor Authentication
Bob Hillhouse, Associate CIO and CISO University of Tennessee, Knoxville
Information security is not about reacting to attacks. Information security is about analyzing patterns and predicting potential threats by expanding the defense perimeter beyond the traditional borders.
World Wide Technology: Is backing up to the cloud right for you?Angie Clark
Data protection and retention is critically important for commercial and public sector organizations alike. In fact, it is said that three things keep a CIO up at night: data failure, time to recovery and ensuring IT is able to meet recovery point objectives.
Today, if you have a failure, the amount of time the business is without the data can determine if you need to start looking for a new job…
This presentation will help the attendees:
• Evaluate the business case for targeting your backups to the cloud
• Identify candidate data sets for cloud backup and assess opportunities and readiness
• Mitigate the challenges of backing up to the cloud
• Build a roadmap to your cloud implementation
WWT also provides some real-world experience via use cases and introduces several tools and methodologies used to evaluate, plan and execute your journey to cloud backup in this presentation.
To find out more about WWT’s Data Protection team, log on to wwt.com.
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
Axis Technology and Skytap provide tips on how masked test data management eliminates the possibility of exposure of sensitive information to either hackers or malicious insiders, increases security and compliance, and allows dev/test teams to perform more complete and continuous testing in the cloud.
Secure Application Development InfoShare 2022Radu Vunvulea
This session aims to identify the tools that help us build secure applications and environments for Azure during the development journey. The focus is on the developers and the tools we can use to ensure that our code is secure and aligned with all the available best practices and recommendations.
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
Slides from CIAOPS June webinar that provided Microsoft 365 news update, open Q & A as well as a focus session on information labels. Video recording is available at www.ciaopsacademy.com
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard APAC
Blackboard has deployed cloud solutions for well over a decade and is very excited to launch our new SaaS offering at the Teaching and Learning conference. The session will explore Blackboard’s continued commitment to managed hosting, partnership with IBM/AWS and next generation SaaS offerings that offer institutions unique control over their innovation journey.
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
As a regulated cloud user, security and compliance are two of your primary concerns, a workshop on how to keep secure and demonstrate your compliance to key stakeholders.
Specifically, what can be done to secure cloud resources and show compliance for auditors, investors, DDQs, SSAE16, covering:
- Strategies for securing data in transit and at rest
- Federating with your internal directory for role based access to your cloud
- Capturing and processing audit logs for security event notifications
- Fun with Infrastructure as Code – detecting and reverting misconfigurations and manual changes
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
Recently, Microsoft introduced Microsoft 365, which brings together Office 365, Windows 10, and Enterprise Mobility + Security. We’ll explore what this combination of products means for an organisation looking to ensure GDPR compliance and additional Office 365 products that you can layer to help you meet your obligations.
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopDenodo
Watch full webinar here: https://bit.ly/33yYuQm
Data virtualization has become an essential part of enterprise data architectures, bridging the gap between IT and business users and delivering significant cost and time savings. This technology revolutionizes the way data is accessed, delivered, consumed and governed regardless of its format and location.
This 1.5 hour discovery session will show help you identify the benefits of this modern and agile data integration and management technology for your organisation.
Speaker: Eddie Hui, Principal Sales Consultant, Informatica
These Informatica Cloud offerings are pre-built packages for quick time-to-value for customers looking to fast-track cloud data management initiatives. For example, customers can quickly kick start a new Amazon Redshift data warehouse project and use Informatica Cloud Connector for Amazon Redshift to load it with meaningful connected data from cloud sources such as Salesforce.com or on-premises sources such as relational databases -- all within hours, not months.
Microsoft Information Protection: Your Security and Compliance FrameworkAlistair Pugin
Its one thing encrypting and protecting your data from prying eyes but what use is it, if it is not retained or protected against loss. With Microsoft Information Protection, Microsoft provides organisations the ability to:
• Protection content from deletion
• Adhere to compliance standards (GDPR, HIPAA, etc)
• Discover content for litigation
• Manage access to content based on rules
By implementing the correct rules, organisations are able to mitigate risk and remain compliant and at the same time ensure that content is identified, classified, retained and disposed of accordingly.
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
To provide visibility and transparency into your data and usage, Cloudera Enterprise has Navigator, the only native end-to-end governance solution for Apache Hadoop. In this webinar we discuss why Navigator is a key part of comprehensive security and discuss its key features including: auditing, access control, data discovery and exploration, lineage, and lifecycle management. Live demo also included.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
3. CAREER
Privacy Engineer, Ph D. Specialization in
Learning Technologies and Performance Improvement
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
5. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
6. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
7. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
8. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
9. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
10. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
11. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
12. G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
13. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
14. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
15. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
16. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
17. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
18. EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
19. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
20. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
21. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
22. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
23. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
24. AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
25. SAAS, PAAS, IAAS
Opportunity for Growth and Expansion of Network Load
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
26. SaaS
• Office365 Apps, Google Drive
Sync Applications, Google Cloud
Search, Google Docs, Google
Sheets, Google Sites, Google
Drawings, Google App Maker,
Google Groups, Classroom,
Google Voice, Google Chat,
Google Meet, Google Jamboard,
Google Hangout, Google Chrome
Browser, Google Cromebook,
Google Drive on the Web
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
27. PaaS
• Google App Engine. SaaS
product hosted and run all the
applications. Google Cloud
Platform for traffic growth and
continued protection.
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
28. IaaS
• full control of fine-grained settings.
(cpu-power, memory, hard-drive
capacity,...) and using them however
you like. You can install your own
operating system and fully customize
it however you want, but you also get
the benefit of automatic scaling and
load-balancing. Easy to just take your
own already-existing applications,
convert them to running on the cloud
and reap all benefits along the way!
• Google Container Engine
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
29. Compliance
Why wait until hacking, data leak, unsecure documentation exchange
and fines are an issue against your company's online reputation?
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
30. Regulation for Privacy, Protection and Auditing.
Compliance Models
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
32. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
33. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
34. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
35. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
36. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
37. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
38. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
39. STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
40. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
41. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
42. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
43. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
44. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
45. STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
46. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
47. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
48. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
49. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
50. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
51. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
52. Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
53. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
54. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
55. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
56. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
57. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
58. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
59. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
60. Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
61. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
62. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
63. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
64. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
65. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
66. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
67. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
68. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
69. Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
Dr. Levitch: Specialization for G Suite Education
https://rachellevitch.com
Privacy Engineering
Chief Information Security
Governance
Executive Board Presenter
Compliance Models
Training and Education
Auditing/Risk