New CT Leadership Summit: IT Security in the New Normal

Campus Technology Leadership Summit

Whether institutions are tightening security protocols that were loosened during their initial pandemic response or facing new challenges of remote operations, every college and university must redouble its focus on IT security in these unprecedented times. On May 19, the Campus Technology Leadership Summit will explore the challenges of IT security in the new normal: Join us for this free, one-day virtual event as education and IT leaders share their insights, best practices and predictions for security and privacy in the post-pandemic era. On the agenda:

Security and Privacy Forecast: What's on the Horizon for Higher Ed 
As higher education moves ahead toward post-pandemic times, institutions are still wrestling with the impact of more than a year of remote work and learning — particularly in the area of information security and privacy. In this session, Brian Kelly, director of the Cybersecurity Program at EDUCAUSE, will share insights from the 2021 Horizon Report Information Security Edition, discuss emerging threats and trends that every institution should be aware of, and consider implications for the future.

Face Time: What to Understand About Video Usage and Privacy in Online Classes
While videoconferencing with Zoom, Teams or Meet during class may have helped your faculty and students maintain connection with each other during the pandemic, the requirement of video for courses may warrant a second look. As recent coverage by the Future of Privacy Forum has pointed out, there are unique privacy and equity considerations that arise when students are forced to turn on video streams during class. In this session, you'll hear from FPF Higher Education Lead Carrie Klein about the privacy and equity concerns posed by video mandates, as well as viable, practical alternatives worth exploring.

The Economy of Ransomware: Understanding and Defending Against the Evolving Threat
Ransomware is on the rise — not only is higher education a prime target, but attacks have grown in number, sophistication and cost. In this session, Stephen Heath, chief information security officer for IT security consultancy Intrinium, will discuss the evolution of ransomware, quantifying risk and determining the best incident response strategy for your institution.

Can You Be Trusted? How Students Perceive College Use of Personal Data
As students return to campus in greater numbers, some institutions have begun monitoring their behavior via location and social media tracking in the name of health and safety — often without the students being aware of what's going on. A recent joint project by New America and NASPA, an organization of student affairs administrators in higher education, held a series of discussions with students to understand what they know about and feel about the use of such data by their schools. The findings were shared in the recently published report, "Keeping Student Trust." In this session, co-author Iris Palmer discusses highlights from the report and offers recommendations for campus leaders, to guide their thinking about the collection and use of personal data while still maintaining student trust.

The Campus Technology Leadership Summit will take place online on Wednesday, May 19 from 9:00 a.m. to 12:00 p.m. PT. The summit is produced by the staff of Campus Technology, made possible by the generous support of our event sponsor, Citrix. For more information and to register, visit the CT Summit site.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • pattern featuring interconnected lines, nodes, lock icons, and cogwheels

    Red Hat Enterprise Linux 9.5 Expands Automation, Security

    Open source solution provider Red Hat has introduced Red Hat Enterprise Linux (RHEL) 9.5, the latest version of its flagship Linux platform.

  • glowing lines connecting colorful nodes on a deep blue and black gradient background

    Juniper Launches AI-Native Networking and Security Management Platform

    Juniper Networks has introduced a new solution that integrates security and networking management under a unified cloud and artificial intelligence engine.

  • a digital lock symbol is cracked and breaking apart into dollar signs

    Ransomware Costs Schools Nearly $550,000 per Day of Downtime

    New data from cybersecurity research firm Comparitech quantifies the damage caused by ransomware attacks on educational institutions.

  • landscape photo with an AI rubber stamp on top

    California AI Watermarking Bill Garners OpenAI Support

    ChatGPT creator OpenAI is backing a California bill that would require tech companies to label AI-generated content in the form of a digital "watermark." The proposed legislation, known as the "California Digital Content Provenance Standards" (AB 3211), aims to ensure transparency in digital media by identifying content created through artificial intelligence. This requirement would apply to a broad range of AI-generated material, from harmless memes to deepfakes that could be used to spread misinformation about political candidates.