SlideShare a Scribd company logo
1 of 56
Prevent
Steve Kennett, Head of operational Services
and Senior information risk owner
The Cyber threat
We live in an inter-connected
world that we could not have
imagined even two decades ago
»While it brings almost limitless
opportunities, there are also
threats. It is absolutely vital
that the applications and
connections we use are as
secure as possible
2/03/2016
EdVaizey MP
Minister for culture and the digital economy
Cost of breaches continues to soar
2/03/2016 Prevent
‘Starting
point’
» for breach costs which includes elements such as business disruption,
lost sales, recovery of assets, and fines and compensation
£1.46m -
£3.14m
» is the average cost to a large organisation
» up from £600k - £1.15m a year ago
£75k - £311k
» is the average cost to a small business
» up from £65k - £115k a year ago
Computer Security Incident ResponseTeam - CSIRT
2/03/2016 Prevent
Computer Security Incident ResponseTeam
»Safeguarding your current and future computer security, with a
primary function to monitor and resolve any security incidents that
occur on the Janet network
»Our mission is to create a secure environment to conduct your
online activities. Our primary function is monitor and resolve any
security incidents that occur on the network, with specialists
tracking a range of platforms, including Unix, Linux and Windows
Janet network CSIRT
2/03/2016 Prevent
Computer Security Incident ResponseTeam
»We work closely with our community to detect, report and
investigate incidents that pose a threat to the security of our
customers' information systems. We also investigate other forms of
network abuse such as spam and copyright infringement
»Due to the geographical scope of incidents, we assist national and
international law enforcement agencies in their investigations,
connecting them to our trusted contacts within the community
Janet network CSIRT
2/03/2016 Prevent
Computer Security Incident ResponseTeam
Csirt 7 security specialists engage with
2/03/2016 Prevent
CSIRT - Cost benefits
Costs: time to fix the breach, remove infection from computers, deal with
questions, inform staff and students, time that systems are unavailable to staff and
students, fines and compensation, business loss, reputational damage.
» 12.5% of organisations using Janet avoid having one severe security breach
annually due to the existence of CSIRT;
» Using the figures in the BIS report and working with the Jisc SSU
ȣ22.5 million
2/03/2016 Prevent
BIS report “2015
Information Security
Breaches Survey”
£1.46m
to £3.14m
Average cost to a business
of its worst security
breach of the year.
£75k
to £311k
Large
Small
Scary but true
2/03/2016 Prevent
jisc.ac.uk
Computer Security Incident ResponseTeam
Visit the Janet network CSIRT blog
0300 999 2340
irt@csirt.ja.net
2/03/2016 Prevent
Prevent
Jisc PREVENT activities
»Working closely with BIS and HomeOffice
»Keeping AoC and UUK informed
»HM Government workshop to raise awareness of Prevent
»Statutory regulation advice and assistance
› Blog posts
› Speak at conferences
› Web filtering
»Working in partnership with the Education andTraining Foundation
2/03/2016 Prevent
Prevent
»Home Office Prevent duty event in:
› Birmingham, Oldham, Bristol and Luton
»Safeguarding conference at College development network in:
› Stirling Scotland
»The joint Learning for Higher Education (LFHE) and HEFCE
conference Policy into practice;The Leadership Challenge;
CounterTerrorismAct 2015:
› Bristol and Manchester
Conferences and meetings
2/03/2016 Prevent
Prevent
»HEFCE Prevent team with, Head of strategic engagement and Head
of strategic development to join up our approach with HEFCE
»AoC 'Implementing the Prevent Duty' Conference 30 September
»“And more meetings than I care to remember with
› BIS, Home Office, UCISA, HEFCE, AoC, UUK, EducationTraining
Foundation, Learning Foundation for Higher Education…
Conferences and meetings
2/03/2016 Prevent
Training
Workshop to RaiseAwareness of Prevent (WRAP)
2/03/2016 Prevent
Workshop to raise awareness of Prevent (WRAP)
WRAP is a free specialist workshop, designed by HM Government
to give you:
»An understanding of the Prevent strategy and your role within it
»The ability to use existing expertise and professional judgment to
recognise the vulnerable individuals who may need support
»Local safeguarding and referral mechanisms and people to contact
for further help and advice
»This workshop is an introduction to the Prevent strategy , it does
not cover wider institutional responsibilities under the duty
2/03/2016 Prevent
Workshop to Raise Awareness of Prevent (WRAP)
»Facilitated online learning, no travel required
»Delivered by our award winning training team
»Highly participatory sessions
»Share best practice across the sectors and nationwide
»Information and registration at jisc.ac.uk/advice/training
2/03/2016 Prevent
Why live online?
»Senior management
»Remote staff
»New starters
»Student council
WRAP delivery is also available from local police and Regional
HE/FE Co-ordinators, who also run train the trainer programme.
Jisc sessions are useful for:
2/03/2016 Prevent
Jisc WRAP 3 training update
» Total people who have completed WRAP training with Jisc is now 1464
» Sector breakdown of attendance is:
› 39% HE
› 56% FE and skills
› 5% other (partners/funders/internal)
» As previously noted FE are in general well ahead of HE in terms of staff
training, with programmes already in place, and this is reflected in these
attendance figures
» Jisc are currently offering 4 sessions per week and are experiencing high
demand for courses from all sectors – courses are fully booked for two
weeks in advance of delivery
2/03/2016 Prevent
Feedback
“Excellent insight it shows how education is important and how education may
help people find their purpose again.”
“Good session, initially was worried as 2 hours is a long time, relieved it was
engaging and interactive - a good webinar, thank you.”
“Thank you, it has been very informative and has developed a better
understanding for everyday practice in my role as Head of Curriculum.”
“I thoroughly enjoyed the session.”
“Thank you for providing this course it has helped me understand
what to look for and how prevent can help.”
2/03/2016 Prevent
Prevent
»Link to Andrew’s blog http://bit.ly/Prevent_andrews_blog
»Prevent duty guidance http://bit.ly/Prevent_duty_guidance
»The statutory instrument bringing it into force is The
Counter-Terrorism and Security Act 2015 Regulations 2015 at
http://bit.ly/Prevent_legislation
If you want to know more
2/03/2016 Prevent
The Education andTraining Foundation
»Complying with the Prevent Duty
»Information and resources for:
› Practitioners
› Support staff
› Leaders and managers
› Governors and board members
preventforfeandtraining.org.uk/
Prevent for Further Education andTraining
2/03/2016 Prevent
Web filtering
2/03/2016 Prevent
Jisc web filtering - Features
»A cloud based solution with direct connection to Janet at 8Gbps
»Far greater capacity and scalability
»Superior resilience
»Enhanced admin interface experience
»Google SSL search filtering capability
»Mandatory Internet Watch Foundation (IWF) and Unlawful
Extremism content filters
Updated service
2/03/2016 Prevent
Jisc web filtering - Features
»User Based Filtering
»Ability to provide different filtering to different users based on AD
memberships
»Easily managed through the enhanced admin interface
»Transparent Proxy
»Removes the need to enter the proxy server into devices on the
network
»Enhances the student and guest experiences by simplifying
connecting their own devices to the internet
»Technical requirement, costs and time frameTBC
Further enhancements
2/03/2016 Prevent
Jisc web filtering - Flexibility
A layered approach to filtering that enables you to build a solid
foundation for your policies
Back-stopping your policies
2/03/2016 Prevent
Jisc web filtering – Eligibility and pricing
Any organisation with a Janet
connection is eligible to use
the service. If that organisation
has feeder sites which it
provides connectivity to, the
feeder site would need to
purchase its own site license.
Janet connected customers
Fororganisations with connectivity
solutions provided by neither
Janet nor the web filtering service
supplier, providing the organisation
is eligible for JSL Services and no
additional technical intervention
