Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Tuesday, July 1
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Navigating the Evolving Landscape of Cybersecurity in Education
    Latest News

    Navigating the Evolving Landscape of Cybersecurity in Education

    TeamBy TeamMarch 25, 2024No Comments13 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Kevin Hogan
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In this episode of Innovations in Education, we do a deep dive into the ongoing battle against cyber threats. We explore the intersection of technology and human behavior, where the real battleground lies in preempting threats before they breach the network. Rivka underscores the importance of leveraging advanced technologies like machine learning and threat intelligence to stay one step ahead of adversaries. Yet, amidst the buzz of AI and cutting-edge defenses, she reminds us of the foundational importance of sound data management and collaborative efforts across departments.

    Below is a machine-generated transcript of the conversation

    It is a never ending battle and there are two important things happening right now and for this year in higher Ed and I’m actually working with two universities, which I can’t talk about, but they’re East Coast, around New York and here are the things. One, there’s have been some. Slash action suits against universities because there’s a lot of constituents. It’s like they’re their own countries. If you think about it, they have the trustees, OK, that have a fiduciary responsibility. The students, the parents, the faculty, there’s a lot going on there. And one of the things that’s happening now. Now in enterprises not just in higher Ed, but it has a specific impact is that the IT executives that are in charge of security are also potentially legally liable for breaches. OK, this is a brand new thing. Well, it’s newish. You know it’s been brewing for a couple of years. The class action suits against universities have not made it better. A lot of these folks in IT who create the access control and then monitor it had their contracts long before this happened. All of a sudden they’re reviewing, you know, insurance policies. Are you doing all this? Can we reinsure you? And if we do and there’s a breach, are we even paying your claim? And if all those things don’t happen, how liable is the CTO and the CTO at a university? So there’s a lot of stress. Tier and traditionally the CTO inside a university is not able to secure financing and conduct cooperative things with operations. People like the chief officer aiding officer and the head of legal and the CFO and now all of those things are coming. Together in a confluence. And I know this sounds like a joke, but to me the most important thing that the head of IT could do this year in the university instead of getting another security certificate is to take an accounting 101 class. Honestly, because the way things are being audited and the way things are going, they have to understand where the threats are coming from. How they mirror like in the banking industry. You know, there’s fraud inside your network and what everyone wants to do is detect the threat before it gets in. They have to do that and universities have other things. Look, my daughter graduated from college last year. She still has her Edu e-mail. OK, which she will use for any discount she can get. And now she’s an alum and they want to keep in touch with her until one day she is. Employed long enough to. Be able to donate again, right?

    Kevin Hogan

    Right when the loans are gone and. Now you give it back.

    Rivka Tadjer Cybercrime Prevention & Mitigation expert

    To the school. Right. And but they are not on the school network anymore. It’s constantly being mixed with personal e-mail. These are things. How can the IT person be held liable for this for behavior that they have no control over? So frankly, there is a challenging. Tasks that does not exist in other verticals and they need data and they need information and they need cooperation. From human resources, from the Dean of students, from the president, the Provost, the CFO and operations. Because this is operational risk, which is defined by human behavior. OK, go find college students and early graduates who, you know, cut and paste off codes.

    Speaker

    For.

    Rivka Tadjer

    What you know and how they’re using it, and how can somebody be responsible for everything without the authority or even the capability?

    Kevin Hogan

    And the High Flex models, right? I mean these the hybrid things that were established or even just kind of accelerated as a result of the pandemic that are still going to be there and students have an expectation. Or just make the networks that even more exposed, right?

    Rivka Tadjer

    Yes. And you know that kind of thing. I think many higher Ed. IT directors will tell you that they’re going to handle up the pandemic, actually speed that up. You know, how secure is your zoom? You have to log on. You can’t do it without your Edu. The the professors have been taught to see if there’s a stalker. Because that’s actually network security, you know? And they were long integrated into things like zoom and canvas and the other things that they use. The issues now are really behavioral and getting together to handle operational risk when they’re not prepared to do this right and they. Need a big voice? And they need an advocate in the finance department, and they need an advocate in legal. And I strongly urge IT people to go make those friends and say, look, the liability will fall on the university, that class action suits are coming to the university, right. When parents financial data is exposed and all of that, they’re going to come there. So they need to work together. And I think that that and understanding the economics and the insurance of it should they should have time to do that in their job.

    Kevin Hogan

    So we haven’t even talked about technology. I mean it, it seems that the priorities right now are in terms of personal behavior, I mean, personal responsibility as an executive in terms of taking that accounting class, making friends with the lawyers, anything happening on the technology front of you or is that just kind of a just a constant you know? I got a beer. Bigger gun, I’ve. Got a you? Know a a bigger defense to your bigger gun sort of situation.

