Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Slides:



Advertisements
Similar presentations
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Advertisements

Bring Your Own Device Learning in the 21 st Century.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
What is BYOD? BYOD stands for “Bring Your Own Device.” BYOD is an initiative that will allow students who have personal technology devices to bring them.
Getting to the Cloud Successfully!. Moderator– Kevin Dale, Rochelle Township HSD 212 Presenters: Mike Cloud, Peters & Associates Christine Haeggquist,
MICROSOFT ® OFFICE 365 Last updated Nov
What is BYOD? BYOD is an acronym for Bring Your Own Device.
Big Data and Predictive Analytics in Health Care Presented by: Mehadi Sayed President and CEO, Clinisys EMR Inc.
LHHS – BYOD Pilot Project (DRAFT) April – June 2012.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Copyright all rights reserved Smartvue Corporation HD Video Surveillance Solutions
Cloud Computing: SAAS IASBO 2011 Annual Conference Bill Spakowski, Christine Haeggquist, Frank Zelek.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Darien Technology Budget Introduction In , the Board of Education and Darien Community made a commitment to providing technology tools.
Item Web 2.0 application relevant to teacher’s work.
Technology Update Barrington School Committee December 15, 2011.
How computers work Learning objective 2: Explain the four basic functions of a computer.
February 23, Play Video BYOD can help students sharpen their 21st Century skills to work towards college and career readiness. Click.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
A sensor for measuring the acceleration of a moving or vibrating body.
BYOD Smackdown Presenters Roy Hickman, Moderator David Palme, Con Stance Jeff Trudell, Pro Stance.
WELCOME FAMILIES LOGO 1:1 Laptop Program Learning On the GO.
COMP1321 Networks in Organisations Richard Henson March 2014.
Engineering on Display: Back-End Development for Sensor Instrumentation Systems Student: Brian J Kapala Supervisor: Dr. Cavalcanti.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Information Technology Services ITS Update to UMG Thursday 22 nd April 2010 Alison Trpevski – Associate Director Client Services – ITS.
Growing the Community of Practice Online II Moderations.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
BYOD: Bring Your Own Device
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
KTAC Security Task Force Superintendents Update April 23, 2015.
Brandon Traffanstedt Systems Engineer - Southeast
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
IoT and Hybrid Cloud. Page 2 IoT Revolution 50 billion things connected by 2020 IPv6 allows for 100 addresses for every atom on Earth! 44ZB of Data worldwide.
Coming soon to Countryside Elementary. What is B.Y.O.T.? Bring Your Own Technology Purpose? embraces the importance of technology in the educational lives.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Secure Services Shared Hosted MS Exchange 2010.
BCSD Computer Resources for Students Information You Can Use.
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
Managed IT Services JND Consulting Group LLC
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Dr. Gita Phelps Georgia College & State University I Mobile Technology for Instructors.
Evaluating Emerging Technologies TaiShara Twyman ITEC 7445 Dr. Goetzel July 13, 2015 Cloud Computing.
BCSD Computer Resources for Students
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Introduction to Social Media
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Countryside Elementary
BCSD Computer Resources for Students
Uses of Computer Networks Computer courses in Chandigarh.
Geospatial Technology Evolution and Future Trends
MICROSOFT AZURE ISV PROFILE: ONEBE
Smart Learning concepts to enhance SMART Universities in Africa
Tareq Khan, Ph.D. Assistant Professor,
A Glimpse Into a Few Current Tech Projects
Revision PowerPoint By Nicole Davidson.
E-Safety.
Coming soon to Countryside Elementary
Technology 101 Changing the way, we work, live, play and learn.
Cloud Computing for Wireless Networks
Presentation transcript:

Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring, securing and safeguarding your network. Thursday, 5/17/12 10:15-11:15 A.M. in Ballroom 406

Securing the District in a Connected Environment OBJECTIVES: H OST an interactive discussion R EVIEW risks and challenges brought on by the rapid changes in technology D ISCUSS how districts are addressing, managing, and recognizing issues and engage in some B RAINSTORMING

Securing the District in a Connected Environment Presenters: Robert J. Ciserella, Asst. Supt./Finance, Facilities & Operations, Glen Ellyn SD 41; Glen Ellyn, IL Thomas J. Zelek, Sr., Business Manager, Elmwood Park CUSD 401; Elmwood Park, IL Francis E. Zelek, Dir./Technology, Oregon CUSD 220; Oregon, IL Mike Cloud, Public Sector Practice Manager, Peters & Associates; Oakbrook Terrace, IL Dr. James D. McEnroe - Moderator

Securing the District in a Connected Environment – Discussion It’s a scary place out there! Why would anyone want to be “connected”? Some of the top reasons: Web (obvious) Mobile connectivity Keeping in touch with smartphones, iPads, Nooks, tablets… Wireless Access Everywhere including “guest access” INPUT from Our Roundtable & the Audience?

Securing the District in a Connected Environment – Discussion Cloud Computing with Google, Microsoft, Hosted Student Management Systems Explosion of devices with 2-3 per user Social Networking (especially Teachers with Students – terrifying(?)) Teamwork, Collaboration, Networking Remote Access from home or anywhere IASBO Peer-to-Peer

Securing the District in a Connected Environment We need to keep ourselves and our districts connected. However, we also need to balance security with connectivity. Now that we have discussed some of the reasons (the WHY), HOW do “we” secure the district in a connected environment?

Securing the District in a Connected Environment Who is hosting your data and what are they doing with it? How sensitive is it? Student records? Health information, etc? Teachers hosting independent websites? Risk of compliance issues? What happens if you lose connectivity? Who has access to what at your district? Control methods include…(Mike can you expand on this?) Input from our Roundtable & Audience?

Securing the District in a Connected Environment Is there a formal Security Policy including District Policies, Password changes, Usage agreements, Scheduled Security audits, etc.? Are “we” using tools to pro-actively manage and detect security risks and inappropriate access to your network, servers, data, etc.?

Securing the District in a Connected Environment – Sharing New Information Cloud Computing? Shared Information services to save money? Understand what all of that “Big Data” really means What is big data? According to Wikipedia: In information technology, big data consists of data sets that grow so large that they become awkward to work with using on-hand database management tools. Do we have big data? ISAT, Prairie State, SAT, Grade Reporting, Assessments. What does the data tell us, what does it really mean?

Securing the District in a Connected Environment – Sharing New Information How can we process so much data? Data intensive research should become a treasure map to more efficient and effective EDUCATION expenditures Pattern recognition (Even) “Granger Causality” analysis (not just related but inferred causality) Hadoop Analysis anyone? (See attachment)

Thank you for your input! Questions and additional input & discussion