SlideShare a Scribd company logo
Dr. Rachel Levitch
Consultation: G Suite For Education
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 1
Dr. Rachel
Levitch
Specialization
PROFESSION &
SPECIALIZATION
DATA LOSS PREVENTION
CLOUD APPLICATION
SECURITY
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 2
CAREER
Privacy Engineer, Ph D. Specialization in
Learning Technologies and Performance Improvement
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 4
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• Solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• a blend of security
• visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
G SUITE FOR
EDCUATION
MODEL
• STANDARD
• Securing Your G Suite
Cloud Environment
• solely relying on G Suite
security, your
company’s data is likely
vulnerable to data
breaches, both
unintentional and
malicious
• SPECIALIZATION
• Layered of Security
and Visibility
• A blend of security
• Visibility and
control to account
activity,
• 3rd party
application usage,
• Content sharing
within corporate
environment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
EMAIL & FILE
SECURITY
EXCHANGE
• STANDARD
• Google security extends
supported file types to
include files such as
PDFs and JPGs
• SPECIALIZATION
• Layered of Security and
Visibility
• Extends beyond
Google supported
file types to include
files such as PDFs
and JPGs.
• OAuth based
applications,
including Office 365,
Slack, Dropbox, and
Box
• Templated or
customized policies
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
AUDITING &
REPOSITORY
• STANDARD
• Security Essentials
Compliance
• SPECIALIZATION
• Save Time Running
Reports and
Auditing
• Auditing cloud
environment,
• Running
security
reports, and
• Understanding
trends easier
and less time-
consuming
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
SAAS, PAAS, IAAS
Opportunity for Growth and Expansion of Network Load
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
SaaS
• Office365 Apps, Google Drive
Sync Applications, Google Cloud
Search, Google Docs, Google
Sheets, Google Sites, Google
Drawings, Google App Maker,
Google Groups, Classroom,
Google Voice, Google Chat,
Google Meet, Google Jamboard,
Google Hangout, Google Chrome
Browser, Google Cromebook,
Google Drive on the Web
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
PaaS
• Google App Engine. SaaS
product hosted and run all the
applications. Google Cloud
Platform for traffic growth and
continued protection.
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
IaaS
• full control of fine-grained settings.
(cpu-power, memory, hard-drive
capacity,...) and using them however
you like. You can install your own
operating system and fully customize
it however you want, but you also get
the benefit of automatic scaling and
load-balancing. Easy to just take your
own already-existing applications,
convert them to running on the cloud
and reap all benefits along the way!
• Google Container Engine
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
Compliance
Why wait until hacking, data leak, unsecure documentation exchange
and fines are an issue against your company's online reputation?
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
Regulation for Privacy, Protection and Auditing.
Compliance Models
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
State of Connecticut
Department of Education
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 31
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
STATE OF CONNECTICUT
Department of
Education
• Federal Family Educational Rights and Privacy
Act (FERPA)
• Ensure that everyone utilizing platforms, including staff,
parents, and guardians, and to the extent appropriate,
students, are aware of the unique privacy issues that might
arise with virtual learning, and suggest families consider risks
with online communications
Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
STATE OF CONNECTICUT
Department of
Education
• Student Privacy Policy Office (SPPO) of the US
Department of Education
• The Commissioner has waived certain requirements of
Connecticut’s data privacy statutes with respect to individual
district contracting with providers of online services
Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
Many IT managers and system admins in school districts don’t realize
that their traditional network security solutions, such as firewalls and
MTAs aren’t applicable when it comes to the protection of children,
family guardian and staff.
Recommendations
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
Recommendations
• State Compliance Certification
• FERPA, State of Connecticut Department of Education,
Connecticut Public Act 16-189 "An Act Concerning
Student Data Privacy“, CT Stamford Public Schools
Approved Learning Resources for Preschoolers and
Guardians Online
• Google Cloud Certifications
• Professional Cloud Network Engineer, Professional
Cloud Security Engineer, Professional Collaboration
Engineer
• Additional Security Applications
• 3-year Strategy Plan for Technology
• 24-hr. monitoring for IT Teams and Continued Training
• Gaming Training Model for Teachers, Staff, and Guardians
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
Recommendations
…..continued
• IT Teams Recommendation and How to
• Threat Protection
• Discover and control unsanctioned EdTech SaaS applications
with risky access permissions
• scanning technology, combined with partnerships with top threat protection
solutions
• Account Monitoring
• 24/7 monitoring of login locations, file sharing, download activity,
and more
• Customizable rules and policies that automate account activity
control
• Automated compliance notifications and risk reporting
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 70
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 71
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 72
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 73
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 74
Recommendations
…..continued
•IT TEAM FOR INFRASTRUCTURE:
•Guidance…
•Planning…
•Resources and..
•Commitment
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 75
Dr. Rachel Levitch
Consultation: G Suite For Education
???
???
???
Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 76

