11
Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring, securing and safeguarding your network. Thursday, 5/17/12 10:15-11:15 A.M. in Ballroom 406

Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Embed Size (px)

Citation preview

Page 1: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring, securing and

safeguarding your network.

Thursday, 5/17/12 10:15-11:15 A.M. in Ballroom 406

Page 2: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

OBJECTIVES:

•HOST an interactive discussion•REVIEW risks and challenges brought on by the rapid changes in technology •DISCUSS how districts are addressing, managing, and recognizing issues and engage in some BRAINSTORMING

Page 3: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

Presenters:•Robert J. Ciserella, Asst. Supt./Finance, Facilities & Operations, Glen Ellyn SD 41; Glen Ellyn, IL•Thomas J. Zelek, Sr., Business Manager, Elmwood Park CUSD 401; Elmwood Park, IL•Francis E. Zelek, Dir./Technology, Oregon CUSD 220; Oregon, IL•Mike Cloud, Public Sector Practice Manager, Peters & Associates; Oakbrook Terrace, IL

Dr. James D. McEnroe - Moderator

Page 4: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment – Discussion

• It’s a scary place out there! • Why would anyone want to be “connected”?• Some of the top reasons:

Web (obvious) Mobile connectivity Keeping in touch with smartphones, iPads, Nooks, tablets… Wireless Access Everywhere including “guest access” INPUT from Our Roundtable & the Audience?

Page 5: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment – Discussion

• Cloud Computing with Google, Microsoft, Hosted Student Management Systems

• Explosion of devices with 2-3 per user• Social Networking (especially Teachers with Students

– terrifying(?))• Teamwork, Collaboration, Networking• Remote Access from home or anywhere• IASBO Peer-to-Peer

Page 6: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

• We need to keep ourselves and our districts connected.

• However, we also need to balance security with connectivity.

• Now that we have discussed some of the reasons (the WHY), HOW do “we” secure the district in a connected environment?

Page 7: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

• Who is hosting your data and what are they doing with it? How sensitive is it? Student records? Health information, etc? Teachers hosting independent websites? Risk of compliance

issues?

• What happens if you lose connectivity?• Who has access to what at your district?• Control methods include…(Mike can you expand on

this?)• Input from our Roundtable & Audience?

Page 8: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment

• Is there a formal Security Policy including District Policies, Password changes, Usage agreements, Scheduled Security audits, etc.?

• Are “we” using tools to pro-actively manage and detect security risks and inappropriate access to your network, servers, data, etc.?

Page 9: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment – Sharing New Information

• Cloud Computing?• Shared Information services to save money?• Understand what all of that “Big Data” really means• What is big data?

According to Wikipedia: In information technology, big data consists of data sets that grow so large that they become awkward to work with using on-hand database management tools.

• Do we have big data? ISAT, Prairie State, SAT, Grade Reporting, Assessments. What does the data tell us, what does it really mean?

Page 10: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Securing the District in a Connected Environment – Sharing New Information

• How can we process so much data?• Data intensive research should become a treasure

map to more efficient and effective EDUCATION expenditures

• Pattern recognition• (Even) “Granger Causality” analysis (not just related

but inferred causality)• Hadoop Analysis anyone? (See attachment)

Page 11: Securing the District in a Connected Environment Who's holding the keys to your network? Learn from a panel discussion of best practices in monitoring,

Thank you for your input!

Questions and additional

input & discussion