Menu
The education world is constantly changing and growing, and technology is consistently a factor in that change. In our new technology-forward education industry, cybersecurity is a major factor in protecting students, educators, and communities. While a robust technical solution is a critical component to shielding people and systems from digital threats, K-12 leaders must also work together to co-create and implement a systems-based cybersecurity strategy.
This game is a valuable group cybersecurity professional development tool. The game allows everyone to gather and participate in a cybersecurity leadership exchange. Every question and discussion card are designed to trigger open, honest feedback. Through the power of reflection and dialogue, team members understand core cybersecurity principles, learn to embrace where they are on the cybersecurity leadership journey, and increase their ability to appreciate one another’s strengths and learn where they need to improve.
1. Audience will be divided into groups/teams. (5 min.)
2. Audience will use an online web-based game, accessible by QR code. The estimated time to play the game will be 40 minutes.
3. Participants may use their laptop or phone to randomly select a card from the deck.
4. Groups will answer the question, discuss and share their strategies and/or develop new strategies for solutions.
5. The group may opt to keep score or play the game for fun.
6. Cards in the card deck will use a series of cybersecurity principles, planning topics, table-top exercises, and scenarios.
With 15 minutes remaining, participants to regroup and share their experience, findings, best practices, and learnings as a result of playing the game.
CoSN EdTech Trends Report | 2022 - https://drive.google.com/file/d/1TbhIuLwpbfVTspE5mgx6QwBI8l4wAlT0/view?usp=sharing
SETDA 2022 State EdTech Trends Report - https://www.setda.org/priorities/state-trends/
8 top priorities for CIOs in 2022 - https://www.cio.com/article/303215/8-top-priorities-for-cios-in-2022.html
Cyberthreats, viruses, and malware - Microsoft Security Intelligence - https://www.microsoft.com/en-us/wdsi/threats