More Related Content

What's hot

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
Deploy360 Programme (Internet Society)
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
MarketingArrowECS_CZ
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
Sqrrl
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Veritas Technologies LLC
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
Media Sonar
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
Delphix
 
A Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product TestingA Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product Testing
Kevin Fealey
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
Richard Kennedy
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
Fidelis Cybersecurity
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
Veritas Technologies LLC
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Brian Kelly
 
BSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit TrendsBSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit Trends
Ed Bellis
 

What's hot (13)

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
A Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product TestingA Stratagem on Strategy: Rolling Security Testing into Product Testing
A Stratagem on Strategy: Rolling Security Testing into Product Testing
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
BSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit TrendsBSidesLV Vulnerability & Exploit Trends
BSidesLV Vulnerability & Exploit Trends
 

Similar to Dr levitich Consult G Suite for Education

Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
Joe Hage
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Albert Hoitingh
 
World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?
Angie Clark
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022
Radu Vunvulea
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
Robert Crane
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard APAC
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
Hentsū
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Denodo
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
Amazon Web Services
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
Alistair Pugin
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_securityDoina Draganescu
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Cloudera, Inc.
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
Joanne Klein
 
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science WorkbenchNOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA DATASCIENCE
 

Similar to Dr levitich Consult G Suite for Education (20)

Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
 
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
briefing
briefingbriefing
briefing
 
World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?World Wide Technology: Is backing up to the cloud right for you?
World Wide Technology: Is backing up to the cloud right for you?
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security5. 2010 11-03 bucharest oracle-tech_day_security
5. 2010 11-03 bucharest oracle-tech_day_security
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science WorkbenchNOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
NOVA Data Science Meetup 2-21-2018 Presentation Cloudera Data Science Workbench
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

