Gain real-world Intune expertise with interactive demos, live configurations, and best practices from an industry-leading security engineer. You will learn how to effortlessly enroll and manage iOS devices with Microsoft Intune, ensuring smooth deployment, security, and compliance at scale.
Using real-world examples, we'll showcase a handful of sophisticated email attacks observed in K-12 environments, discuss why these attacks typically make it past traditional security utilities, and highlight how AI can be utilized to automate the remediation of these attacks
CrowdStrike secures the most critical areas of risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches.
90% of cybersecurity incidents in K–12 education start with phishing. While content filtering and user training stop many threats, sophisticated attacks can easily slip through the cracks, targeting staff and even students via texts, social media, and personal email. In this session, learn how Identity Automation’s browser-based PhishID, an easily deployed browser plugin available for K12 faculty and staff users at no cost, can adapt in real time to stop zero-day threats traditional anti-phishing tools miss, including social engineering scams and adversary-in-the-middle attacks.
Director of Educational Technology, Indiana Department of Education
Brad Hagg currently serves as the Director of Educational Technology in the Indiana Department of Education (IDOE) in the areas of E-Rate, Cybersecurity, Connectivity, and Ed-Fi Data Modernization. He has worked in Indiana schools for over 23 years, serving as Director of Technology... Read More →
At Five Star Technology Solutions, our mission is to serve as a catalyst for innovation so school leaders can be empowered to achieve their vision of excellence. We see direct parallels in how we can provide empowerment for others while at the same time elevating our own internal... Read More →