Does anyone have advice on how to build an IT security strategy for an EdTech organization?

1.2k views3 Comments
Sort By:
Oldest
President and National Managing Principal in Softwarea year ago
So EdTech and not Education right?  That latter would certainly come with a broader set of risk.  That said, if you are providing software or technology to schools or university - its not small feat. 

I would start by thinking about the following from a context perspective:
1.  Size and scope of the organization

2. What type of sensitive data are you handling (course content, student PII, anything financial?)

3. Based on that data, what regulations might your customers need to comply with (and then you by extension).  FERPA, COPPA, are some that come to mind as does HIPAA if handling health related data. 

4. What does your technology footprint look like?  E.g. are you 100% cloud-based, on-premise, hybrid? 

5.  What third parties do you connect to and/or rely on to provide the solution?

From there I recommend a formal risk assessment.  The goal of a risk assessment is to identify the potential risks and threats to the data and/or your applications.

From there you would build strategy and program around addressing those risks.  There are a variety of standards that you can look to like NIST CSF or ISO 27001.  Also recommend you look at consulting firms to help -  and no, I'm not one of those so now selling here :-)
Associate Vice President, Information Technology & CISO in Educationa year ago
Creating an IT security strategy for an EdTech organization involves several steps to ensure the protection of sensitive information, prevent data breaches, and safeguard against cyberattacks. Below are some detailed steps and recommended frameworks to follow:

1) Conduct a risk assessment: Start by identifying the risks your organization faces, such as potential data breaches or cyber attacks, and conduct a comprehensive risk assessment. This assessment should help you understand the current state of your IT security and identify areas of vulnerability.

2) Define security goals: After identifying potential risks, define security goals that align with your organization's overall objectives. These goals could include protecting student data, safeguarding research or intellectual property, and ensuring regulatory compliance.

3) Develop a security framework: Once you have identified your goals, you should develop a security framework based on industry standards such as ISO 27001 or NIST Cybersecurity Framework. These frameworks provide guidance on best practices and offer a systematic approach to managing IT security risks.

4) Establish policies and procedures: Develop policies and procedures that outline how your organization will respond to potential security incidents. Ensure that all employees are aware of these policies and procedures and that they are regularly updated to reflect changes in security threats and regulatory requirements.

5) Implement security controls: Implement security controls such as firewalls, antivirus software, intrusion detection systems, and encryption technologies to protect your organization's network and data. Consider cloud security solutions that provide a secure environment for your data and offer backup and disaster recovery options.

6) Train employees: Provide regular security training to all employees to help them understand their role in maintaining IT security. Educate employees on how to identify and report security incidents and emphasize the importance of strong password management.

7) Conduct regular audits and assessments: Conduct regular audits and assessments to ensure that your security measures are effective and that they align with regulatory requirements.

By following these steps and using frameworks such as ISO 27001 and NIST Cybersecurity Framework, you can develop an IT security strategy that aligns with your organization's objectives and protects sensitive information from potential threats.

I would say that the type of organization doesn't matter as much, but you should right size the approach commensurate to the risk and appetite of the leadership. You don't want to overdo it, especially if you don't have the right buy in at the moment. You can always start small and mature along the way.

Oh, and consider a subscription to ChatGPT 🙈
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
CISO in Insurance (except health)a year ago
The design of a strategy is key. Here are a few threads to review that have good information to help you get started. 

https://www.gartner.com/peer-community/post/do-you-have-any-thoughts-best-practices-to-share-on-developing-cybersecurity-architecture-582229 

https://www.gartner.com/peer-community/post/what-is-a-zero-trust-architecture-535832

Also, use the Gartner security and risk score to help as well. 

Content you might like

Head of Enterprise Architecture MERCK Group in Healthcare and Biotecha year ago
Strategy & Architecture
Read More Comments
39k views5 Upvotes34 Comments

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
CISO/CPO & Adjunct Law Professor in Finance (non-banking)a month ago
I don’t have an answer, but I have a question that may be helpful.  Do you have a business/product roadmap for the target timeframe?

The technology plan and associated cybersecurity program should support  business ...read more
413 views1 Comment
Data Scientist in Consumer Goodsa year ago
we use CSF to assess and track cybersecurity maturity level
1
Read More Comments
43k views22 Upvotes61 Comments