This document discusses strategic leadership of ICT in schools. It emphasizes that school leaders play a key role in translating visions of technology integration into reality through strategic planning. Effective strategic goals focus on student outcomes and are SMART. Strategic plans should involve collecting evidence, defining issues, setting goals, and determining actions, monitoring, and evaluation. Leaders must enable and support teacher professional development and technology literacy for 21st century learners.
Learn about Lightwell's B2B Framework that includes:
- Over 300 pre-built components and assets
- Pre-defined, configurable rules-based processes for most common communication, translation, and routing needs
- Centralized visibility and control of documents and processes
- End-to-end visibility and 360° life-cycle tracking
- Simplified trading partner onboarding and management
- Secure, role-based access for business users and partners
- Individualized dashboards and reporting for business and technical users
- And more
At the highest level, our mission continues to be about keeping our customers (companies and governments) safe from ever-evolving digital threats, so they are confident to move business forward. Our strategy to accomplish this mission centers around four key pillars: Advanced Threat Protection, Information Protection for On Premise and Cloud, Security as a Service -- all anchored by a Unified Security Analytics Platform. Symantec Data Loss Prevention is a foundational product in the Information Protection for On Premise and Cloud pillar.
Everyone knows that storing and accessing data and applications in the cloud and on mobile devices provides makes work much easier and productive by allowing employees to work everywhere they need to.
It allows for great business agility – applications are always up to date, new functionality and processes can be deployed and activated quickly and organizations can adjust things on the fly if they need to.
It also brings the convenience factor – all employees to work in the way that they need to, collaboration and sharing is made vastly easier with cloud applications and storage.
But it brings with it all the challenges of securing devices and applications that your don’t own, and whilst saying NO might be the right thing for security, end users will find a way around it. Right now, close to 30% of employees use their personal devices for work. And that number is on the rise, potentially turning BYOD into Bring Your Own Disaster.
THE IT PROJECT THAT COST TAXPAYERS NEARLY $170 MILLION
Harry Goldstein
IEEE Spectrum, September 2005
FBI IT begins Upgrade Project
Virtual Case File (VCF)
planned to replace the
Automated Case Support (ACS) system
$379.8 million
Governance of IT
COBIT Background
COBIT and Other frameworks
COBIT Principles
COBIT Goals
COBIT Objectives
COBIT Components
COBIT Design factors
COBIT Focus areas
COBIT Performance management
Designing and implementing a governance system
Learn about Lightwell's B2B Framework that includes:
- Over 300 pre-built components and assets
- Pre-defined, configurable rules-based processes for most common communication, translation, and routing needs
- Centralized visibility and control of documents and processes
- End-to-end visibility and 360° life-cycle tracking
- Simplified trading partner onboarding and management
- Secure, role-based access for business users and partners
- Individualized dashboards and reporting for business and technical users
- And more
At the highest level, our mission continues to be about keeping our customers (companies and governments) safe from ever-evolving digital threats, so they are confident to move business forward. Our strategy to accomplish this mission centers around four key pillars: Advanced Threat Protection, Information Protection for On Premise and Cloud, Security as a Service -- all anchored by a Unified Security Analytics Platform. Symantec Data Loss Prevention is a foundational product in the Information Protection for On Premise and Cloud pillar.
Everyone knows that storing and accessing data and applications in the cloud and on mobile devices provides makes work much easier and productive by allowing employees to work everywhere they need to.
It allows for great business agility – applications are always up to date, new functionality and processes can be deployed and activated quickly and organizations can adjust things on the fly if they need to.
It also brings the convenience factor – all employees to work in the way that they need to, collaboration and sharing is made vastly easier with cloud applications and storage.
But it brings with it all the challenges of securing devices and applications that your don’t own, and whilst saying NO might be the right thing for security, end users will find a way around it. Right now, close to 30% of employees use their personal devices for work. And that number is on the rise, potentially turning BYOD into Bring Your Own Disaster.
