Menu
Snapshots are a pairing of two 20 minute presentations followed by a 5 minute Q & A.
This is presentation 2 of 2, scroll down to see more details.
Other presentations in this group:
The purpose of this presentation is to share the first-hand experience of Owensboro Public Schools’ in their decade-long journey to automating and securing a digital learning environment in order to help districts who are at the beginning stages. By understanding challenges that were faced, lessons learned, and best practices discovered throughout their journey, other districts and education leaders can learn how to dramatically shorten their time and pain in achieving the same impressive outcomes.
Through the presentation, attendees will gain the knowledge to:
- Evaluate existing digital ecosystem strategies, identifying the maturity of current data and business processes
- Build the foundation for a zero-trust environment that safeguards student and employee data privacy and management
- Create an automated digital learning environment built upon strong identity and access management principles
- Balance technology automation and cybersecurity, while enabling a frictionless experience in the classroom
Introduction: 3 min
- Tactic: 1 minute hook activity with digital polling to establish current state of audience’s digital journeys
Owensboro's Digital Journey: 4 min
Reality of Technology in Education: 5 min
-Tactic: 5 minute peer-to-peer group activity to brainstorm an innovative solution to a hypothetical manual process problem
In-House Solution: 4 min
-Tactic: 3 minute Partner activity to identify the pain points of a manual solution and barriers to learning.
Search for an IAM Solution: 5 min
-Tactic: 4 minute Interactive game for a mock vendor evaluation process
Access Automated for All Stages: 4 min
How Long Does it Take to Implement an Automated Strategy? 5 min
-Tactic: Take-away best practice worksheet
Tactics to be leveraged:
-Audience polling hook activity
-Peer think-pair-share to process key ideas
GovTech, "Could ID Management Limit Cyber Attacks on K-12 Districts?": https://www.govtech.com/education/k-12/could-id-management-limit-cyber-attacks-on-k-12-districts
EdTech Magazine, "What Is Identity and Access Management for K–12": https://edtechmagazine.com/k12/article/2022/02/what-identity-and-access-management-k-12-perfcon
EDUCAUSE, "7 Things You Should Know About... Federated Identity": https://library.educause.edu/-/media/files/library/2019/1/est1901.pdf
Identity Automation, "Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program": https://blog.identityautomation.com/why-zero-trust-is-the-foundation-of-a-strong-k-12-cybersecurity-program
Related exhibitors: | Identity Automation |