fbpx
Share

Cyber Maturity in Education Part 2

Watch part 1 here >


Practical steps to improve your School’s Security Posture

Outlining common cybersecurity gaps in school environments and how you can take meaningful steps to improve your cyber maturity in line with industry frameworks such as ACSC Essential 8 and NIST.

In this session we hear from Logan Daley, an Enterprise Architect in the Data#3 security team with over 25 years of experience. Logan shares his insights on the changing cybersecurity landscape and how it is affecting the education industry. Topics include assessment types and experiences, finding common ground in education, security lessons learned, notable security gaps and overlaps, quick tips on improving your cyber maturity and cybersecurity frameworks.



Speaker Bio

Logan Daley – Enterprise Security Architect, Australia & Pacific Islands, Data#3

Logan is an Enterprise Architect in the Data#3 security team with over 25 years of experience in cybersecurity. He has had extensive experience in the education sector and has conducted a number of security assessments and engagements in independent schools including providing guidance with their approach to cybersecurity strategy and alignment to industry frameworks.

Key Topics

Click the timestamps below to jump ahead to the following conversations:

0:00 – Introduction
2:25 – Assessment Types and Experiences
5:18 – Finding Common Ground in Education
10:38 – Lessons Learned & Shared
15:20 – Notable Gaps and Overlaps
20:40 – Quick Tips: Improve Your Cyber Maturity
22:42 – Cybersecurity Framework

To learn more about Education and Security with Data#3, please speak with your Data#3 Account Manager or submit your enquiry online today.

Tags: ACSC Essential Eight, Cybersecurity, Education, K-12 Education, Security

Featured

Related

Microsoft-JIT2023-S1-Amplification-Session-Blog-Card-04
Information protection in an age of information theft

Managing and safeguarding data across various apps, clouds, and endpoints is an uphill battle. It’s led to organisations relying on…

Customer Story: Knight Frank

Cloud Transition an Azure Success Story for Knight Frank Download Customer Story Contact a Specialist Objective…

3CX Desktop App Critical Vulnerability Alert

The Australian Cyber Security Centre has issued a warning about a new supply chain attack that has targeted a…

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…