THE IT PROJECT THAT COST TAXPAYERS NEARLY $170 MILLION
Harry Goldstein
IEEE Spectrum, September 2005
FBI IT begins Upgrade Project
Virtual Case File (VCF)
planned to replace the
Automated Case Support (ACS) system
$379.8 million
Governance of IT
COBIT Background
COBIT and Other frameworks
COBIT Principles
COBIT Goals
COBIT Objectives
COBIT Components
COBIT Design factors
COBIT Focus areas
COBIT Performance management
Designing and implementing a governance system
Building a modern monitoring environment is more than just using the latest awesome tools, collecting all of the data, displaying numerous graphs and knowing when things go wrong. A modern monitoring environment is more than tools and infrastructure. It's a service. A service you provide to your whole team: developers, operations, security, and the business. This talk is about how you can build monitoring environments (or extend your existing environment) that are customer-focussed rather than infrastructure focussed. We'll see how you can treat your needs and the needs of your organization as customer requirements and build monitoring that is consumable and configurable on demand.
Building a modern monitoring environment is more than just using the latest awesome tools, collecting all of the data, displaying numerous graphs and knowing when things go wrong. A modern monitoring environment is more than tools and infrastructure. It's a service. A service you provide to your whole team: developers, operations, security, and the business. This talk is about how you can build monitoring environments (or extend your existing environment) that are customer-focussed rather than infrastructure focussed. We'll see how you can treat your needs and the needs of your organization as customer requirements and build monitoring that is consumable and configurable on demand.
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
Cybersecurity requires an organization to collect data, analyze it, and alert on cyber anomalies in near real-time. This is a challenging endeavor when considering the variety of data sources which need to be collected and analyzed. Everything from application logs, network events, authentications systems, IOT devices, business events, cloud service logs, and more need to be taken into consideration. In addition, multiple data formats need to be transformed and conformed to be understood by both humans and ML/AI algorithms.
To solve this problem, the Aetna Global Security team developed the Unified Data Platform based on Apache NiFi, which allows them to remain agile and adapt to new security threats and the onboarding of new technologies in the Aetna environment. The platform currently has over 60 different data flows with 95% doing real-time ETL and handles over 20 billion events per day. In this session learn from Aetna’s experience building an edge to AI high-speed data pipeline with Apache NiFi.
An in-depth discussion of the key trends driving card-not-present transactions and the subsequent increase in demand for smart transaction security solutions; includes a detailed review of the various transaction security technologies and solutions available for merchants and issuers
Trust is no longer a factor of geography - your users have left the building aka your inside perimeter. Trust No One and secure your data and digital assets through adaptive access.
Akamai Security World Tour Stockholm May 14, 2019
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
Materi Perkuliahan Control and Auditing Information System in Uin Suska Riau.
About Fundamental and Theory Control and Audit. Where this Slide just Theory, not spesific because it just job from teacher in the class.
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
ISACA IS Audit and Assurance Standards, Guidelines, and Tools & Techniques, Code of Professional Ethics & other applicable standard.
https://www.infosectrain.com/blog/cisa-domain-1-part-3-the-process-on-auditing-information-systems/
Effectively Planning for an Enterprise-Scale CMDB ImplementationAntonio Rolle
Provies a review of why a CMDB is essential to and is the foundation of your BSM strategy. I also outline the known challenges that require planning at the outset of a CMDB initiative. Includes a case study which details the approach and lessons learned in the initial stages of a CMDB rollout for one of the largest financial institutions in North America
Successful leaders and managers are always keen to expect the unexpected and plan for it. the More you plan is the less you react, and the less you react, the less you make mistakes.
Disruptions to your business can result in data risk, revenue loss, and Failure to deliver services
That’s why organizations need strong business continuity planning.
Cloud security providers are in an ever changing world. Traditionally the CCM was pointed to as an authoritative guidance.
Now organizations have the opportunity to undergo third party assessments, through the STAR Programs, to validate maturity level or control activities.
This deck will provide:
• A background and overview of the programs
• The CSA Attestation/Certification methodology and testing
• A side by side comparison
• The benefits and challenges
This presentation provides a summary of the paper by Newhouse, P. (2010) School leadership critical to maximising the impact of ICT on learning. Melbourne: ACEC2010 Digital Diversity Conference.