from the supplier is required, then
the service can be used under a
non-JSL site license.
Non-Janet connected customers
2/03/2016 Prevent
Jisc web filtering – Eligibility and pricing
Customer pricing
2/03/2016 Prevent
Site type SafetyNet User based filtering
Site with Janet connection <2000 users Included in the Jisc subscription
or central funding for FECs
£499
Site with Janet connection >2000 users £49 + 50p/user
Non-Janet connectivity site <2000 users
£299
£999
Non-Janet connectivity site >2000 users £49 + £1/user
Local authority Bespoke pricing
Web filtering and monitoring on line course
»Jisc are currently developing a new facilitated online course
covering network filtering and monitoring
»This will be a multi session online course which will look at the
drivers for filtering and monitoring, the underlying technology,
the tools and services available and the impact of all of these on
an organisation
»The course is expected to be piloted at the end of February
with publicly scheduled courses available to book from
April 1 2016
2/03/2016 Prevent
Web filtering and monitoring on line course
»understand their organisation’s requirements for filtering
and monitoring
»articulate their organisations filtering and monitoring aims and
objectives and reflect these through implementation of effective
policy and procedures
»make informed decisions on the purchase and deployment of
infrastructure and services for filtering and/or monitoring
By the end of the course participants will be able to:
2/03/2016 Prevent
Web filtering framework
» Jisc has been working to provide aWeb Filtering framework
»The objective of the framework is to enable Jisc to offer a wider
solution pool for a greater proportion of the community to benefit
› saving them the costs of procurement
› yielding individual preferential pricing
› and an aggregated discount
»This will also include institutions that already have solutions
available via the framework, for their ongoing costs
2/03/2016 Prevent
Web filtering framework
2/03/2016 Prevent
Activity Date
Notice to European Journal March 2016
Final date for clarifications April 2016
Final date for registration April 2016
Closing date for tenders April 2016
Selection of preferred supplier April/May2016
Contracts placed by April/May2016
[Contract start date/Delivery of
network/ServiceCommencement date]
April/May2016
jisc.ac.uk
Jisc web filtering service
Visit the Jisc website
jisc.ac.uk/web-filtering
2/03/2016 Prevent
Useful links
http://bit.ly/Jisc_network_monitoring_law
ucisa.ac.uk/modelregs
https://community.jisc.ac.uk/library/acceptable-use-policy
https://community.jisc.ac.uk/library/janet-policies/security-policy
https://community.jisc.ac.uk/library/janet-policies/eligibility-policy
2/03/2016 Prevent
Jisc cyber security services
»Explore the security support available to those connected to the
Janet Network jisc.ac.uk/network/security
»Janet computer security incident response team (CSIRT)
jisc.ac.uk/csirt
»web filtering service jisc.ac.uk/web-filtering
»Mailer Shield jisc.ac.uk/mailer-shield
»educationshared informationsecurity service (ESISS) jisc.ac.uk/esiss
»Email advice and testing jisc.ac.uk/email-advice
»Blacklists and whitelists jisc.ac.uk/blacklists
»Jisc Certificate Service jisc.ac.uk/certificate-service
2/03/2016 Prevent
GOV.UK cyber pages
»Keeping the UK Safe in Cyberspace sets out the policy context for
UK cyber; gov.uk/government/policies/cyber-security
»10 Steps to Cyber Security http://bit.ly/Jisc_tensteps
»BIS advice for small businesses http://bit.ly/Jisc_BIS_advice
»Cyber Essentials cyberstreetwise.com/cyberessentials
»Centre for the Protection of National Infrastructure (CPNI)
cpni.gov.uk/advice/cyber
»Cyber Streetwise cyberstreetwise.com
»Get Safe Online getsafeonline
2/03/2016 Prevent
Thank you
2/03/2016 Prevent
Prevent: the role ofTechnology
Andrew Cormack, Chief regulatory adviser
Home Office guidance
2/03/2016 Prevent: the role of Technology
Home Office guidance
2/03/2016 Prevent: the role of Technology
Home Office guidance
2/03/2016 Prevent: the role of Technology
“Many educational institutions already use filtering as a means of
restricting access to harmful content, and should consider the use of
filters as part of their overall strategy to prevent people being drawn
into terrorism”
2/03/2016 Prevent: the role of Technology
Prevent: the role of Technology2/03/2016
HEFCE Monitoring Framework (para 15)
“The intention of the Prevent duty is to ensure that all specified
authorities assess the level of risk that people within their functional
responsibilities may be drawn into terrorism, and have suitable policies,
procedures or arrangements in place to mitigate those risks”
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
»What guidance do we have on online signs of problems?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
»What guidance do we have on online signs of problems?
»Where might we detect patterns indicating risk?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
»What guidance do we have on online signs of problems?
»Where might we detect patterns indicating risk?
»How are users likely to react?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
»What guidance do we have on online signs of problems?
»Where might we detect patterns indicating risk?
»How are users likely to react?
»How to keep those at risk within our support systems?
2/03/2016 Prevent: the role of Technology
“Whether and how” to use technology?
»Is technology more effective to prevent or detect?
»What guidance do we have on online signs of problems?
»Where might we detect patterns indicating risk?
»How are users likely to react?
»How to keep those at risk within our support systems?
»How can we best change minds?
2/03/2016 Prevent: the role of Technology
jisc.ac.uk
Contact
Andrew Cormack
Chief regulatory adviser
Andrew.Cormack@jisc.ac.uk
Prevent: the role of Technology2/03/2016
Implementing Prevent
How best to use to comply with the
Prevent Duty
Matt Dean, Technology Policy Manager
2 March 2016
• An increased awareness of the targeting of young people in colleges
by a variety of extremist groups – although not confined to colleges,
attempts to ‘radicalise’ young people have increased in recent years.
Colleges are vital parts of the community;
• A shift to making the Prevent Duty a part of the broader ‘safeguarding’
agenda – the language, and policy around, Prevent has developed to
include pastoral care. Safeguarding implies a different way of viewing
radicalisation;
• Prevent is now part of the funding and inspection regime – legal and
funding changes mean that colleges are required to implement the
Prevent Duty. There are differences between what colleges HAVE to do
and what form monitoring might mean.
Context
• Legal requirements – The Counter-Terrorism and Security Bill (2015)
places a duty on colleges to, ‘have due regard, in the exercise of its
functions, to the need to prevent people from being drawn into
terrorism’. There are clear legal duties in place;
• Colleges are required to work collaboratively – The Bill does not
discriminate between types of education provider. Colleges have
students of diverse ages, backgrounds undertaking diverse
programmes of study.
• Ofsted will inspect compliance with the statutory Prevent Duty and an
‘inadequate’ would trigger an intervention– Colleges need to provide
training to staff, to have named individuals with clear responsibilities
and be able to evidence compliance. Be clear on the differences
between legal requirements and developing appropriate ways of
working.
Policy agenda
• Two conferences to date – AoC will continue to run conferences,
seminars and regional events as the programme develops. Providing
the space for colleges to discuss how they implement the Duty is
vital.
• Resources – The AoC website (aoc.co.uk) has numerous, free to
access, resources on policy analysis, case studies, blog posts and
news items. Stay informed about legal and policy changes and about
how colleges might inform the debate.
• AoC work as a single point of contact – AoC coordinates activity
among all government departments and agencies and has a Policy
team that works to see that a coherent and rational approach is
adopted by them and by colleges. If you have questions, AoC is best
placed to help.
AoC and the Prevent Duty