    Rivka Tadjer

    Now there is something happening on the technology front and it’s an old saying. You’re as good as your data, but what is going on in the technology front is the ability. To see the threats before they get to your network. OK. And then this is going to be a go around again for IT executives inside universities to get the funding to do this because a penny of prevention is worth a pound of cure is absolutely true. Our laws are still behind and you know, they kind of lead in banking. Finance. Where they treat fraud and they treat criminals that get that betray access control but they wait till they’re there. This has this has to be the threat before it becomes a target. And what’s great in technology is how smart the data is becoming. All right, so you can now detect with the right kinds of programs. That is great. It’s like a portal that IT executives can go in to see. What are the symptoms before there’s an attack? OK. And using this Intel and seeing where the vulnerabilities are, the human ones. Before it happens because you know the FBI gets 2300 phone calls a day. The Verizon 2023 report, which is Global Resilience Federation data, also contributes to that. It’s all credential stuffing, credential stuffing, phishing. You’ve heard these terms. This is where some horrible percent. Logins in average and networks like 60% of them have some fraud associated. People are getting in and can impersonate employees all right. And when you have an environment like universities, you need to know before this happens. You need to know when there is a spike in breach data, which means have credentials been taken. So if there’s a spike pattern that’s going to happen. Before a campus is hit, that’s when you can go and look at the vulnerabilities. For the humans, the humans who, how are they getting in through the humans? So I think for universities that have all kinds of people accessing their networks, you know, you take students who also run the clubs and things like that and they’re funded by the universities and now you’re getting a mix of access. And so you really need to watch it. How those credentials are being protected before there’s an attack? Because then you’re in prevention, land and prevention land is less expensive than mitigation land. Always look at those data. Look how good your data is, how much is your Intel? I mean, our world is mirroring this, so yes. And there’s some really great data out there.

    Kevin Hogan

    And we made it almost 10 minutes without mentioning AI, but I can only assume that that is going to be part and parcel of next generation defenses and and cyber security aspects of both on the the attack and on the defensive right.

    Rivka Tadjer

    Absolutely. So it needs its guardrails and we’re not there yet, but I would also like to define AI here because everybody calls everything AI. That’s not AI ChatGPT is machine learning data in data out data in data out. You take me to a cool robotic center where the robot can clean my house. Now you’re talking about AI. But this is machine learning. And it’s a very good point. OK. So guardrails on machine learning are going to be very important and then they can be super helpful, but because it’s machine learning data and data out monitoring it with really good threat Intel data can help someone in IT. So you can sort of see how it’s. Doing and use it as a sample set of what you need to protect and what you need to protect. But it’s great for disseminating information, for engaging because they have to engage such a diverse. Body OK, think of any other corporation where you’re dealing with students and then a presidential Provost and executives. And I’ll tell you one other thing that I would like stand by any executive in IT is that by and large, it’s the sea level. And the executives who are exempt from training.

    Kevin Hogan

    Hmm.

    Rivka Tadjer

    They’re the ones who need it most, because am I going to steal the credentials of an administrative assistant who has access to nothing? No, I want the C-Suite that have keys to the Kingdom. That’s where I’m coming in. So only training when you have a rank and file and universities are rank and file. Does nothing. The students will learn the fastest. They will do things and you can impose things on them, but you have to bring those executives. And force it.

    Kevin Hogan

    Especially because only in the last couple of years that those provosts have begun to. Use e-mail anyway.

    Rivka Tadjer

    And the board members and the trustees come in without their Edu emails. OK, so the biggest.

    Speaker

    Right.

    Rivka Tadjer

    Problem with breaches and is when people mix personal. With official emails and then they’re all remote because in the university environment, the IT guys have that Wi-Fi locked down, right, they have their firewall. Yes. You know, board members, just like students, they come in with their gmails and they’re accessing all kinds of stuff and that’s what’s creating a problem. It’s exactly why the remote workforce during COVID created problems. Because you’re sitting at home on the same Wi-Fi that you’re teenagers playing all their infested games on your screen on your, you know, on the same router. Right it it’s exactly why. So that kind of thing and they need budgets for good data.

    Kevin Hogan

    So much great information in such a short period of time here as a last question. For our readers and for our listeners, prioritize their lists for 2024. I mean, all the various things that that you talked about, great advice along the lines. Can you give us a top three in terms of of A2 do when they wake up tomorrow morning?