Building a modern monitoring environment is more than just using the latest awesome tools, collecting all of the data, displaying numerous graphs and knowing when things go wrong. A modern monitoring environment is more than tools and infrastructure. It's a service. A service you provide to your whole team: developers, operations, security, and the business. This talk is about how you can build monitoring environments (or extend your existing environment) that are customer-focussed rather than infrastructure focussed. We'll see how you can treat your needs and the needs of your organization as customer requirements and build monitoring that is consumable and configurable on demand.
Building a modern monitoring environment is more than just using the latest awesome tools, collecting all of the data, displaying numerous graphs and knowing when things go wrong. A modern monitoring environment is more than tools and infrastructure. It's a service. A service you provide to your whole team: developers, operations, security, and the business. This talk is about how you can build monitoring environments (or extend your existing environment) that are customer-focussed rather than infrastructure focussed. We'll see how you can treat your needs and the needs of your organization as customer requirements and build monitoring that is consumable and configurable on demand.
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
Cybersecurity requires an organization to collect data, analyze it, and alert on cyber anomalies in near real-time. This is a challenging endeavor when considering the variety of data sources which need to be collected and analyzed. Everything from application logs, network events, authentications systems, IOT devices, business events, cloud service logs, and more need to be taken into consideration. In addition, multiple data formats need to be transformed and conformed to be understood by both humans and ML/AI algorithms.
To solve this problem, the Aetna Global Security team developed the Unified Data Platform based on Apache NiFi, which allows them to remain agile and adapt to new security threats and the onboarding of new technologies in the Aetna environment. The platform currently has over 60 different data flows with 95% doing real-time ETL and handles over 20 billion events per day. In this session learn from Aetna’s experience building an edge to AI high-speed data pipeline with Apache NiFi.
An in-depth discussion of the key trends driving card-not-present transactions and the subsequent increase in demand for smart transaction security solutions; includes a detailed review of the various transaction security technologies and solutions available for merchants and issuers
Trust is no longer a factor of geography - your users have left the building aka your inside perimeter. Trust No One and secure your data and digital assets through adaptive access.
Akamai Security World Tour Stockholm May 14, 2019
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
Materi Perkuliahan Control and Auditing Information System in Uin Suska Riau.
About Fundamental and Theory Control and Audit. Where this Slide just Theory, not spesific because it just job from teacher in the class.
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
ISACA IS Audit and Assurance Standards, Guidelines, and Tools & Techniques, Code of Professional Ethics & other applicable standard.
https://www.infosectrain.com/blog/cisa-domain-1-part-3-the-process-on-auditing-information-systems/
Effectively Planning for an Enterprise-Scale CMDB ImplementationAntonio Rolle
Provies a review of why a CMDB is essential to and is the foundation of your BSM strategy. I also outline the known challenges that require planning at the outset of a CMDB initiative. Includes a case study which details the approach and lessons learned in the initial stages of a CMDB rollout for one of the largest financial institutions in North America
Successful leaders and managers are always keen to expect the unexpected and plan for it. the More you plan is the less you react, and the less you react, the less you make mistakes.
Disruptions to your business can result in data risk, revenue loss, and Failure to deliver services
That’s why organizations need strong business continuity planning.
Cloud security providers are in an ever changing world. Traditionally the CCM was pointed to as an authoritative guidance.
Now organizations have the opportunity to undergo third party assessments, through the STAR Programs, to validate maturity level or control activities.
This deck will provide:
• A background and overview of the programs
• The CSA Attestation/Certification methodology and testing
• A side by side comparison
• The benefits and challenges
This presentation provides a summary of the paper by Newhouse, P. (2010) School leadership critical to maximising the impact of ICT on learning. Melbourne: ACEC2010 Digital Diversity Conference.
