MORE EVENTS
Leadership
Exchange
Solutions
Summit
Change display time — Currently: Mountain Daylight Time (MDT) (Event time)

Peeling Back the Layers: Insights from the Shrek Approach of Cybersecurity

,
Colorado Convention Center, 111/13

Listen and learn: Panel
Recorded Session
Save to My Favorites

Presenters

Photo
Chief Technology Officer
Duncanville Independent School District
@bbrownphd
Dr. Brian Brown has over 24 years experience working in K12 and higher education, and for the majority of his career has served as a leader in the areas of data and technology. He currently serves as the Chief Technology Officer for Duncanville ISD. His educational technology interests include information security, leading change through technology, exploring innovation in teaching and learning.
Photo
Professor
University of Texas at Arlington
Casey Graham Brown, Ph.D., is a Professor of Educational Leadership and Policy Studies at the University of Texas at Arlington. She has served as a teacher, as a campus administrator at all levels (elementary, middle school, and high school), and as a superintendent of schools. Graham Brown’s research and teaching interests center on teacher and administrator certification policy, technology and safety, and crisis policy and procedures.
Photo
Chief Technology Officer
Lufkin ISD
@RedEyeTX
@redeyetx
Brad Stewart is the Chief Technology Officer for Lufkin Independent School District. He began his career in Educational Technology at Corrigan Independent School District where he served as the Technology Director. In 2008, he moved to Lufkin ISD as the Director of Technology. In Lufkin he has served as the Director, Executive Director, and now Chief Technology Officer. In his role, he oversees all aspects of technology operations including infrastructure, information systems, technical services, and instructional technology. During his tenure with Lufkin ISD, he has initiated and implemented various initiatives to make Lufkin ISD a leader in in technology in the area.
Photo
Director of Technology
John Paul II High School
@kristhurston
@kristoferthurston
After 22 years in Education Technology, I’ve learned that CHANGE is the soul of the game. Starting with computer labs, moving through 1:1, into BYOD and beyond, change is the only thing that remains constant. I believe change is now taking us back to the concept of 1:1, but this time, it means something completely different. Through the purposeful use of technology, teachers can focus on building relationships, meet every student where they’re at, drive engagement and empower life-long learners, and every student feels they have a 1:1 student to teacher ratio in every class.

Session description

Join our panel as we adopt the Shrek Approach to Cybersecurity, delving into layers of protection for school districts of all sizes. Discover how different districts tackle security challenges, sharing insights on threat mitigation, data protection, and ensuring a safe digital environment while respecting the uniqueness of each district's needs.

Purpose & objective

Purpose:
The purpose of this presentation is to provide educators, IT professionals, and administrators with practical insights and strategies to enhance cybersecurity in educational institutions. By adopting the metaphor of "layers" from Shrek, we aim to help participants understand the multifaceted nature of cybersecurity challenges and how to address them effectively.

Objectives (Participant Outcomes):
By the end of this presentation, participants will:
1. Identify Key Cybersecurity Challenges: Understand the current cybersecurity landscape in education, including common threats and vulnerabilities.
2. Learn Layered Security Approaches: Explore the concept of layered security and its application to educational settings.
3. Discover Tailored Solutions: Gain insights into how different school districts of varying sizes approach cybersecurity challenges.
4. Access Practical Tools: Learn about relevant cybersecurity tools and resources to implement in their institutions.
5. Engage in Collaborative Planning: Understand the importance of collaborative planning and teamwork to establish a robust cybersecurity infrastructure.

Educational Challenge:
Educational institutions face escalating cybersecurity threats, ranging from data breaches to ransomware attacks. The challenge is to equip educators and IT teams with the knowledge and tools to protect student data and ensure the uninterrupted delivery of education.

Technology Intervention:
We will introduce various cybersecurity tools and practices, including firewall solutions, encryption, multi-factor authentication, and security awareness training. No specific tools will be endorsed, ensuring a broad applicability of the discussed strategies.

Models Employed:
We will employ a collaborative learning model, encouraging participants to share their experiences and challenges. Case studies of school districts of different sizes will be discussed to provide real-world context.

Lesson Plans/Instructional Activities:
Panel Discussions: Representatives from school districts of different sizes will share their experiences and strategies for effective cybersecurity.

Evidence of Success:
Success will be measured through participant feedback, post-presentation surveys, and engagement with practical activities. Success is evident when participants can apply the insights and tools discussed to enhance their institutions' cybersecurity measures.

More [+]

Outline

I. Introduction (5 minutes)
- Welcome and Speaker Introductions
- Setting the Stage: The Shrek Approach to Cybersecurity
II. Understanding the Educational Cybersecurity Landscape (10 minutes)
- Current Challenges in Educational Cybersecurity
- The High Stakes: Protecting Student Data and Continuity of Learning
III. Layered Security Explained (10 minutes)
- The Concept of Layered Security
- Why Layering Matters in Educational Settings
IV. Case Studies: Insights from Diverse School Districts (10 minutes)
- Presentation of Real-World Cases
- Sharing Diverse Experiences and Strategies
V. Key Cybersecurity Tools and Best Practices (10 minutes)
- Overview of Essential Cybersecurity Tools and Resources
- Best Practices for Data Protection
VI. Collaboration and Teamwork in Establishing Robust Infrastructure (5 minutes)
- Emphasizing the Importance of Collaborative Planning
- Building a Strong Cybersecurity Team
VII. Q&A Session and Participant Engagement (5 minutes)
- Addressing Participant Questions
- Sharing Additional Insights and Tips
VIII. Conclusion and Takeaways (5 minutes)
- Recap of Key Insights and Actionable Takeaways
- Encouragement for Ongoing Learning and Collaboration
IX. Closing Remarks and Resources (5 minutes)
- Final Thoughts and Gratitude
- Sharing Additional Resources and References

More [+]

Supporting research

https://www.sciencedirect.com/science/article/pii/S2667096822000234
https://www.securitymagazine.com/articles/99253-the-7-layers-of-a-strong-cybersecurity-strategy
https://www.ibm.com/docs/en/i/7.3?topic=security-layered-defense-approach

More [+]

Session specifications

Topic:
Safety, security & student data privacy
Grade level:
PK-12
Skill level:
Beginner
Audience:
Chief technology officers/superintendents/school board members, Technology coordinators/facilitators
Attendee devices:
Devices not needed
ISTE Standards:
For Education Leaders:
Systems Designer
  • Lead teams to collaboratively establish robust infrastructure and systems needed to implement the strategic plan.
  • Protect privacy and security by ensuring that students and staff observe effective privacy and data management policies.