Change display time — Currently: Central Daylight Time (CDT) (Event time)

Cyber Security in Education

,
Grand Hyatt - Texas Ballroom B

Innovator Talk
ISTELive Content
Save to My Favorites

Session description

The session will aim to highlight the dangers and the sometimes uncomfortable changes schools need to address and make, to ensure that their vital systems and data are as secure as possible for an ever evolving cyber crime threat landscape.

Outline

1. Introduction
Content & Engagement: Welcome, introduction to session objectives, and emphasize the importance of cyber security in education by presenting real-world examples of cyberattacks targeting schools.
Time: 5 minutes
Process: Presenter-led introduction, using real-world data to immediately engage the audience’s attention and emphasize the relevance of the topic.

2. Identifying Key Cyber Security Challenges
Content & Engagement: Overview of the major cyber security challenges faced by educational institutions (e.g., ransomware, phishing, data breaches) and the associated risks to students, staff, and institutional data.
Time: 15 minutes
Process: Presenter discusses these challenges with real-world case studies, providing factual evidence of the potential impact on educational environments.

3. Developing Effective Cyber Security Strategies
Content & Engagement: Presentation of strategies tailored for educational institutions focusing on network security, data protection, threat detection, and incident response.
Time: 15 minutes
Process: Presenter shares specific, actionable strategies and frameworks for building cyber resilience, explaining how to implement these measures.

4. Utilizing Essential Cyber Security Tools and Technology
Content & Engagement: Explanation of essential cyber security tools (e.g., firewalls, antivirus, intrusion detection systems) and their application in education.
Time: 10 minutes
Process: Presenter-led explanation of key tools, outlining how to deploy them effectively within educational environments to monitor and protect digital assets in real-time.

5. Applying Cyber Security Principles to Real-World Scenarios
Content & Engagement: Discussion of practical examples, including securing remote learning platforms, managing BYOD policies, and addressing cloud-based vulnerabilities, with communication strategies for educating staff and students.
Time: 10 minutes
Process: Presenter walks through case studies of common scenarios, offering clear solutions and advice for participants to apply in their own institutions.

6. Conclusion, Key Takeaways, and Q&A
Content & Engagement: Summarize key points, reiterate the importance of cyber security, and offer a brief Q&A session to address any questions from the audience.
Time: 5 minutes
Process: Presenter wraps up with key takeaways, followed by an open Q&A to clarify concepts and provide further insights based on audience questions.

More [+]

Supporting research

National Cyber Security Centre - NCSC.GOV.UK

More [+]

Presenters

Photo
IT Director
Newham Community Learning

Session specifications

Topic:

Safety, Security and Student Data Privacy

Audience:

District Level Leadership, School Level Leadership, Technology Coach/Trainer

Attendee devices:

Devices useful

Attendee device specification:

Smartphone: Android, iOS, Windows
Laptop: Chromebook, Mac, PC
Tablet: Android, iOS, Windows

ISTE Standards:

For Education Leaders:
Systems Designer
  • Ensure that resources and infrastructure for supporting effective use of technology for learning are sufficient and scalable to meet future demand.
  • Protect privacy and security by ensuring that students and staff observe effective privacy and data management policies.
For Educators:
Citizen
  • Model and promote management of personal data, digital identity, and protection of student data.