Becta Impact09 data reanalysed: E-maturity and ICT adoption in UK schoolsColin Harrison
EARLI Conference - Munich 2013
Symposium: Educational technology acceptance- Explaining non-significant intention-behavior effects
Full paper title: An e-maturity analysis explains intention-behavior disjunctions
in technology adoption in UK schools
Abstract
This paper addresses the problem of non-significant intention-behavior effects in educational technology adoption, based on a reanalysis of data from the Impact09 project, a UK-government funded evaluation of technology use in high schools in England that had been selected as representing outstanding Information and Communications Technologies (ICT) innovation. The reanalysis focuses on intentionality and teleology, and attempts to combine an ecological perspective with a critical analysis of the intention-behavior correlations among participants, particularly teachers and head teachers. The concept of self-regulation is also considered as a determinant of behavior. The study reports a qualitative analysis of extensive interview data from four schools, and makes use of Underwood’s concept of ‘linkage e-maturity’. Traditional models of technology acceptance often assumed a steady trajectory of innovation, but such studies failed to explain uneven patterns of adoption. In this reanalysis, an emphasis on learning practices and e-maturity, interpreted within local and system-wide ecological contexts, better explained uneven adoption patterns.
Presentation by Colin Harrison, Carmen Tomás, Charles Crook
Lean Coffee is an structured but agenda less meeting that allows participants to gather, build and talk.
Our implementation of Lean coffee was a way to informally discuss what was important to the team and look at ways to improve our efficiency, effectiveness and processes within the service delivery team
The presentation focuses on the information management framework they use at the Parliament of SA to improve information management maturity in a measurable manner. He touches on information requirements management, information quality management, the role of an information architecture, integration layer and analytics in information management.
Download this presentation(and more) at http://opengroup.co.za/presentations
In this presentation, delivered for Vlerick Management school. I explain how to use the concept of lean in ICT. This presentation is scheduled to be together with 2 other talks. I dropped important aspects, that the other speakers already mention.
This model is one of the most used mode in the industry to align the Business with IT.
This helps to have an strategic edge over the competitor and see how and what function are affecting each other. Along with knowing that which is the core function that is driving the business.
In the past resource management, a key issue has been how to improve the internal school process to add value through school effectiveness. The answer: a new trend in school management
-knowledge base with empowerment,
to maximize its resources for
operation and continuous development
in management, teaching & learning,
within the new changing 21st century
that adds value
Course Outline
1. Definition & Introduction
Strategic Management
Strategic Educational Management and
Effective Educational Leadership
Basic competences of Educational Mgmt.
2.Sustainable improvement as a key aim of:
Educational Management
Educational Practice
Managing School Resources
Effective Teaching Principals
3. Strategic Management in Education
8 Characterizing features
3 key components 1.Systemic Strategic Thinking, 2. Organizational
Learning and 3. Pedagogical leadership
4. Implications for improving educational practice
5. Conclusion
Strategic Management provides overall direction to the organization and involves; specifying the organization's objectives, developing policies and plans designed to achieve
these objectives, and then allocating resources to implement the plans.
Strategic Management involves the formulation and implementation of the major goals and initiatives taken by top management on behalf of owners, …based on consideration of resources and an assessment of the internal and external environments in which the organization competes.
Class project for EdTech 501
A sample Technology Use Plan for a fictional school as a ppt presentation to a school and community team as an educational technician
A presentation looking at today's education landscape and the role of technology. Also included is a view of how Google Apps for Education can be used within the instructional program
This is the set of slides used throughout the first coalition ICT workshop held in Cape Town on the 22nd February 2011. This session was facilitated by John Thole of Edunova
5. The Impact of Technology “Technology will transform culture in ways we cannot predict. Our students live in a different world to us. Some consider that digital technology is the biggest generation divider since rock and roll. The generation that downloads 2 billion ring tones every year, 2 billion songs every month, and 6 billion text messages every day, learns through instant messaging and chat, and through blogs. They exchange peer to peer, they learn from Wikipedia and YouTube, they meet in Second Life and they game online in multi-player games, and on their cell phones.” (Marc Prensky) Marc Prensky: “Don’t Bother Me Now, I’m Learning” Published 2007
14. Attributes of Effective ICT Leadership “It is important for the school principals to lead not just support the integration of ICT into teaching and learning” (Kathryn Moyle 2006 Voices from the Profession)
15. The Research Base for What Follows Leadspace ICT Leadership (NZ) Becta: Leadership and Management section (UK) These sites also provide tools and templates to assist in needs analysis and planning
20. Ensuring an orderly and supportive environment Robinson 2008: Keynote to ICSEI conference
21. Effective leadership “ Leadership is the capacity to translate vision into reality.” (Warren G. Bennis)
22. But School Leaders Aren’t the Only Strategic Players School leaders are crucial in leading and enabling change but, like their teachers, they too need to be working in an enabling environment in which central agencies: Support infrastructural developments Make bulk purchases on behalf of schools Coordinate and rationalise initiatives Minimise policy shifts
23.
