A brief introduction to the National Cyber Security Centre, what we’re doing for colleges’ cyber security and opening a conversation about what else we should be doing. We’ll cover a number of (free!) NCSC products and guidance that can really help raise individual colleges’ and universities’ cyber resilience that you may or may not be aware of, and talk about our future plans.
Presentation delivered by Hannah H., NCSC, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Cyber risk tips for boards and executive teamsWynyard Group
Craig Richardson, CEO of crime fighting software company Wynyard Group shares his recommendations for boards and executives on addressing cyber risks for their organisations.
Here are my slides on "Board and Cyber Security" that I presented at the Just People Information Security breakfast this morning. Thanks Adam for arranging the session and those who attended.
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Cyber risk tips for boards and executive teamsWynyard Group
Craig Richardson, CEO of crime fighting software company Wynyard Group shares his recommendations for boards and executives on addressing cyber risks for their organisations.
Here are my slides on "Board and Cyber Security" that I presented at the Just People Information Security breakfast this morning. Thanks Adam for arranging the session and those who attended.
This session will discuss the main cyber threats for 2019 by including security public and private sector experts. After an overview of the top cybersecurity industry predictions for the coming year, the panel will discuss effective solutions and roadmaps needed as we head into the 2020s.
Main points covered:
• What are the top cyber threats facing enterprises in 2019?
• What do the major cybersecurity vendors believe will happen in the next few years?
• What is being done to prepare for daily cyber-attacks facing enterprises?
• What projects are leading Chief Information Security Officers (CISOs) and Chief Risk Officers (CROs) implementing now?
Presenters:
Our first presenter for this session is Maria S. Thompson, State Chief Risk and Security Officer for the State of North Carolina. Maria brings to the State over 20 years of experience in Information Technology and cybersecurity. Maria’s personal honors include receiving the 2007 National Security Agency’s prestigious Rowlett Award for individual achievement in Information Assurance. Additionally, she received the 2008 Office of Secretary of Defense Certificate of Excellence for the implementation of an IA strategy for the Information Assurance Workforce. Most recently, Maria was selected as a winner of one of the 2018 Triangle Business Journal Women in Business award and State Scoop’s 50th Award State Cybersecurity Leader
The second presenter is Dan Lohrmann is an internationally recognized cybersecurity leader, technologist and author. Starting his career at NSA, Lohrmann has served global organizations in the public and private sectors in many leadership capacities. As a top Michigan Government technology executive for seventeen years, Dan was national CSO of the Year, Public Official of the Year and a Computerworld Premier 100 IT Leader. He is currently CSO & Chief Strategist at Security Mentor, where he advises global and local corporations and governments on cybersecurity and technology infrastructure strategies and security culture change. He has been a keynote speaker at security conferences from South Africa to Europe and Washington D.C. to Moscow.
Recorded Webinar: https://youtu.be/IHAAXQ30zBk
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
A data breach can threaten the continued existence of even the largest organizations.This presentation by Chris Roach, Managing Director at CBIZ shares what is at stake and, more importantly, what your business can do to minimize the risk of a data breach.
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
Presented at the annual UK Security Expo in London, to help traditional Security Directors understand and feel confident about the practical ways in which their role should extend to cyber security issues. This presentation was followed by a simple cyber attack simulation (not shown here).
Presented by Barrie Millett and Kevin Duffey of Cyber Rescue.
The July 2017 Cybersecurity Risk LandscapeCraig McGill
John Hinchcliffe, one of the talented cybersecurity experts at PwC in Scotland, recently spoke at an ISACA event, talking about the current security risk landscape, highlighting some of the forgotten security risks, and challenging attendees to think about the true value of their data.
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
Cybersecurity is a difficult and serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Peering into the future of cybersecurity provides valuable insights around the challenges and opportunities. The industry is changing rapidly and attackers seem to always be one step ahead.
Presented by Matthew Rosenquist at the 2016 Connected Security Expo (CSE) @ ISC West http://www.connectedsecurityexpo.com/
Michael Johnson of the University of Minnesota shares the risks of cyber security and the measure you should be taking to ensure your company's safety.