More Related Content

What's hot

Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Jisc
 
Working in partnership to develop student employability - Jisc Digifest 2016
Working in partnership to develop student employability - Jisc Digifest 2016Working in partnership to develop student employability - Jisc Digifest 2016
Working in partnership to develop student employability - Jisc Digifest 2016Jisc
 
Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationJisc
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Jisc
 
UCISA digital capability survey 2017
UCISA digital capability survey 2017UCISA digital capability survey 2017
UCISA digital capability survey 2017Jisc
 
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Jisc
 
How you can enhance the efficiency and effectiveness of teaching and learning...
How you can enhance the efficiency and effectiveness of teaching and learning...How you can enhance the efficiency and effectiveness of teaching and learning...
How you can enhance the efficiency and effectiveness of teaching and learning...Jisc
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issuesJisc
 
Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Jisc
 
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...Jisc
 
Leveraging the digital - capability, capacity and change in higher and furthe...
Leveraging the digital - capability, capacity and change in higher and furthe...Leveraging the digital - capability, capacity and change in higher and furthe...
Leveraging the digital - capability, capacity and change in higher and furthe...Jisc
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
Digital responsibility: putting it in context. Making digital responsibility ...
Digital responsibility: putting it in context. Making digital responsibility ...Digital responsibility: putting it in context. Making digital responsibility ...
Digital responsibility: putting it in context. Making digital responsibility ...Jisc
 
Good Intentions: improving the evidence base in support of sharing learning m...
Good Intentions: improving the evidence base in support of sharing learning m...Good Intentions: improving the evidence base in support of sharing learning m...
Good Intentions: improving the evidence base in support of sharing learning m...loumcgill
 
Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Jisc
 
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...Jisc
 
Jisc visions: research
Jisc visions: researchJisc visions: research
Jisc visions: researchJisc
 
A digital literacies framework – its strengths, weaknesses and opportunities
A digital literacies framework – its strengths, weaknesses and opportunitiesA digital literacies framework – its strengths, weaknesses and opportunities
A digital literacies framework – its strengths, weaknesses and opportunitiesJisc
 
Outcomes from the Digital Student Skills project
Outcomes from the Digital Student Skills projectOutcomes from the Digital Student Skills project
Outcomes from the Digital Student Skills projectJisc
 

What's hot (20)

Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016
 
Working in partnership to develop student employability - Jisc Digifest 2016
Working in partnership to develop student employability - Jisc Digifest 2016Working in partnership to develop student employability - Jisc Digifest 2016
Working in partnership to develop student employability - Jisc Digifest 2016
 
Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...
 
Lowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for educationLowering the bar to using data – interactive dashboards for education
Lowering the bar to using data – interactive dashboards for education
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
UCISA digital capability survey 2017
UCISA digital capability survey 2017UCISA digital capability survey 2017
UCISA digital capability survey 2017
 
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
Leveraging change through digital capability - James Clay, Chris Roberts, Tim...
 
How you can enhance the efficiency and effectiveness of teaching and learning...
How you can enhance the efficiency and effectiveness of teaching and learning...How you can enhance the efficiency and effectiveness of teaching and learning...
How you can enhance the efficiency and effectiveness of teaching and learning...
 
Digital literacy: key issues
Digital literacy: key issuesDigital literacy: key issues
Digital literacy: key issues
 
Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...Collaboration through technology: moving from possibility to practice - Tim B...
Collaboration through technology: moving from possibility to practice - Tim B...
 
