MORE EVENTS
Leadership
Exchange
Solutions
Summit
DigCit
Connect
Change display time — Currently: Eastern Daylight Time (EDT) (Event time)

From Tech Barrier to Learning Enabler: Securing & Automating Districtwide Digital Ecosystems

,
Pennsylvania Convention Center, 109AB

Listen and learn: Snapshot
Save to My Favorites

Snapshots are a pairing of two 20 minute presentations followed by a 5 minute Q & A.
This is presentation 2 of 2, scroll down to see more details.

Other presentations in this group:

Presenters

Photo
Technology Supervisor
Owensboro Public Schools
Nathan Seaton has held a wide array of EdTech roles over the past 13 years spanning both the instructional and technical sides of K-12 education. He currently serves as Instructional Technology Specialist for the Owensboro Independent School District in Owensboro, Kentucky. Nathan has a degree in network administration but he has developed a passion for designing EdTech user experiences that are non-intrusive and age-appropriate while also addressing the reality of cyber security concerns. He is a member of ISTE affiliate Kentucky Society for Technology in Education and is a regular presenter at their conferences.

Session description

Owensboro Public Schools embarked on a decadelong journey creating an automated and secure digital learning environment accessible by all faculty, staff and students. Discover lessons learned and best practices as the district built a homegrown solution before adopting enterprise-grade identity management with automated lifecycle management, authentication and rostering.

Purpose & objective

The purpose of this presentation is to share the first-hand experience of Owensboro Public Schools’ in their decade-long journey to automating and securing a digital learning environment in order to help districts who are at the beginning stages. By understanding challenges that were faced, lessons learned, and best practices discovered throughout their journey, other districts and education leaders can learn how to dramatically shorten their time and pain in achieving the same impressive outcomes.

Through the presentation, attendees will gain the knowledge to:

- Evaluate existing digital ecosystem strategies, identifying the maturity of current data and business processes

- Build the foundation for a zero-trust environment that safeguards student and employee data privacy and management

- Create an automated digital learning environment built upon strong identity and access management principles

- Balance technology automation and cybersecurity, while enabling a frictionless experience in the classroom

More [+]

Outline

Introduction: 3 min
- Tactic: 1 minute hook activity with digital polling to establish current state of audience’s digital journeys

Owensboro's Digital Journey: 4 min

Reality of Technology in Education: 5 min
-Tactic: 5 minute peer-to-peer group activity to brainstorm an innovative solution to a hypothetical manual process problem

In-House Solution: 4 min
-Tactic: 3 minute Partner activity to identify the pain points of a manual solution and barriers to learning.

Search for an IAM Solution: 5 min
-Tactic: 4 minute Interactive game for a mock vendor evaluation process

Access Automated for All Stages: 4 min

How Long Does it Take to Implement an Automated Strategy? 5 min
-Tactic: Take-away best practice worksheet

Tactics to be leveraged:
-Audience polling hook activity
-Peer think-pair-share to process key ideas

More [+]

Supporting research

GovTech, "Could ID Management Limit Cyber Attacks on K-12 Districts?": https://www.govtech.com/education/k-12/could-id-management-limit-cyber-attacks-on-k-12-districts

EdTech Magazine, "What Is Identity and Access Management for K–12": https://edtechmagazine.com/k12/article/2022/02/what-identity-and-access-management-k-12-perfcon

EDUCAUSE, "7 Things You Should Know About... Federated Identity": https://library.educause.edu/-/media/files/library/2019/1/est1901.pdf

Identity Automation, "Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program": https://blog.identityautomation.com/why-zero-trust-is-the-foundation-of-a-strong-k-12-cybersecurity-program

More [+]

Session specifications

Topic:
Safety, security & student data privacy
Grade level:
PK-12
Skill level:
Beginner
Audience:
Chief technology officers/superintendents/school board members, Curriculum/district specialists, Technology coordinators/facilitators
Attendee devices:
Devices required
Attendee device specification:
Smartphone: Android, iOS, Windows
Participant accounts, software and other materials:
We will provide quick polling link as well as the URL to Identity Automation's compromised credential scan.
ISTE Standards:
For Education Leaders:
Visionary Planner
  • Share lessons learned, best practices, challenges and the impact of learning with technology with other education leaders who want to learn from this work.
Systems Designer
  • Ensure that resources for supporting the effective use of technology for learning are sufficient and scalable to meet future demand.
  • Protect privacy and security by ensuring that students and staff observe effective privacy and data management policies.
Disclosure:
The submitter of this session has been supported by a company whose product is being included in the session
Related exhibitors:
Identity Automation