Home
Published on Texas Gateway (https://)
2017–2018 Cybersecurity Tips and Tools Archived Webinars

The following cybersecurity webinars were offered in 2017–2018 and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee (DSAC). The webinars provide insight regarding the resources available at the Cybersecurity Tips and Tools section of the Texas Gateway portal.

Data Security Advisory Committee
The DSAC, consisting of members of school districts and Education Service Centers (ESCs), provides guidance to Texas education communities on maximizing collaboration and communication regarding information security issues and resources. The DSAC has reviewed and recommended the Cybersecurity Tips and Tools, which have been shared on the portal.

Session 1. An Overview of the Tips and Tools

This presentation from March 7, 2017, is an overview of the Tips and Tools currently being shared for all Texas education communities. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cyber Security Tips and Tools.

An Overview of the Tips and Tools
Session 2. Establishing an Information Security Plan

The presentation from April 12, 2017, covers establishing an Information Security Plan, and how to use the Information Security Plan tool shared for all Texas education communities. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cyber Security Tips and Tools.

Establishing an Information Security Plan
Session 3. Conducting a Risk Assessment

This presentation from May 10, 2017, covers conducting a Risk Assessment and using the Risk Assessment tool shared for all Texas education communities. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cyber Security Tips and Tools.

Conducting a Risk Assessment
Session 4. Incident Response: Being Prepared

This presentation from September 13, 2017, covers Incident Response readiness. When a cybersecurity incident occurs, it is imperative to follow documented procedures to process the incident. Understanding the life cycle of an incident and how to use the Incident Red Team (IRT) Redbook, which contains the procedures and plans for such incidents, can be critical for success. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

Incident Response: Being Prepared
Session 5. Training: What is Available at No Cost?

This presentation from October 11, 2017, covers training such as FERPA training for staff, as well as cybersecurity training on Vulnerability Management, Protecting Information Assets, and End User Security Awareness. All training sessions are available at no additional cost to Texas education communities. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

Training: What is Available at No Cost?
Session 6. Guidelines for Cybersecurity Documentation

This presentation from November 8, 2017, covers how security documentation such as policies, strategic planning, tactical planning, and operational planning provide a common framework to achieve organizational goals. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

 

Guidelines for Cybersecurity Documentation
Session 7. Cybersecurity Privacy Awareness Program

This presentation from March 7, 2018, provides information needed for a successful Cybersecurity/Privacy Awareness program, and why a Security/Privacy Awareness program is key in protecting student, parent and staff information. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

Cybersecurity Privacy Awareness Program
Session 8. Securing Mobile Devices

This presentation from April 11, 2018, provides information regarding securing mobile devices. Whether mobile devices are provided by your organization, or you have a Bring Your Own Device (BYOD) policy, measures need to be implemented to adequately protect your information. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

Securing Mobile Devices
Session 9. Data Privacy Agreements

This presentation from May 9, 2018, provides information regarding Data Privacy Agreements and what needs to be included in your agreements with vendors and third parties to help you protect student, parent, and staff information. This presentation was conducted by TEA and led by TEA's Chief Information Security Officer, Frosty Walker, in collaboration with the Data Security Advisory Committee to provide insight to the Cybersecurity Tips and Tools.

Data Privacy Agreements
Presentation Slides and FAQs

Presentation Slides

Session 4. Incident Response: Being Prepared

Session 5. Training: What is Available at No Cost?

Session 6. Guidelines for Cybersecurity Documentation

Session 7. Cybersecurity Privacy Awareness Program

Session 8. Securing Mobile Devices

Session 9. Data Privacy Agreements

FAQ

Session 1 and 4: An Overview of the Tips and Tools and Incident Response

Session 8. Securing Mobile Devices