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
Leveraging change through digital capability - Lawrie Phipps, Terri Smith and...
 
Leveraging the digital - capability, capacity and change in higher and furthe...
Leveraging the digital - capability, capacity and change in higher and furthe...Leveraging the digital - capability, capacity and change in higher and furthe...
Leveraging the digital - capability, capacity and change in higher and furthe...
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
Digital responsibility: putting it in context. Making digital responsibility ...
Digital responsibility: putting it in context. Making digital responsibility ...Digital responsibility: putting it in context. Making digital responsibility ...
Digital responsibility: putting it in context. Making digital responsibility ...
 
Good Intentions: improving the evidence base in support of sharing learning m...
Good Intentions: improving the evidence base in support of sharing learning m...Good Intentions: improving the evidence base in support of sharing learning m...
Good Intentions: improving the evidence base in support of sharing learning m...
 
Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44
 
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...
Reflecting on Jisc's summer of student innovation - Paul Bailey and Andy McGr...
 
Jisc visions: research
Jisc visions: researchJisc visions: research
Jisc visions: research
 
A digital literacies framework – its strengths, weaknesses and opportunities
A digital literacies framework – its strengths, weaknesses and opportunitiesA digital literacies framework – its strengths, weaknesses and opportunities
A digital literacies framework – its strengths, weaknesses and opportunities
 
Outcomes from the Digital Student Skills project
Outcomes from the Digital Student Skills projectOutcomes from the Digital Student Skills project
Outcomes from the Digital Student Skills project
 

Viewers also liked

Plenary sessions: the power of digital for change - Jisc Digifest 2016
Plenary sessions: the power of digital for change - Jisc Digifest 2016Plenary sessions: the power of digital for change - Jisc Digifest 2016
Plenary sessions: the power of digital for change - Jisc Digifest 2016Jisc
 
Understanding your organisation’s digital practice - Jisc Digifest 2016
Understanding your organisation’s digital practice - Jisc Digifest 2016Understanding your organisation’s digital practice - Jisc Digifest 2016
Understanding your organisation’s digital practice - Jisc Digifest 2016Jisc
 
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016Jisc
 
Box of Broadcasts - enhance learning with TV and radio content
Box of Broadcasts - enhance learning with TV and radio contentBox of Broadcasts - enhance learning with TV and radio content
Box of Broadcasts - enhance learning with TV and radio contentJisc
 
Benefits and efficiencies with Vscene - Jisc Digifest 2016
Benefits and efficiencies with Vscene - Jisc Digifest 2016Benefits and efficiencies with Vscene - Jisc Digifest 2016
Benefits and efficiencies with Vscene - Jisc Digifest 2016Jisc
 
Universities as e-textbook publishers - Jisc Digifest 2016
Universities as e-textbook publishers - Jisc Digifest 2016Universities as e-textbook publishers - Jisc Digifest 2016
Universities as e-textbook publishers - Jisc Digifest 2016Jisc
 
Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Jisc
 
New emerging assistive technologies - Jisc Digifest 2016
New emerging assistive technologies - Jisc Digifest 2016New emerging assistive technologies - Jisc Digifest 2016
New emerging assistive technologies - Jisc Digifest 2016Jisc
 
The evolution of FELTAG - Jisc Digifest 2016
The evolution of FELTAG - Jisc Digifest 2016The evolution of FELTAG - Jisc Digifest 2016
The evolution of FELTAG - Jisc Digifest 2016Jisc
 
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Jisc
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Jisc
 
The power of digital for teaching and learning - Jisc Digifest 2016
The power of digital for teaching and learning - Jisc Digifest 2016The power of digital for teaching and learning - Jisc Digifest 2016
The power of digital for teaching and learning - Jisc Digifest 2016Jisc
 
The future of cloud computing - Jisc Digifest 2016
The future of cloud computing - Jisc Digifest 2016The future of cloud computing - Jisc Digifest 2016
The future of cloud computing - Jisc Digifest 2016Jisc
 
The value of Jisc Collections - Jisc Digifest 2016
The value of Jisc Collections - Jisc Digifest 2016The value of Jisc Collections - Jisc Digifest 2016
The value of Jisc Collections - Jisc Digifest 2016Jisc
 
Link into your professional network - Jisc Digifest 2016
Link into your professional network - Jisc Digifest 2016Link into your professional network - Jisc Digifest 2016
Link into your professional network - Jisc Digifest 2016Jisc
 
Responsible metrics for research - Jisc Digifest 2016
Responsible metrics for research - Jisc Digifest 2016Responsible metrics for research - Jisc Digifest 2016
Responsible metrics for research - Jisc Digifest 2016Jisc
 

Viewers also liked (16)

Plenary sessions: the power of digital for change - Jisc Digifest 2016
Plenary sessions: the power of digital for change - Jisc Digifest 2016Plenary sessions: the power of digital for change - Jisc Digifest 2016
Plenary sessions: the power of digital for change - Jisc Digifest 2016
 
Understanding your organisation’s digital practice - Jisc Digifest 2016
Understanding your organisation’s digital practice - Jisc Digifest 2016Understanding your organisation’s digital practice - Jisc Digifest 2016
Understanding your organisation’s digital practice - Jisc Digifest 2016
 
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
 
Box of Broadcasts - enhance learning with TV and radio content
Box of Broadcasts - enhance learning with TV and radio contentBox of Broadcasts - enhance learning with TV and radio content
Box of Broadcasts - enhance learning with TV and radio content
 
Benefits and efficiencies with Vscene - Jisc Digifest 2016
Benefits and efficiencies with Vscene - Jisc Digifest 2016Benefits and efficiencies with Vscene - Jisc Digifest 2016
Benefits and efficiencies with Vscene - Jisc Digifest 2016
 
Universities as e-textbook publishers - Jisc Digifest 2016
Universities as e-textbook publishers - Jisc Digifest 2016Universities as e-textbook publishers - Jisc Digifest 2016
Universities as e-textbook publishers - Jisc Digifest 2016
 
Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016
 
New emerging assistive technologies - Jisc Digifest 2016
New emerging assistive technologies - Jisc Digifest 2016New emerging assistive technologies - Jisc Digifest 2016
New emerging assistive technologies - Jisc Digifest 2016
 