Dr levitich Consult G Suite for Education

  • 1. Dr. Rachel Levitch Consultation: G Suite For Education Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 1
  • 2. Dr. Rachel Levitch Specialization PROFESSION & SPECIALIZATION DATA LOSS PREVENTION CLOUD APPLICATION SECURITY Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 2
  • 3. CAREER Privacy Engineer, Ph D. Specialization in Learning Technologies and Performance Improvement Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 3
  • 4. Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 4
  • 5. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 5
  • 6. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 6
  • 7. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 7
  • 8. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • a blend of security • visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 8
  • 9. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • Solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 9
  • 10. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 10
  • 11. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • a blend of security • visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 11
  • 12. G SUITE FOR EDCUATION MODEL • STANDARD • Securing Your G Suite Cloud Environment • solely relying on G Suite security, your company’s data is likely vulnerable to data breaches, both unintentional and malicious • SPECIALIZATION • Layered of Security and Visibility • A blend of security • Visibility and control to account activity, • 3rd party application usage, • Content sharing within corporate environment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 12
  • 13. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 13
  • 14. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 14
  • 15. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 15
  • 16. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 16
  • 17. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 17
  • 18. EMAIL & FILE SECURITY EXCHANGE • STANDARD • Google security extends supported file types to include files such as PDFs and JPGs • SPECIALIZATION • Layered of Security and Visibility • Extends beyond Google supported file types to include files such as PDFs and JPGs. • OAuth based applications, including Office 365, Slack, Dropbox, and Box • Templated or customized policies Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 18
  • 19. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 19
  • 20. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 20
  • 21. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 21
  • 22. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 22
  • 23. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 23
  • 24. AUDITING & REPOSITORY • STANDARD • Security Essentials Compliance • SPECIALIZATION • Save Time Running Reports and Auditing • Auditing cloud environment, • Running security reports, and • Understanding trends easier and less time- consuming Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 24
  • 25. SAAS, PAAS, IAAS Opportunity for Growth and Expansion of Network Load Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 25
  • 26. SaaS • Office365 Apps, Google Drive Sync Applications, Google Cloud Search, Google Docs, Google Sheets, Google Sites, Google Drawings, Google App Maker, Google Groups, Classroom, Google Voice, Google Chat, Google Meet, Google Jamboard, Google Hangout, Google Chrome Browser, Google Cromebook, Google Drive on the Web Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 26
  • 27. PaaS • Google App Engine. SaaS product hosted and run all the applications. Google Cloud Platform for traffic growth and continued protection. Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 27
  • 28. IaaS • full control of fine-grained settings. (cpu-power, memory, hard-drive capacity,...) and using them however you like. You can install your own operating system and fully customize it however you want, but you also get the benefit of automatic scaling and load-balancing. Easy to just take your own already-existing applications, convert them to running on the cloud and reap all benefits along the way! • Google Container Engine Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 28
  • 29. Compliance Why wait until hacking, data leak, unsecure documentation exchange and fines are an issue against your company's online reputation? Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 29
  • 30. Regulation for Privacy, Protection and Auditing. Compliance Models Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 30
  • 31. State of Connecticut Department of Education Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 31
  • 32. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 32
  • 33. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 33
  • 34. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 34
  • 35. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 35
  • 36. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 36
  • 37. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 37
  • 38. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 38
  • 39. STATE OF CONNECTICUT Department of Education • Federal Family Educational Rights and Privacy Act (FERPA) • Ensure that everyone utilizing platforms, including staff, parents, and guardians, and to the extent appropriate, students, are aware of the unique privacy issues that might arise with virtual learning, and suggest families consider risks with online communications Resource: Connecticut Educational Software Hub at https://connecticut.learnplatform.com/ Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 39
  • 40. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 40
  • 41. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 41
  • 42. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 42
  • 43. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 43
  • 44. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 44
  • 45. STATE OF CONNECTICUT Department of Education • Student Privacy Policy Office (SPPO) of the US Department of Education • The Commissioner has waived certain requirements of Connecticut’s data privacy statutes with respect to individual district contracting with providers of online services Resource: Connecticut Commission for Educational Technology at http://www.ct.gov/edtechDr. Rachel Levitch copyright 09/14/2020- 09/14/2030 45
  • 46. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 46
  • 47. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 47
  • 48. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 48
  • 49. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 49
  • 50. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 50
  • 51. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 51
  • 52. Many IT managers and system admins in school districts don’t realize that their traditional network security solutions, such as firewalls and MTAs aren’t applicable when it comes to the protection of children, family guardian and staff. Recommendations Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 52
  • 53. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 53
  • 54. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 54
  • 55. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 55
  • 56. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 56
  • 57. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 57
  • 58. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 58
  • 59. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 59
  • 60. Recommendations • State Compliance Certification • FERPA, State of Connecticut Department of Education, Connecticut Public Act 16-189 "An Act Concerning Student Data Privacy“, CT Stamford Public Schools Approved Learning Resources for Preschoolers and Guardians Online • Google Cloud Certifications • Professional Cloud Network Engineer, Professional Cloud Security Engineer, Professional Collaboration Engineer • Additional Security Applications • 3-year Strategy Plan for Technology • 24-hr. monitoring for IT Teams and Continued Training • Gaming Training Model for Teachers, Staff, and Guardians Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 60
  • 61. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 61
  • 62. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 62
  • 63. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 63
  • 64. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 64
  • 65. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 65
  • 66. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 66
  • 67. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 67
  • 68. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 68
  • 69. Recommendations …..continued • IT Teams Recommendation and How to • Threat Protection • Discover and control unsanctioned EdTech SaaS applications with risky access permissions • scanning technology, combined with partnerships with top threat protection solutions • Account Monitoring • 24/7 monitoring of login locations, file sharing, download activity, and more • Customizable rules and policies that automate account activity control • Automated compliance notifications and risk reporting Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 69
  • 70. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 70
  • 71. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 71
  • 72. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 72
  • 73. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 73
  • 74. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 74
  • 75. Recommendations …..continued •IT TEAM FOR INFRASTRUCTURE: •Guidance… •Planning… •Resources and.. •Commitment Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 75
  • 76. Dr. Rachel Levitch Consultation: G Suite For Education ??? ??? ??? Dr. Rachel Levitch copyright 09/14/2020- 09/14/2030 76

Editor's Notes

  1. Dr. Levitch: Specialization for G Suite Education https://rachellevitch.com Privacy Engineering Chief Information Security Governance Executive Board Presenter Compliance Models Training and Education Auditing/Risk