Event Information
1. Introduction
Content & Engagement: Welcome, introduction to session objectives, and emphasize the importance of cyber security in education by presenting real-world examples of cyberattacks targeting schools.
Time: 5 minutes
Process: Presenter-led introduction, using real-world data to immediately engage the audience’s attention and emphasize the relevance of the topic.
2. Identifying Key Cyber Security Challenges
Content & Engagement: Overview of the major cyber security challenges faced by educational institutions (e.g., ransomware, phishing, data breaches) and the associated risks to students, staff, and institutional data.
Time: 15 minutes
Process: Presenter discusses these challenges with real-world case studies, providing factual evidence of the potential impact on educational environments.
3. Developing Effective Cyber Security Strategies
Content & Engagement: Presentation of strategies tailored for educational institutions focusing on network security, data protection, threat detection, and incident response.
Time: 15 minutes
Process: Presenter shares specific, actionable strategies and frameworks for building cyber resilience, explaining how to implement these measures.
4. Utilizing Essential Cyber Security Tools and Technology
Content & Engagement: Explanation of essential cyber security tools (e.g., firewalls, antivirus, intrusion detection systems) and their application in education.
Time: 10 minutes
Process: Presenter-led explanation of key tools, outlining how to deploy them effectively within educational environments to monitor and protect digital assets in real-time.
5. Applying Cyber Security Principles to Real-World Scenarios
Content & Engagement: Discussion of practical examples, including securing remote learning platforms, managing BYOD policies, and addressing cloud-based vulnerabilities, with communication strategies for educating staff and students.
Time: 10 minutes
Process: Presenter walks through case studies of common scenarios, offering clear solutions and advice for participants to apply in their own institutions.
6. Conclusion, Key Takeaways, and Q&A
Content & Engagement: Summarize key points, reiterate the importance of cyber security, and offer a brief Q&A session to address any questions from the audience.
Time: 5 minutes
Process: Presenter wraps up with key takeaways, followed by an open Q&A to clarify concepts and provide further insights based on audience questions.
National Cyber Security Centre - NCSC.GOV.UK