24. Planning for ICT development School mission vision and goals Stage 1 Strategic objectives and timelines Stage 2 School Annual plan Stage 3 ICT Action Plan Stage 4
25. The Fridge-Freezer Analogy What we store in the home freezer is what we intend to use over a long period of time - it is like a strategic plan What we store in the fridge is for more our more immediate use – it is like an annual or action plan
45. Teaching and learning through technology. We have a responsibility to act as a catalyst for change disseminating our expertise to the wider educational community;
47. We represent the practical application of innovative teaching and learning theories
48.
49. Using Evidence for Planning Collect and interpret data: eg data shows computer use is largely restricted to completion of worksheets Define the strategic issue: eg student achievement and engagement Write a strategic goal: eg at Grade 8, Project based learning will be trialed with computers as a key learning tool Define strategic actions: eg develop an action plan which includes outcomes, actions, responsibilities, time-frames resources needed etc Determine how actions will be monitored/reviewed/ evaluated
50. Effective leadership “ Leadership is the capacity to translate vision into reality.” (Warren G. Bennis)
57. Possible ICT Strategic Goals To institute a school-wide Managed Learning Environment which enables teachers and students to store and share digital resources and collaborate in learning and teaching To evaluate current technical infrastructure to inform a 5 year infrastructure development To plan for learning and teaching approaches which personalise learning encourage informed choices of appropriate ICTs include creation of a digital products for a real-world audiences
58.
59. Those most affected by planning must be part of that planning or represented in the planning process
61. There must be a chance for internal critique and feedback if there is to be buy-in/ownership
62. The format is less important than the process, but it should include accountability and sustainability mechanisms, for example:
63.
64. Teacher Must Drive Their Own Development Teachers world-wide are suffering from innovation fatigue If they are not in control of their own professional learning then the response will be this.
65. Professional learning– 7 key elements cont… Extended time for opportunities to learn was necessary but not sufficient External expertise was typically necessary but not sufficient Teachers’ engagement in learning at some point was more important than initial volunteering Prevailing discourses challenged Opportunities to participate in a professional community of practice were more important than place Consistency with wider trends in policy and research And Number 7?
66. Active School Leadership Leaders whose actions impacted on student learning: actively organised a supportive environment focused on developing a learning culture within the school and were learners along with the teachers provided alternative visions and targets for student outcomes and monitored whether these were met created the conditions for distributing leadership by developing the leadership of others. Timperly et al (2008) Teacher Professional Development and Learning Best Evidence Synthesis
68. In Summary Leaders are central to any change Leaders grow leaders Without a vision you won’t know your direction so are likely to get lost Leadership is about enabling, supporting and modelling change Planning and review are critical Planning can’t be done to people – if real change is wanted, participant involvement is fundamental Superficial change is easy; real change takes time and pain.
Editor's Notes
Have you seen this? If you are in a school, talk to a neighbour about where you think your school might be? Let’s see some hands.
You’ve probably been exposed to a raft of presentations about why we need to get serious about the use of ICTs. I prefer to think that we need to get serious about learning and ICTs are a serious learning tool
He is worth reading
How are you going as a schools in these areas? How about nationally?
And this is the exciting side – the stuff the workshops in this conference focus on -but you’re leaders and you’ve got to enable it to happen
This is particulalry so with the technical aspects
Is this the process most of you have been through in your schools? If I was to ask you to tell your neighbour your school vision and long term strategies, what would you say………? OK I won’t do that.
An audit of the current situation puts a school in a position to create a vision, collaboratively; A vision provides an ideal upon which to build a learning community – to enable change – as long as that vision is shared.
All of which is simply rhetoric unless it is translated into rigourous action or implementation plans
Let’s look at the pieces of one school plan related to aspects other than professional development