The evolution of FELTAG - Jisc Digifest 2016
The evolution of FELTAG - Jisc Digifest 2016The evolution of FELTAG - Jisc Digifest 2016
The evolution of FELTAG - Jisc Digifest 2016
 
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016Unlocking the potential of cloud in research and education - Jisc Digifest 2016
Unlocking the potential of cloud in research and education - Jisc Digifest 2016
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016
 
The power of digital for teaching and learning - Jisc Digifest 2016
The power of digital for teaching and learning - Jisc Digifest 2016The power of digital for teaching and learning - Jisc Digifest 2016
The power of digital for teaching and learning - Jisc Digifest 2016
 
The future of cloud computing - Jisc Digifest 2016
The future of cloud computing - Jisc Digifest 2016The future of cloud computing - Jisc Digifest 2016
The future of cloud computing - Jisc Digifest 2016
 
The value of Jisc Collections - Jisc Digifest 2016
The value of Jisc Collections - Jisc Digifest 2016The value of Jisc Collections - Jisc Digifest 2016
The value of Jisc Collections - Jisc Digifest 2016
 
Link into your professional network - Jisc Digifest 2016
Link into your professional network - Jisc Digifest 2016Link into your professional network - Jisc Digifest 2016
Link into your professional network - Jisc Digifest 2016
 
Responsible metrics for research - Jisc Digifest 2016
Responsible metrics for research - Jisc Digifest 2016Responsible metrics for research - Jisc Digifest 2016
Responsible metrics for research - Jisc Digifest 2016
 

Similar to Understanding Prevent - the role of education in tackling radicalisation - Jisc Digifest 2016

Jisc Introduction slides May 2016 Jane Mackenzie
Jisc Introduction slides May 2016 Jane MackenzieJisc Introduction slides May 2016 Jane Mackenzie
Jisc Introduction slides May 2016 Jane MackenzieJane Mackenzie
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Coit20263 information security management assignment 2
Coit20263 information security management assignment 2Coit20263 information security management assignment 2
Coit20263 information security management assignment 2Sandeep Ratnam
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Amazon Web Services
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 Berwin Leighton Paisner
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Coit20263 information security management assignment 2 (2)
Coit20263 information security management assignment 2 (2)Coit20263 information security management assignment 2 (2)
Coit20263 information security management assignment 2 (2)Sandeep Ratnam
 
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Angela Stubbs
 
Digital Communities and the Internet of Everything Case Studies
Digital Communities and the Internet of Everything Case StudiesDigital Communities and the Internet of Everything Case Studies
Digital Communities and the Internet of Everything Case StudiesConnected Futures
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
C2C 2014 Summit Review
C2C 2014 Summit ReviewC2C 2014 Summit Review
C2C 2014 Summit ReviewAdrian Hall
 
The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016Jisc
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkAPNIC
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillaydotZADNA
 
Landscape of microinsurance in Sri Lanka 2016
Landscape of microinsurance in Sri Lanka 2016Landscape of microinsurance in Sri Lanka 2016
Landscape of microinsurance in Sri Lanka 2016Vineet .
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationShiva Bissessar
 

Similar to Understanding Prevent - the role of education in tackling radicalisation - Jisc Digifest 2016 (20)

Jisc Introduction slides May 2016 Jane Mackenzie
Jisc Introduction slides May 2016 Jane MackenzieJisc Introduction slides May 2016 Jane Mackenzie
Jisc Introduction slides May 2016 Jane Mackenzie
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Coit20263 information security management assignment 2
Coit20263 information security management assignment 2Coit20263 information security management assignment 2
Coit20263 information security management assignment 2
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Coit20263 information security management assignment 2 (2)
Coit20263 information security management assignment 2 (2)Coit20263 information security management assignment 2 (2)
Coit20263 information security management assignment 2 (2)
 
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
 
Digital Communities and the Internet of Everything Case Studies
Digital Communities and the Internet of Everything Case StudiesDigital Communities and the Internet of Everything Case Studies
Digital Communities and the Internet of Everything Case Studies
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
C2C 2014 Summit Review
C2C 2014 Summit ReviewC2C 2014 Summit Review
C2C 2014 Summit Review
 
The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016
 
Global Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current WorkGlobal Anti-Abuse Working Groups: Trends and Current Work
Global Anti-Abuse Working Groups: Trends and Current Work
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
Cybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru PillayCybersecurity Hub & Operations - Dr. Kiru Pillay
Cybersecurity Hub & Operations - Dr. Kiru Pillay
 
Landscape of microinsurance in Sri Lanka 2016
Landscape of microinsurance in Sri Lanka 2016Landscape of microinsurance in Sri Lanka 2016
Landscape of microinsurance in Sri Lanka 2016
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Professional Certificate in Data Protection 2016 2017
Professional Certificate in Data Protection 2016 2017Professional Certificate in Data Protection 2016 2017
Professional Certificate in Data Protection 2016 2017
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

Understanding Prevent - the role of education in tackling radicalisation - Jisc Digifest 2016