The process for identifying existing flaws in the IT ecosystem that threatens the data and network security of an organization is called IT Risk Assessment.
Breaking down the cyber security framework closing critical it security gapsIBM Security
Cyber crime is pervasive and here to stay. Whether you work in the Public Sector, Private Sector, are the CEO for a Fortune 500 Company or trying to sustain a SMB everyone is under attack. This February, President Obama, issued an executive order aimed at protecting critical business and government infrastructure due to the scale and sophistication of IT security threats that have grown at an explosive rate. Organizations and Government agencies have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns. Many security executives are struggling to answer questions about the most effective approach.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
Netpluz Cyber Intelligence Managed Security Pack for Small to Mid Business
A Cyber Protection Service That provides reactive mitigation and alerting before an event becomes an incident
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
Ethical hacking helps organizations in preventing the exploitation and vulnerabilities of their system’s data.
Today, several real-world testing methods are used to avoid cyber-attacks and secure important data from exploitation.
The webinar covers
• Ethical Hacking
• Penetration Testing
• Differences and Similarities
• Types & Stages of Penetration Testing
• Cybersecurity
• Impact of COVID-19 on Cybersecurity
Presenters:
Carl Carpenter
Carl is a former CISO of a $6B entity where he was responsible for protecting data of all types and regulatory environments such as FFIEC, HIPAA, and PCI as well as working with the FBI, IRS, and US Department of Labor around investigations relating to money laundering. He has performed assessments against Fortune 10 and 50 companies in the areas of GDPR, CCPA, ISO/IEC 27001 and currently performs CMMC assessments as well as CMMC pre-audit support to help ensure a successful CMMC audit. Prior to that, Carl retired from the US Military where he was involved in counter-terrorist, counter-narcotics, counter-intelligence operations and training foreign military members in these same concepts. Carl is also a PECB trainer in ISO/IEC 27001, ISO/IEC 27032, and CMMC Foundations and holds numerous other certifications.
In 2016, Carl joined Arrakis Consulting where he started as an auditor and providing CISO-as-a-Service to small or medium sized companies that needed more experience without increased cost. In 2017, Carl added active penetration testing to his portfolio of skills and routinely performs penetration tests against companies of all sizes. Carl also trains people on a variety of skills such as penetration testing, network engineering, network administration, OSI model, subnetting, etc…
Carl holds a Bachelors from Western Governors University in Network Security and Operations as well as numerous certifications from ITIL, Cisco, CompTIA, Microsoft, CMMC-AB, ISACA, OneTrust, RSA, PCI Council, Citrix, and Novell
Andreas Christoforides
Mr. Christoforides is an active IT auditor and a trainer for a various organization on Information Security Management Systems. He is a member of the Cyprus Computer Society, a PECB certified trainer for ISO/IEC 27001, ISO 22301 and GDPR CDPO, and a former Deputy Head of IT Infrastructure at a Bulgarian Leading Bank.
In 2019, he joined BEWISE and delivered to clients a wide range of Cybersecurity projects in the areas of strategy, governance and risk management, data privacy and protection (GDPR), and business resilience and recovery. He conducts IT Risk Assessments and develops IT policies and procedures towards establishing an effective and secure IT Governance framework.
Mr. Christoforides holds a BEng degree from Birmingham City University and a variety of other qualifications from Microsoft and CISCO.
YouTube video: https://youtu.be/cTrdBZFIFhM
Website link: https://pecb.com/
CEOs leading Recovery from Cyber AttackKevin Duffey
This presentation was given to senior representatives from the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft, Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29th June 2016.
KnowBe4 helps you keep your network secure with Kevin Mitnick security awareness training. You are able to send simulated phishing attacks before and after the training. Created ‘by admins for admins’, a minimum of time is needed with visible proof the security awareness training works. Find out what your email attack footprint looks like and ask for our free Email Exposure Check.
