Cyber Maturity in Education Part 2

Watch part 1 here >

Practical steps to improve your School’s Security Posture

Outlining common cybersecurity gaps in school environments and how you can take meaningful steps to improve your cyber maturity in line with industry frameworks such as ACSC Essential 8 and NIST.

In this session we hear from Logan Daley, an Enterprise Architect in the Data#3 security team with over 25 years of experience. Logan shares his insights on the changing cybersecurity landscape and how it is affecting the education industry. Topics include assessment types and experiences, finding common ground in education, security lessons learned, notable security gaps and overlaps, quick tips on improving your cyber maturity and cybersecurity frameworks.

Speaker Bio

Logan Daley – Enterprise Security Architect, Australia & Pacific Islands, Data#3

Logan is an Enterprise Architect in the Data#3 security team with over 25 years of experience in cybersecurity. He has had extensive experience in the education sector and has conducted a number of security assessments and engagements in independent schools including providing guidance with their approach to cybersecurity strategy and alignment to industry frameworks.

Key Topics

Click the timestamps below to jump ahead to the following conversations:

0:00 – Introduction
2:25 – Assessment Types and Experiences
5:18 – Finding Common Ground in Education
10:38 – Lessons Learned & Shared
15:20 – Notable Gaps and Overlaps
20:40 – Quick Tips: Improve Your Cyber Maturity
22:42 – Cybersecurity Framework

To learn more about Education and Security with Data#3, please speak with your Data#3 Account Manager or submit your enquiry online today.

Tags: ACSC Essential Eight, Cybersecurity, Education, K-12 Education, Security



Data#3 name Dell Technologies Top Performer Award
Data#3 named Dell Technologies Top Performer 2022 for Australia

September 12, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is delighted to announce that it has…

Smart spaces are changing the workplace
Will Smart Spaces Be a Game-Changer in Your Workplace?

Many elements of smart space technology were already theoretically possible, but integrating sensors and smart cameras, for example,…

Transform any space into a smart space
Smart Space Experience Guide

If there’s one thing that a global pandemic has shown, it is that those working with technology are masters…

ACSC Essential Eight Maturity Model: Multi-Factor Authentication
Essential Eight Maturity Model: Multi-Factor Authentication

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Customer Story: Main Roads Western Australia

Main Roads Western Australia Boosts Visibility and Security with Microsoft Defender for Identity Solution from Data#3…

Customer Story: Hydro Tasmania

Hydro Tasmania seamlessly transitions to work from home across Australia Download Customer Story…

Making Computer Vision Accessible to Everyone

When we hear the word ‘camera’, we almost certainly think ‘picture’, and so it is that with CCTV…

Webinar: Data#3 Licensing Update and Microsoft 365 A5 Deep Dive
Data#3 Licensing Update and Microsoft 365 A5 Deep Dive

During the recent ISQ IT Managers forum, many schools expressed strong interest in a follow-up session on Microsoft 365…