Page 5 - TIME Newsletter - 2019
P. 5

and more powerful than it’s ever been. The sophistication  response to the needs of the schools and community
     of these tools, often powered by neural networks using    and the situation becomes even more complex for
     deep learning allows for much quicker results, the ability   school districts.
     to spot weaknesses early on and mid-course corrections    The increasing frequency and sophistication of phishing
     leading to better outcomes. While the richer the data, the   emails, Distributed Denial-of Service (DDOS) attacks,
     richer the result, privacy and security concerns also have   port scanning and other attempted breaches require
     to be vetted and mitigated.                               constant vigilance and aggressive response. The trend
     Full STEAM Ahead                                          towards Cloud-based technologies for application
     STEAM (Science, Technology,                               hosting and SaaS provides an additional complication.
     Engineering, Arts+Design and                                                  Beyond using best-of-breed tools
     Mathematics) initiatives are taking                                           and products to identify, respond
     education by storm. These initiatives                                         and stop malicious attempts before
     have proven very successful in                                                they become a breach, on-going
     helping shrink the gap among US                                               user education is paramount to
     students for these critical skills.                                           limiting these potentially devastating
     While lauding their effectiveness,                                            attacks. In a district of our size
     it’s also important to note that they                                         and diversity, the technology IQ
     don’t come for free – the need for                                            varies greatly across our user
     more computers and computer labs,                                             base requiring a least-common-
     server and disk space, networking                                             denominator approach to training
     and internet bandwidth means                                                  and education on suspicious or
     greater outlays for equipment,                                                malicious activities.
     support and staff. Moving to                                                   In Closing
     virtualize as many servers as                                                 All CIOs face some of the same
     possible, an in-progress hybrid SAN                                           challenges—cost-cutting pressures,
     upgrade and aggressive expansion                                              timing of large-scale deployments,
     of high-speed access to all schools                                           rising infrastructure demands,
     and facilities allows us to be nimbler                                        security and privacy considerations,
     and responsive to the ever-changing                                           etc. The educational space provides
     technology landscape.                                                         its own unique set of challenges
     Organizations like Hour of Code                                               & opportunities for technology
     seek to demystify the process of           PUBLISHED IN                       professionals, with the additional
     designing and writing code. With                                              mandate of being good stewards
     activities starting as early as 2nd        “CIO REVIEW”                       of the taxpayer’s money. Every
     grade going through high school and            MAGAZINE                       company or institution has a mission
     beyond, students will be exposed to                                           – for K-12 school districts it’s to
     the concepts surrounding application           February 9, 2019               provide the best possible tools and
     design and development. As eager                                              environment to prepare the youth of
     participants in the Hour of Code and                                          today for success in the area of their
     other STEAM-based initiatives, we’re                                          choosing. It’s a mission we take very
     embarking on a long-term strategy to engage students      seriously and strive to achieve—the strategic planning
     early in these critical skills and keep them engaged      and use of technology plays a large role in our ability to
     through graduation.                                       fulfill that mission.
     Looks Phishy to Me!                                       School districts across the country, like other taxpayer-
     As the rate of technology use and ubiquity increases,     funded entities have certainly felt the impact of the
     so do the challenges of keeping our systems and data      current anti-tax sentiment. Here at the School District
     secure and private. The importance of understanding       of Palm Beach County, we have been fortunate to have
     outside threats and being able to respond quickly cannot   passed two major referendums in the past two years to
     be overstated. The increasingly interconnected  nature    address long-standing maintenance and technology
     of devices and move towards everything being internet-    issues. These were successful in large part to our ability
     capable, or the Internet of Things (IoT) greatly broadens   to convey how students would benefit directly as well
     the landscape of potential threats. When everything is    as transparency in how the funds would be used. The
     a computer, everything is also a potential threat that    community’s trust in and support for our mission and
     needs to be managed and mitigated. Add to this is an      purpose is satisfying and reinforces our belief that we’re
     expanding Bring Your Own Device (BYOD) strategy in        on the right track.
                                                                                                                  Page 5
   1   2   3   4   5   6   7   8   9   10