Based on Kevin’s 30+ year unique first-hand hacking experience, you are now able to train employees with next-generation web-based training and testing, to quickly solve the increasingly urgent security problem of Social Engineering.
This session will discuss the main cyber threats for 2019 by including security public and private sector experts. After an overview of the top cybersecurity industry predictions for the coming year, the panel will discuss effective solutions and roadmaps needed as we head into the 2020s.
Main points covered:
• What are the top cyber threats facing enterprises in 2019?
• What do the major cybersecurity vendors believe will happen in the next few years?
• What is being done to prepare for daily cyber-attacks facing enterprises?
• What projects are leading Chief Information Security Officers (CISOs) and Chief Risk Officers (CROs) implementing now?
Presenters:
Our first presenter for this session is Maria S. Thompson, State Chief Risk and Security Officer for the State of North Carolina. Maria brings to the State over 20 years of experience in Information Technology and cybersecurity. Maria’s personal honors include receiving the 2007 National Security Agency’s prestigious Rowlett Award for individual achievement in Information Assurance. Additionally, she received the 2008 Office of Secretary of Defense Certificate of Excellence for the implementation of an IA strategy for the Information Assurance Workforce. Most recently, Maria was selected as a winner of one of the 2018 Triangle Business Journal Women in Business award and State Scoop’s 50th Award State Cybersecurity Leader
The second presenter is Dan Lohrmann is an internationally recognized cybersecurity leader, technologist and author. Starting his career at NSA, Lohrmann has served global organizations in the public and private sectors in many leadership capacities. As a top Michigan Government technology executive for seventeen years, Dan was national CSO of the Year, Public Official of the Year and a Computerworld Premier 100 IT Leader. He is currently CSO & Chief Strategist at Security Mentor, where he advises global and local corporations and governments on cybersecurity and technology infrastructure strategies and security culture change. He has been a keynote speaker at security conferences from South Africa to Europe and Washington D.C. to Moscow.
Recorded Webinar: https://youtu.be/IHAAXQ30zBk
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
A data breach can threaten the continued existence of even the largest organizations.This presentation by Chris Roach, Managing Director at CBIZ shares what is at stake and, more importantly, what your business can do to minimize the risk of a data breach.
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
Presented at the annual UK Security Expo in London, to help traditional Security Directors understand and feel confident about the practical ways in which their role should extend to cyber security issues. This presentation was followed by a simple cyber attack simulation (not shown here).
Presented by Barrie Millett and Kevin Duffey of Cyber Rescue.
The July 2017 Cybersecurity Risk LandscapeCraig McGill
John Hinchcliffe, one of the talented cybersecurity experts at PwC in Scotland, recently spoke at an ISACA event, talking about the current security risk landscape, highlighting some of the forgotten security risks, and challenging attendees to think about the true value of their data.
IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
Cybersecurity is a difficult and serious endeavor which over time strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Peering into the future of cybersecurity provides valuable insights around the challenges and opportunities. The industry is changing rapidly and attackers seem to always be one step ahead.
Presented by Matthew Rosenquist at the 2016 Connected Security Expo (CSE) @ ISC West http://www.connectedsecurityexpo.com/
Michael Johnson of the University of Minnesota shares the risks of cyber security and the measure you should be taking to ensure your company's safety.
The process for identifying existing flaws in the IT ecosystem that threatens the data and network security of an organization is called IT Risk Assessment.
Breaking down the cyber security framework closing critical it security gapsIBM Security
Cyber crime is pervasive and here to stay. Whether you work in the Public Sector, Private Sector, are the CEO for a Fortune 500 Company or trying to sustain a SMB everyone is under attack. This February, President Obama, issued an executive order aimed at protecting critical business and government infrastructure due to the scale and sophistication of IT security threats that have grown at an explosive rate. Organizations and Government agencies have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns. Many security executives are struggling to answer questions about the most effective approach.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
Netpluz Cyber Intelligence Managed Security Pack for Small to Mid Business
A Cyber Protection Service That provides reactive mitigation and alerting before an event becomes an incident
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
Ethical hacking helps organizations in preventing the exploitation and vulnerabilities of their system’s data.