  • 1. Prevent Steve Kennett, Head of operational Services and Senior information risk owner
  • 2. The Cyber threat We live in an inter-connected world that we could not have imagined even two decades ago »While it brings almost limitless opportunities, there are also threats. It is absolutely vital that the applications and connections we use are as secure as possible 2/03/2016 EdVaizey MP Minister for culture and the digital economy
  • 3. Cost of breaches continues to soar 2/03/2016 Prevent ‘Starting point’ » for breach costs which includes elements such as business disruption, lost sales, recovery of assets, and fines and compensation £1.46m - £3.14m » is the average cost to a large organisation » up from £600k - £1.15m a year ago £75k - £311k » is the average cost to a small business » up from £65k - £115k a year ago
  • 4. Computer Security Incident ResponseTeam - CSIRT 2/03/2016 Prevent
  • 5. Computer Security Incident ResponseTeam »Safeguarding your current and future computer security, with a primary function to monitor and resolve any security incidents that occur on the Janet network »Our mission is to create a secure environment to conduct your online activities. Our primary function is monitor and resolve any security incidents that occur on the network, with specialists tracking a range of platforms, including Unix, Linux and Windows Janet network CSIRT 2/03/2016 Prevent
  • 6. Computer Security Incident ResponseTeam »We work closely with our community to detect, report and investigate incidents that pose a threat to the security of our customers' information systems. We also investigate other forms of network abuse such as spam and copyright infringement »Due to the geographical scope of incidents, we assist national and international law enforcement agencies in their investigations, connecting them to our trusted contacts within the community Janet network CSIRT 2/03/2016 Prevent
  • 7. Computer Security Incident ResponseTeam Csirt 7 security specialists engage with 2/03/2016 Prevent
  • 8. CSIRT - Cost benefits Costs: time to fix the breach, remove infection from computers, deal with questions, inform staff and students, time that systems are unavailable to staff and students, fines and compensation, business loss, reputational damage. » 12.5% of organisations using Janet avoid having one severe security breach annually due to the existence of CSIRT; » Using the figures in the BIS report and working with the Jisc SSU »£22.5 million 2/03/2016 Prevent BIS report “2015 Information Security Breaches Survey” £1.46m to £3.14m Average cost to a business of its worst security breach of the year. £75k to £311k Large Small
  • 10. jisc.ac.uk Computer Security Incident ResponseTeam Visit the Janet network CSIRT blog 0300 999 2340 irt@csirt.ja.net 2/03/2016 Prevent
  • 12. Jisc PREVENT activities »Working closely with BIS and HomeOffice »Keeping AoC and UUK informed »HM Government workshop to raise awareness of Prevent »Statutory regulation advice and assistance › Blog posts › Speak at conferences › Web filtering »Working in partnership with the Education andTraining Foundation 2/03/2016 Prevent
  • 13. Prevent »Home Office Prevent duty event in: › Birmingham, Oldham, Bristol and Luton »Safeguarding conference at College development network in: › Stirling Scotland »The joint Learning for Higher Education (LFHE) and HEFCE conference Policy into practice;The Leadership Challenge; CounterTerrorismAct 2015: › Bristol and Manchester Conferences and meetings 2/03/2016 Prevent
  • 14. Prevent »HEFCE Prevent team with, Head of strategic engagement and Head of strategic development to join up our approach with HEFCE »AoC 'Implementing the Prevent Duty' Conference 30 September »“And more meetings than I care to remember with › BIS, Home Office, UCISA, HEFCE, AoC, UUK, EducationTraining Foundation, Learning Foundation for Higher Education… Conferences and meetings 2/03/2016 Prevent
  • 15. Training Workshop to RaiseAwareness of Prevent (WRAP) 2/03/2016 Prevent
  • 16. Workshop to raise awareness of Prevent (WRAP) WRAP is a free specialist workshop, designed by HM Government to give you: »An understanding of the Prevent strategy and your role within it »The ability to use existing expertise and professional judgment to recognise the vulnerable individuals who may need support »Local safeguarding and referral mechanisms and people to contact for further help and advice »This workshop is an introduction to the Prevent strategy , it does not cover wider institutional responsibilities under the duty 2/03/2016 Prevent
  • 17. Workshop to Raise Awareness of Prevent (WRAP) »Facilitated online learning, no travel required »Delivered by our award winning training team »Highly participatory sessions »Share best practice across the sectors and nationwide »Information and registration at jisc.ac.uk/advice/training 2/03/2016 Prevent
  • 18. Why live online? »Senior management »Remote staff »New starters »Student council WRAP delivery is also available from local police and Regional HE/FE Co-ordinators, who also run train the trainer programme. Jisc sessions are useful for: 2/03/2016 Prevent
  • 19. Jisc WRAP 3 training update » Total people who have completed WRAP training with Jisc is now 1464 » Sector breakdown of attendance is: › 39% HE › 56% FE and skills › 5% other (partners/funders/internal) » As previously noted FE are in general well ahead of HE in terms of staff training, with programmes already in place, and this is reflected in these attendance figures » Jisc are currently offering 4 sessions per week and are experiencing high demand for courses from all sectors – courses are fully booked for two weeks in advance of delivery 2/03/2016 Prevent
  • 20. Feedback “Excellent insight it shows how education is important and how education may help people find their purpose again.” “Good session, initially was worried as 2 hours is a long time, relieved it was engaging and interactive - a good webinar, thank you.” “Thank you, it has been very informative and has developed a better understanding for everyday practice in my role as Head of Curriculum.” “I thoroughly enjoyed the session.” “Thank you for providing this course it has helped me understand what to look for and how prevent can help.” 2/03/2016 Prevent
  • 21. Prevent »Link to Andrew’s blog http://bit.ly/Prevent_andrews_blog »Prevent duty guidance http://bit.ly/Prevent_duty_guidance »The statutory instrument bringing it into force is The Counter-Terrorism and Security Act 2015 Regulations 2015 at http://bit.ly/Prevent_legislation If you want to know more 2/03/2016 Prevent
  • 22. The Education andTraining Foundation »Complying with the Prevent Duty »Information and resources for: › Practitioners › Support staff › Leaders and managers › Governors and board members preventforfeandtraining.org.uk/ Prevent for Further Education andTraining 2/03/2016 Prevent
  • 24. Jisc web filtering - Features »A cloud based solution with direct connection to Janet at 8Gbps »Far greater capacity and scalability »Superior resilience »Enhanced admin interface experience »Google SSL search filtering capability »Mandatory Internet Watch Foundation (IWF) and Unlawful Extremism content filters Updated service 2/03/2016 Prevent
  • 25. Jisc web filtering - Features »User Based Filtering »Ability to provide different filtering to different users based on AD memberships »Easily managed through the enhanced admin interface »Transparent Proxy »Removes the need to enter the proxy server into devices on the network »Enhances the student and guest experiences by simplifying connecting their own devices to the internet »Technical requirement, costs and time frameTBC Further enhancements 2/03/2016 Prevent
  • 26. Jisc web filtering - Flexibility A layered approach to filtering that enables you to build a solid foundation for your policies Back-stopping your policies 2/03/2016 Prevent
  • 27. Jisc web filtering – Eligibility and pricing Any organisation with a Janet connection is eligible to use the service. If that organisation has feeder sites which it provides connectivity to, the feeder site would need to purchase its own site license. Janet connected customers Fororganisations with connectivity solutions provided by neither Janet nor the web filtering service supplier, providing the organisation is eligible for JSL Services and no additional technical intervention from the supplier is required, then the service can be used under a non-JSL site license. Non-Janet connected customers 2/03/2016 Prevent
