MORE EVENTS
Leadership
Exchange
Solutions
Summit
Change display time — Currently: Mountain Daylight Time (MDT) (Event time)

Setting Up & Modeling School Cyber Safety

,
Colorado Convention Center, 207

Listen and learn: Snapshot
Recorded Session
Save to My Favorites

Snapshots are a pairing of two 20 minute presentations followed by a 5 minute Q & A.
This is presentation 2 of 2, scroll down to see more details.

Other presentations in this group:

Presenters

Photo
Education Administrator
California Department of Education
@gbelleau
@GeoffBelleau
Photo
Educational Technology & Digital Equity
California Department of Education
@kristinamattis
@kristinamattis
Dr. Kristina V. Mattis advises statewide educational technology efforts as the Digital Equity Broadband Coordinator for the California Department of Education addressing Superintendent Thurmond’s Closing the Digital Divide Initiative. Kristina’s experience in education spans roles from classroom teaching to executive director to leading change and project management across public and private schools. She is an ESL multilingual speaker and published author. Kristina’s expansive expertise fosters her collaborative and holistic approach to propel instructional opportunities so that “we prepare students to live, work, and thrive in a multicultural, multilingual, and highly connected world” as per the CA DOE mission.

Session description

Schools are vulnerable and susceptible to cyber infringement. We are here to support schools to not only be safe but model safety when setting up the backend infrastructure and front end user practices and behaviors. Cybersecurity is the foundation for safe families, students, faculty, and staff.

Purpose & objective

The purpose of this Snapshot session is to equip school technology leaders with recommended and timely best practices related to cybersecurity. For backend set up, questions such as: Are administrator passwords are changed on an annual basis? Are all private wireless connections use WPA2 with AES? Is RADIUS authentication configured if there are more than 50 users? Are MAC address filtering enabled on the wireless network? And more will be prompted to guide recommended practices. We will then transition to providing best practices for front end user cyber safety related to phishing, scamming, MFA, and passwords protection. Ideally, the outcome will help support efforts in getting schools prepared to obtain cyber insurance.

More [+]

Outline

The first 12 minutes will be spent sharing recommended and timely best practices related to cybersecurity backend set up. The next 12 minutes will then transition to providing best practices for front end user cyber safety related to phishing, scamming, MFA, and passwords protection. The remaining 6 minutes will be spent addressing Q&A.

More [+]

Supporting research

https://www.cde.ca.gov/ls/et/rd/itsecuritytips.asp

More [+]

Session specifications

Topic:
Technology infrastructure & connectivity
Grade level:
PK-12
Skill level:
Beginner
Audience:
Chief technology officers/superintendents/school board members, Technology coordinators/facilitators
Attendee devices:
Devices useful
Attendee device specification:
Laptop: Chromebook, Mac, PC
ISTE Standards:
For Education Leaders:
Equity and Citizenship Advocate
  • Ensure all students have access to the technology and connectivity necessary to participate in authentic and engaging learning opportunities.
Systems Designer
  • Protect privacy and security by ensuring that students and staff observe effective privacy and data management policies.