Today, several real-world testing methods are used to avoid cyber-attacks and secure important data from exploitation.
The webinar covers
• Ethical Hacking
• Penetration Testing
• Differences and Similarities
• Types & Stages of Penetration Testing
• Cybersecurity
• Impact of COVID-19 on Cybersecurity
Presenters:
Carl Carpenter
Carl is a former CISO of a $6B entity where he was responsible for protecting data of all types and regulatory environments such as FFIEC, HIPAA, and PCI as well as working with the FBI, IRS, and US Department of Labor around investigations relating to money laundering. He has performed assessments against Fortune 10 and 50 companies in the areas of GDPR, CCPA, ISO/IEC 27001 and currently performs CMMC assessments as well as CMMC pre-audit support to help ensure a successful CMMC audit. Prior to that, Carl retired from the US Military where he was involved in counter-terrorist, counter-narcotics, counter-intelligence operations and training foreign military members in these same concepts. Carl is also a PECB trainer in ISO/IEC 27001, ISO/IEC 27032, and CMMC Foundations and holds numerous other certifications.
In 2016, Carl joined Arrakis Consulting where he started as an auditor and providing CISO-as-a-Service to small or medium sized companies that needed more experience without increased cost. In 2017, Carl added active penetration testing to his portfolio of skills and routinely performs penetration tests against companies of all sizes. Carl also trains people on a variety of skills such as penetration testing, network engineering, network administration, OSI model, subnetting, etc…
Carl holds a Bachelors from Western Governors University in Network Security and Operations as well as numerous certifications from ITIL, Cisco, CompTIA, Microsoft, CMMC-AB, ISACA, OneTrust, RSA, PCI Council, Citrix, and Novell
Andreas Christoforides
Mr. Christoforides is an active IT auditor and a trainer for a various organization on Information Security Management Systems. He is a member of the Cyprus Computer Society, a PECB certified trainer for ISO/IEC 27001, ISO 22301 and GDPR CDPO, and a former Deputy Head of IT Infrastructure at a Bulgarian Leading Bank.
In 2019, he joined BEWISE and delivered to clients a wide range of Cybersecurity projects in the areas of strategy, governance and risk management, data privacy and protection (GDPR), and business resilience and recovery. He conducts IT Risk Assessments and develops IT policies and procedures towards establishing an effective and secure IT Governance framework.
Mr. Christoforides holds a BEng degree from Birmingham City University and a variety of other qualifications from Microsoft and CISCO.
YouTube video: https://youtu.be/cTrdBZFIFhM
Website link: https://pecb.com/
CEOs leading Recovery from Cyber AttackKevin Duffey
This presentation was given to senior representatives from the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft, Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29th June 2016.
KnowBe4 helps you keep your network secure with Kevin Mitnick security awareness training. You are able to send simulated phishing attacks before and after the training. Created ‘by admins for admins’, a minimum of time is needed with visible proof the security awareness training works. Find out what your email attack footprint looks like and ask for our free Email Exposure Check.
Based on Kevin’s 30+ year unique first-hand hacking experience, you are now able to train employees with next-generation web-based training and testing, to quickly solve the increasingly urgent security problem of Social Engineering.
The Ultimate EC Council Certification HandbookCalvin Sam
Cybersecurity is emerging as a booming industry nowadays owing to the staggering increase in cybercrimes. Organizations have realized the importance of an appropriate cybersecurity plan as a precautionary measure to curb their monetary and reputational risks. Regardless of its size, every organization should have a cybersecurity governance and risk management team in place. EC-Council holds its position as a world leader for its cybersecurity training and certifications in the cybersecurity domain. It is the creator of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, to name a few. This approach has made them the undisputed world leader in Information Security, Network
Security, Computer Security, and Internet Security training and courses.
Improve Cybersecurity posture by using ISO/IEC 27032PECB
Cybersecurity is a universal concern across today’s enterprise and the need for strategic approach is required for appropriate mitigation.