  • 28. Jisc web filtering – Eligibility and pricing Customer pricing 2/03/2016 Prevent Site type SafetyNet User based filtering Site with Janet connection <2000 users Included in the Jisc subscription or central funding for FECs £499 Site with Janet connection >2000 users £49 + 50p/user Non-Janet connectivity site <2000 users £299 £999 Non-Janet connectivity site >2000 users £49 + £1/user Local authority Bespoke pricing
  • 29. Web filtering and monitoring on line course »Jisc are currently developing a new facilitated online course covering network filtering and monitoring »This will be a multi session online course which will look at the drivers for filtering and monitoring, the underlying technology, the tools and services available and the impact of all of these on an organisation »The course is expected to be piloted at the end of February with publicly scheduled courses available to book from April 1 2016 2/03/2016 Prevent
  • 30. Web filtering and monitoring on line course »understand their organisation’s requirements for filtering and monitoring »articulate their organisations filtering and monitoring aims and objectives and reflect these through implementation of effective policy and procedures »make informed decisions on the purchase and deployment of infrastructure and services for filtering and/or monitoring By the end of the course participants will be able to: 2/03/2016 Prevent
  • 31. Web filtering framework » Jisc has been working to provide aWeb Filtering framework »The objective of the framework is to enable Jisc to offer a wider solution pool for a greater proportion of the community to benefit › saving them the costs of procurement › yielding individual preferential pricing › and an aggregated discount »This will also include institutions that already have solutions available via the framework, for their ongoing costs 2/03/2016 Prevent
  • 32. Web filtering framework 2/03/2016 Prevent Activity Date Notice to European Journal March 2016 Final date for clarifications April 2016 Final date for registration April 2016 Closing date for tenders April 2016 Selection of preferred supplier April/May2016 Contracts placed by April/May2016 [Contract start date/Delivery of network/ServiceCommencement date] April/May2016
  • 33. jisc.ac.uk Jisc web filtering service Visit the Jisc website jisc.ac.uk/web-filtering 2/03/2016 Prevent
  • 35. Jisc cyber security services »Explore the security support available to those connected to the Janet Network jisc.ac.uk/network/security »Janet computer security incident response team (CSIRT) jisc.ac.uk/csirt »web filtering service jisc.ac.uk/web-filtering »Mailer Shield jisc.ac.uk/mailer-shield »educationshared informationsecurity service (ESISS) jisc.ac.uk/esiss »Email advice and testing jisc.ac.uk/email-advice »Blacklists and whitelists jisc.ac.uk/blacklists »Jisc Certificate Service jisc.ac.uk/certificate-service 2/03/2016 Prevent
  • 36. GOV.UK cyber pages »Keeping the UK Safe in Cyberspace sets out the policy context for UK cyber; gov.uk/government/policies/cyber-security »10 Steps to Cyber Security http://bit.ly/Jisc_tensteps »BIS advice for small businesses http://bit.ly/Jisc_BIS_advice »Cyber Essentials cyberstreetwise.com/cyberessentials »Centre for the Protection of National Infrastructure (CPNI) cpni.gov.uk/advice/cyber »Cyber Streetwise cyberstreetwise.com »Get Safe Online getsafeonline 2/03/2016 Prevent
  • 38. Prevent: the role ofTechnology Andrew Cormack, Chief regulatory adviser
  • 39. Home Office guidance 2/03/2016 Prevent: the role of Technology
  • 40. Home Office guidance 2/03/2016 Prevent: the role of Technology
  • 41. Home Office guidance 2/03/2016 Prevent: the role of Technology
  • 42. “Many educational institutions already use filtering as a means of restricting access to harmful content, and should consider the use of filters as part of their overall strategy to prevent people being drawn into terrorism” 2/03/2016 Prevent: the role of Technology
  • 43. Prevent: the role of Technology2/03/2016
  • 44. HEFCE Monitoring Framework (para 15) “The intention of the Prevent duty is to ensure that all specified authorities assess the level of risk that people within their functional responsibilities may be drawn into terrorism, and have suitable policies, procedures or arrangements in place to mitigate those risks” 2/03/2016 Prevent: the role of Technology
  • 45. “Whether and how” to use technology? 2/03/2016 Prevent: the role of Technology
  • 46. “Whether and how” to use technology? »Is technology more effective to prevent or detect? 2/03/2016 Prevent: the role of Technology
  • 47. “Whether and how” to use technology? »Is technology more effective to prevent or detect? »What guidance do we have on online signs of problems? 2/03/2016 Prevent: the role of Technology
  • 48. “Whether and how” to use technology? »Is technology more effective to prevent or detect? »What guidance do we have on online signs of problems? »Where might we detect patterns indicating risk? 2/03/2016 Prevent: the role of Technology
  • 49. “Whether and how” to use technology? »Is technology more effective to prevent or detect? »What guidance do we have on online signs of problems? »Where might we detect patterns indicating risk? »How are users likely to react? 2/03/2016 Prevent: the role of Technology
  • 50. “Whether and how” to use technology? »Is technology more effective to prevent or detect? »What guidance do we have on online signs of problems? »Where might we detect patterns indicating risk? »How are users likely to react? »How to keep those at risk within our support systems? 2/03/2016 Prevent: the role of Technology
  • 51. “Whether and how” to use technology? »Is technology more effective to prevent or detect? »What guidance do we have on online signs of problems? »Where might we detect patterns indicating risk? »How are users likely to react? »How to keep those at risk within our support systems? »How can we best change minds? 2/03/2016 Prevent: the role of Technology
  • 52. jisc.ac.uk Contact Andrew Cormack Chief regulatory adviser Andrew.Cormack@jisc.ac.uk Prevent: the role of Technology2/03/2016
  • 53. Implementing Prevent How best to use to comply with the Prevent Duty Matt Dean, Technology Policy Manager 2 March 2016
  • 54. • An increased awareness of the targeting of young people in colleges by a variety of extremist groups – although not confined to colleges, attempts to ‘radicalise’ young people have increased in recent years. Colleges are vital parts of the community; • A shift to making the Prevent Duty a part of the broader ‘safeguarding’ agenda – the language, and policy around, Prevent has developed to include pastoral care. Safeguarding implies a different way of viewing radicalisation; • Prevent is now part of the funding and inspection regime – legal and funding changes mean that colleges are required to implement the Prevent Duty. There are differences between what colleges HAVE to do and what form monitoring might mean. Context
  • 55. • Legal requirements – The Counter-Terrorism and Security Bill (2015) places a duty on colleges to, ‘have due regard, in the exercise of its functions, to the need to prevent people from being drawn into terrorism’. There are clear legal duties in place; • Colleges are required to work collaboratively – The Bill does not discriminate between types of education provider. Colleges have students of diverse ages, backgrounds undertaking diverse programmes of study. • Ofsted will inspect compliance with the statutory Prevent Duty and an ‘inadequate’ would trigger an intervention– Colleges need to provide training to staff, to have named individuals with clear responsibilities and be able to evidence compliance. Be clear on the differences between legal requirements and developing appropriate ways of working. Policy agenda
  • 56. • Two conferences to date – AoC will continue to run conferences, seminars and regional events as the programme develops. Providing the space for colleges to discuss how they implement the Duty is vital. • Resources – The AoC website (aoc.co.uk) has numerous, free to access, resources on policy analysis, case studies, blog posts and news items. Stay informed about legal and policy changes and about how colleges might inform the debate. • AoC work as a single point of contact – AoC coordinates activity among all government departments and agencies and has a Policy team that works to see that a coherent and rational approach is adopted by them and by colleges. If you have questions, AoC is best placed to help. AoC and the Prevent Duty

