The advancement of technology is a vast landscape, often met with curiosity, caution, and inspiration. As educators and students learn about the risks and benefits of incorporating Cybersecurity into learning environments, the Santa Clara County Office of Education remains committed to supporting the pursuit of knowledge and best practices. Below are curated resources to assist with building foundational knowledge about policies, implementation, and practices established thus far regarding cybersecurity.
Videos from the Summit
Intro + Keynote: Why Me? What Attackers Want & How They’ll Get it
By: Matt Linton, Chaos Specialist, Google
Cyber Insurance 101: What is the Current Cyber Threat Landscape and how does Cyber Insurance Assist
By: Brandon Welch, Cyber Services Team Leader – West, Cyber Risks, Beazley
AI and Cybersecurity, a Legal Perspective and Guide for Education Leaders
By: Marcelo Quiñones, Lead Deputy County Counsel
Tara Fonseca, Deputy County Counsel
Office of the County Counsel, County of Santa Clara
CISA – Safeguarding K-12
By: Scott Alford, Cybersecurity Advisor, CISA
Cybersecurity Summit Presentation
At this summit, we discussed the latest threat landscape; had breakout sessions that lead cybersecurity topics with your peers and; and explored Cybersecurity exhibitions to test your knowledge.
Download Presentation
Please click on the topics to access the materials.
Resources:
|
Description
|
|
Conduct simulated phishing tests with immediate feedback and offer additional training as needed. Choose suitable online platforms, select relevant courses, and tailor content to staff roles. Establish a centralized resource hub, launch awareness campaigns, and ensure staff know incident response procedures.
|
|
Published by AASA (The School Superintendents Association), listing K12 Cyber resources.
|
|
CISA Toolkit helps K-12 organizations mitigate against the threat of malicious cyber actors and cyber risks that can significantly impact educational missions and risk sensitive data.
|
|
Establish regular backup procedures to create copies of critical data, ensuring that it can be restored in the event of a cyber incident. Test backup systems and recovery procedures regularly to verify their effectiveness and reliability.
|