Adopting ISO 27032 will help to:
• Understanding the nature of Cyberspace and Cybersecurity
• Explore Cybersecurity Ecosystem – Roles & Responsibilities
• Achieve Cyber Resilience through implementing defensive and detective cybersecurity controls
Presenter:
Obadare Peter Adewale is a first generation and visionary cyberpreneur. He is a PECB certified Trainer, Fellow Chartered Information Technology Professional, the First Licensed Penetration Tester in Nigeria, second COBIT 5 Assessor in Africa and PCI DSS QSA. He is also an alumnus of Harvard Business School and MIT Sloan School of Management Executive Education.
Link of the recorded session published on YouTube: https://youtu.be/NX5RMGOcyBM
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
PART II – Cyber Security: the mitigation strategies – how to identify, assess and mitigate cyber risks
The Risk Manager must be responsible, as for others risks, for the quantification aspect of cyber security. It is a necessary step towards understanding and managing the exposure of the company. He/she should act as a facilitator between the Board and the operational department (IT, Finance, Legal and other functions).
A key subject to unlock the cyber insurance development and to support the economic growth the Digital world is bringing to Europe.
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
SOC is abbreviated as Security Operations Center, a centralized team of any company that monitors real-time threats, real-time incidents, and suspicious activities. The SOC team will take the appropriate action or assign some professionals to handle the risk if found.
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
APNIC Senior Security Specialist Adli Wahid presents on identifying skill gaps and how to meet them at the ASEAN-JAPAN Cyber Security Seminar, held online on 11 August 2021.
Similar to Virtual Bridge Sessions: The National Cyber Security Centre at Your Service (20)
As we all make the switch to online delivery, it’s important to make the online experience as accessible as possible to all of our students. Here are some tips around how you can make that delivery work for everyone.
Presentation delivered by Laura Hutton, Forth Valley College, as part of the Virtual Bridge Session series.
Watch the video at: https://www.youtube.com/watch?v=heL6z_CrsP4
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Presentation delivered by Gillian Fielding & Josephine Kinsey, Blackboard at a SMUG Meet event on 4th March, 2022.
Gillian provides a brief overview of the Blackboard Ally platform followed by a live demo of Ally by Jo.
To join SMUG, subscribe to the mailing list at: www.jiscmail.ac.uk/smug
Watch the recording at: https://youtu.be/dcKyFeMaw7E
Presentation delivered by Drew McConnell, University of Glasgow at a SMUG Meet event on 4th March, 2022.
Drew McConnell then covers the University of Glasgow’s experience of using Ally in a live setting.
To join SMUG, subscribe to the mailing list at: www.jiscmail.ac.uk/smug
Watch the recording at: https://youtu.be/dcKyFeMaw7E
This session will pull together lessons learned for HMI work with colleges over the period of remote learning. It will examine the changes, and strong practices identified. This session will also be supported by Dumfries and Galloway College who developed a strong CPD programme reflecting the different levels of skill within the staff on use of technologies for remote learning.
Presentation delivered by Ian Beach, HMI, Education Scotland; Mandy Wallace & Angela Connelly, Dumfries & Galloway College, as part of the Virtual Bridge Session series.
Watch the video at: https://www.youtube.com/watch?v=KFxWIg45_XA
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Presentation delivered by Brian Forsyth, Glasgow Clyde College at the CDN MIS Network Event on 28-04-21. Access the presentation recording on the CDN website: www.cdn.ac.uk
Presentation delivered by Kenny Wilson, SFC, at the CDN MIS Network Event on 28-04-21. Access the presentation recording on the CDN website: www.cdn.ac.uk
Presentation delivered by Allan Forsyth, New College Lanarkshire at the CDN MIS Network Event on 28-04-21. Access the presentation recording on the CDN website: www.cdn.ac.uk
Hybrid delivery describes a situation where some of your students are in the class with you, while others are joining remotely. I've never taught like that, but I have been in many meetings where those joining online have been the 'poor cousins' in any interaction. It's definitely easier to have everyone online or in the class.
Further restrictions and/or the need to self-isolate means that hybrid delivery might be a very real option for many. I've spent a little time looking at some of the advice offered around this approach to learning and teaching and will share what I've found.
Presentation delivered by Kenji Lamb, CDN, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Are social media platforms the new Library? YouTube, Instagram and TikTok are increasingly being used as sources of teaching and learning content. Textbooks come with barely a paragraph of terms and conditions about their use. The social media platforms, however, are accompanied by seemingly never-ending terms of service, community guidelines and privacy policies. Do you read this information, does anyone at your college? Do you understand the terms "takedown", "cease and desist"? Have you/your college ever received a "Getty letter"?
This webinar will provide an introduction to the convoluted world of copyright and social media terms and conditions. Buckle up - it could be a bumpy ride!
Presentation delivered by Alan Rae, Copyright Scotland, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
For many managers, there is a real challenge both in managing remotely, and having confidence about the quality of remote or online delivery. Most managers have years of experience of managing campus based learning, and have had the benefit of peer and specialist support on site. However, few managers have the experience of teaching remotely, so supporting staff and recognising good delivery is a greater challenge. This session looks at adjustments to their management approach that may be helpful, and identifies some of the key characteristics of well delivered on line activity.
Presentation delivered by Dr John Laird, HMI, Education Scotland, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
This session is aimed at lecturers and managers in the sector with a clear focus on providing evidence-based research with pointers/tips for teaching face-to-face and online. We will also be talking about the forthcoming launch of the Pedagogy Matters podcast, which will feature interviews with key practitioners across the country to support effective delivery of the curriculum, as well as plans for future professional development materials and opportunities.
Presentation delivered by Jonny Rees, College Development Network, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Recording available at: https://www.youtube.com/watch?v=otSVEp4YE8s
Following a useful session on retention on the 26th November, there is an increasing interest for managers to have a useful summary of lessons from research around blended/digital delivery.
Although there are many sources of good information available, having this summarised and reflecting on how it may be useful in practice should be helpful for a busy manager in ensuring well researched thinking is informing management and operational practice. As with many aspects of Covid, it can be helpful to be guided by the science.
Presentation delivered by John Laird, HMI, Education Scotland, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Recording available at: https://www.youtube.com/watch?v=oari0oHrJIk
This session is aimed at managers with responsibility for the delivery and evaluation of online learning and teaching. As a result of the Covid-19 pandemic colleges have been forced to make an abrupt shift to remote learning, often existing in makeshift offices. Join us as we examine the challenges that this new environment presents and the lessons learned thus far from approaches developed in other UK nations and further afield.
We will share our thoughts on what leaders have learned about how to manage their institution during this difficult time and how they are addressing the challenges now and anticipating those in the future. Colleagues will be invited to join the discussion, raise questions and contribute examples from their own experience.
Presentation delivered by Ian Beach, HMI, Education Scotland, as part of the Virtual Bridge Session series.
Follow along at https://twitter.com/Virtual_Bridge and see what's coming up next at https://bit.ly/VBsessions
Recording available at: https://www.youtube.com/watch?v=kG0lCuRRX2U
Presentation delivered by Kellie Mote, accessibility specialist at Jisc, as part of a webinar in partnership with College Development Network (CDN), streamed on 20th February, 2020.
Presentation delivered by Simon Hewitt, Vice Principal (Curriculum & Attainment), Dundee & Angus College at the CDN MIS Network event on 21st November, 2019.
Presentation delivered by Jason Quinn, Assistant Principal: Planning and Infomatics, New College Lanarkshire at the CDN MIS Network event on 21st November, 2019.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
1. The National Cyber Security Centre at
Your Service
Hannah H
23rd March 2021
2. Helping to make the UK the safest place to live and work online
2
The NCSC:
• understands cyber security, and distils this
knowledge into practical guidance for all
• responds to cyber security incidents to
reduce the harm they cause to organisations
and the wider UK
• uses industry and academic expertise
to nurture the UK's cyber security capability
• reduces risks to the UK by securing public
and private sector networks
4. You may know us from products and
services such as….
5. Cyber Essentials
and Cyber Essentials Plus
IASME as sole certification body now
Readiness tool - https://getreadyforcyberessentials.iasme.co.uk/
Any feedback?
6. 1.Strong and separate passwords for email
2.Strong passwords by using three random words
3.Save passwords in your browser
4.Turn on 2FA (two factor authentication)
5.Update your devices
6.Back up your data
Cyber Aware campaign – the basics
7. Covid-related advice – and new topics
Moving from physical to digital
Video conferencing
Guidance on Cyber Insurance
8. Staff awareness training
Top Tips for Staff e-learning
Can be embedded in your own ELM system
Being updated
What about students?
9. Alerts and Advisories
Through our website
CiSP?
Weekly bulletins on open source cyber security stories
https://www.ncsc.gov.uk/section/keep-up-to-date/
Weekly threat reports
10. Exercise in a Box
Simulated and table-top exercises
Free!
Scenarios based on common cyber incidents
Gives advice afterwards
11. The Cyber Security Toolkit for Boards
• Guidance to support board members get up to speed on a topic they may not be
familiar with
• Designed primarily for corporate boards - but messages relevant to any board in
any sector (e.g. school governors, charity trustees)
• Nine key modules on key cyber security topics
• Followed by questions board members may wish to ask their technical experts
13. Suspicious Email Reporting Services
report@phishing.gov.uk
Looks at reporting emails to see if there is suspicious activity
(i.e. looks to be phishing emails sent via a domain, investigates
it and, if UK based, looks to take it down)
4 million reports in the first year1
14. Reporting / Incidents
Do you have an incident management plan?
Who would you report to?
• Police Scotland
• Jisc?
• us?
• Scottish government
Our incident management info
16. Ten Steps to Cyber Security
Detailed guidance on how larger organisations can protect themselves
in cyberspace.
Currently being updated
17. ‘Active Cyber Defence’ – My NCSC
Web Check – for common website vulnerabilities
Mail Check – to protect against mail spoofing
Early Warning – soft launch – automated alerts if network abuse
activity is seen or suspected, so warns of potential threats
against the network.
18. Read all about it…
Ransomware alert for the sector: Sept 2020
Ransomware alert for the sector: March 2021
Mitigating ransomware & malware attacks
19.
20. Which have you heard of?
Which are you using?
What else do you need?
What are the barriers?
How else can we reach you?
Hannah.h@ncsc.gov.uk
Editor's Notes
A brief introduction to the National Cyber Security Centre, what we’re doing for colleges’ cyber security and opening a conversation about what else we should be doing. We’ll cover a number of (free!) NCSC products and guidance that can really help raise individual colleges’ cyber resilience that you may or may not be aware of, and talk about our future plans.
My role sits with the Education and Academia Engagement team.
We seek to raise the cyber resilience of educational settings including Early Years, schools, colleges and universities.
We’re not able to give 1-2-1 assistance and support to institutions but instead partner with via umbrella organisations and stakeholder groups to enable us to work at scale.
We seek to give guidance, identify and respond to common concerns, and raise the understanding of the importance of cyber security right across the education sector.
This means we need to know what we’re doing that is helpful and what we need to improve or to address.
Engagement
Working with partners / amplification bodies
School governor
The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to allow UK organisations to share cyber threat information in a secure and confidential environment. CiSP is for professionals who have an obligation for cyber security within their organisation. Those individuals must work for a UK registered organisation or UK Government.
Screenshot of home page for toolkit as of March 2021.
Due to be updated soon to make it more interactive and easier to navigate.
In short, there is an introduction to cyber security to help board members get up to speed with a topic they may be unfamiliar with
And then 9 key modules looking at specific cyber security topics.
Why?
Link to knowing that you’re ‘alone’ on your network/systems: i.e. the only people there are those who are supposed to be, and only in the parts that they need access to.