Editor's Notes

  1. About Janet CSIRT Our mission is to create a secure environment to conduct your online activities. Our primary function is monitor and resolve any security incidents that occur on the network, with specialists tracking a range of platforms, including Unix, Linux and Windows. We work closely with our community to detect, report and investigate incidents that pose a threat to the security of our customers' information systems. We also investigate other forms of network abuse such as spam and copyright infringement. Due to the geographical scope of incidents, we assist national and international law enforcement agencies in their investigations, connecting them to our trusted contacts within the community. Information security threats are not limited to particular networks or national boundaries, and we work with other CSIRTs across the UK, Europe and the rest of the world to manage and resolve incidents. We have built strong relationships with other security researchers and sources of security reports to ensure we provide you with a fast and effective response.
  2. 162 HEIs in the UK 300 FES organisations
  3. The sessions have also been attended by representatives from BIS and were also reviewed by Matthew Batton from The Home Office. The Home Office liked our approach to facilitated online learning and has since asked us to feature our online WRAP sessions in the forthcoming Prevent Training Catalog. Feedback from sessions has been very positive and there is high demand for courses, from all sectors and a varied audience including tutors, student welfare officers, College principles and members of safeguarding teams.
  4. At it’s most basic level, the system’s only filtering is based on the IWF and Unlawful Extremism content list. I.E. it is only restricting access to illegal content – the rest of the web is open. Using any more of the capabilities of the system is up to you. If you want to filter Gambling sites you can, if you want to leave them open, you can, if you want to leave particular sites open but not others, you can, the choice is yours. A big consideration with filtering is the administration overhead; the simpler the approach the easier it is and less time consuming to administrate.
  5. Usage is subject to fair usage. A sustained period of 4 months excessive usage could result in a levy to upgrade the service infrastructure in order to maintain the service. Any intended levy would be subject to 6 months notice.
  6. Usage is subject to fair usage. A sustained period of 4 months excessive usage could result in a levy to upgrade the service infrastructure in order to maintain the service. Any intended levy would be subject to 6 months notice.
  7. Janet computer security incident response team (CSIRT) Safeguarding organisations current and future computer security, with a primary function to monitor and resolve any security incidents that occur on the Janet network.  web filtering service Allows organisations manage access to websites in accordance with their local policy using configurable lists of blocked or permitted web addresses. Mailer Shield The service helps manage organisations mail facilities, offering additional security by identifying the source of a message and indicating whether it is listed in any blacklists. education shared information security service (ESISS) Helping organisations to reduce the risk of information security breaches and reduce the costs of prevention, management, remediation and audit activities. Email advice and testing STAN - the spam-relay tester and notification system. This service will test organisations mail server and report unauthorised relays. Blacklists and whitelists Access Jisc copies of several leading DNS blacklists and whitelists Blacklists will enable you to block 'unwanted' email, while at the other end of the spectrum, whitelists will allow 'wanted' email to get through to end users.
  8. Here’s the Home Office guidance for E&W HE – others are similar
  9. Here’s the bit about ICT The rest is policies and processes to identify people at risk of radicalisation and to help them avoid that risk
  10. And, actually, this is the bit about technology The other two paragraphs are also IT policy – on acceptable use and arrangements for legitimate research
  11. And here’s what that says: institutions that already use filtering for other things should *consider* using it for Prevent too But why only “consider”? Surely if you’re already using filtering then it’s a no-brainer to tick the “extremism” box? Well maybe. Remember the objective is to help people at risk of radicalisation. That’s people who are already feeling – whether from news, chats, or their own experience - that an injustice is being done to “us” and “they” aren’t doing anything about it. And how is someone like that going to react if their attempts to find out more produce…
  12. Some students might go back to their studies But I suspect others will go and do the same research on other networks, or through VPNs. So we lose any chance of noticing their online activities and bringing them in to those other policies and processes Whereas what we’re supposed to be doing is…
  13. Here’s what we’re trying to do… Mitigate risks…
  14. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  15. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  16. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  17. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  18. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  19. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)
  20. HEFCE’s Advice Note (again, with one tech bullet to four policy ones) asks “whether and how” to use tech to do that Where might we pick up indications that someone is at risk? (Remembering that these are likely to be patterns of behaviour, not single acts) What guidance do we have on online signs to look out for? Are they suitable for use by humans or machines? How are users likely to react? (Remembering how easy technology makes it to hide, and that this will depend on what they are used to, hence the HO “Sites that already use…”) How can we keep those at risk within our support systems? (Remember “filtering as part of…”)