    Rivka Tadjer

    Yeah. Here we go one. Examine the insurance policy of the university. There’s going to be fine print. There’s going to be a list of 10 little things somewhere along the line. That if you do not do, they will not pay a claim or things like that and work. This is a great project to go to legal with and your operations person went and say I’m gonna be liable for this in the end. You go over this with me. I want to know definitively and I want this unpacked right T2 threat Intel systems data. You’re only as good as your data. Human behavior get one. Analyzes the threats before they become a problem on your network, and the third part is to coordinate with other departments. For this human behavior this to be an HR issue of all your constituents, including your trustees and people who are coming in outside of the network. What is the protocol? And that’s why to do the insurance. First, because it’s like compliance, it will drive what you need to do, and then by the time you’re done with that, you’re going to have training. I’m sorry, I’m adding it for training. Training that no one is exempt.

    Kevin Hogan

    Well, as always great advice, Rivka, I appreciate your insights every year, but we’ll talk again before next year. But once again, good luck with all of your work and with your work, with your universities. And then just always appreciate.

    Rivka Tadjer

    Appreciate you too. And thank you for everything you do.

    Kevin Hogan

    And that’s all we have for this month’s edition of Innovations in Education. Be sure to go up online to eschoolnews.com and subscribe if you are interested in the topics to all of our podcasts, as well as check out the latest and greatest news and resources that we have online at in our newsletter.

    Speaker

    Yours.

    Kevin Hogan

    Once again, I’m Kevin Hogan, content director for East School news. Thanks for listening and I hope you click through again soon.

    Kevin is a forward-thinking media executive with more than 25 years of experience building brands and audiences online, in print, and face to face. He is an acclaimed writer, editor, and commentator covering the intersection of society and technology, especially education technology. You can reach Kevin at KevinHogan@eschoolnews.com
    Kevin Hogan
    Latest posts by Kevin Hogan (see all)



    This post is exclusively published on eduexpertisehub.com

    Source link

    Accessibility Digital districts Education evolution Preparation Princeton Princeton Review Review SAT
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Block by Block: The Student Skilling Journey

      July 1, 2025

      Cleverlike focuses on the real power in using games for education

      June 30, 2025

      Scattered Spider cyber gang turns fire on aviation sector

      June 30, 2025

      Forget Prestige. A New Ranking Shows Great Colleges May Be Close to Home.

      June 29, 2025

      New partnership trains Michigan teachers for AI innovation

      June 29, 2025

      Citrix Bleed 2 under active attack, reports suggest

      June 28, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202453 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202427 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202422 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views
      Reviews

      Creating Premium High-Converting Landing Pages For Free | Udemy Coupons 2025

      July 1, 2025

      Principal Clinical Research Scientist

      July 1, 2025

      Dart Mastery – Become a Dart Master From Zero to Hero | Udemy Coupons 2025

      July 1, 2025

      Software Architecture with C# 12 and .NET 8: Build enterprise applications using microservices, DevOps, EF Core, and design patterns for Azure

      July 1, 2025

      Small By Design: The Entrepreneur’s Guide For Growing Big While Staying Small

      July 1, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Block by Block: The Student Skilling Journey

      July 1, 2025

      Cleverlike focuses on the real power in using games for education

      June 30, 2025

      Scattered Spider cyber gang turns fire on aviation sector

      June 30, 2025

      Forget Prestige. A New Ranking Shows Great Colleges May Be Close to Home.

      June 29, 2025

      New partnership trains Michigan teachers for AI innovation

      June 29, 2025
      Latest Videos

      Inside the World of Ethical Hacking in 60 Seconds | Cybersecurity Career

      June 30, 2025

      The TRUTH About Finance Jobs After MBA

      June 29, 2025

      Restart Your Digital Marketing Career in 2024 Before It’s Too Late!

      June 28, 2025

      I Break FOLTYN’S WIN STREAK in Roblox Rivals! Rage! #roblox #rivals #shorts #foltyn #gaming

      June 27, 2025

      Choosing Your Path Careers in Machine Learning in 2021

      June 26, 2025
      Latest Jobs

      Principal Clinical Research Scientist

      July 1, 2025

      Financial Planning & Analysis (FP&A) Principal

      July 1, 2025

      Locum Physician (MD/DO) – Pediatrics in Norwalk, CT

      July 1, 2025

      Senior Software Development Engineer, S3 Console

      June 30, 2025

      Concierge

      June 30, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202531 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      Why Community Is Your Most Valuable Career Asset In 2025

      June 28, 2025

      What Employers Are Really Looking For In Job Interviews

      June 27, 2025

      The Best Way to End a Cover Letter (With 4 Winning Examples)

      June 26, 2025

      5 Job Interview Secrets To Beat The Competition

      June 25, 2025

      10 Overused LinkedIn Buzzwords (And What To Say Instead)

      June 24, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT