- AI - How are you using it in the school, do you allow it.
- Coro - Security in a Box
- An AI-powered, cybersecurity solution designed for lean IT teams with limited time and manpower. We understand the unique cyber challenges schools face and we have created an affordable, easy-to-use, comprehensive cyber solution for public and private, K-12 and universities.
- Replaces: SIEM, SOAR, EDR/XDR, SOC Software, AV/NGAV, ZTNA, DLP, and more.
- For more information contact
Jeremy Meyers - Account ExecutiveThis email address is being protected from spambots. You need JavaScript enabled to view it.
Direct: 847.903.9619 - Cell: 847.903.9619
- Fortigate Best Practices Workshop in Des Moines Nov 15, 2023
- Free for schools to attend
- Fortinet best practices, config, security, hardening and other Cyber Q&A
- Registration Link: https://www.hbs.net/Events/HBS-K12-Lunch-and-Learn
- Okio Document Camera
- https://www.okiolabs.com/product/okiocam-s2-pro/
- Can be used as a document camera and webcam.
- In Document camera mode, camera will zoom in to an area with a QRCode on a stick the user can move.
- Priced at around $100
Welcome everybody to the October nineteenth edition of technology check in. Thanks everyone for showing up today. We have a presentation from Koro, but, Ben Chilling has some questions that he would like bring and leave little bit early. So, Matt, I will turn it over you here first. Go ahead ask your question here. So Head brought in meeting was earlier today But wondering how all deal with. Ai with as far integrating if do allow. AI within classrooms, allow it. know my filtering partner separates they AI. chat GPT is one thing, then there's. Kind the. The actual learning. Hey, had third category, but or guys allow? Or not allow, classroom. Take first shot at say that. We, are embracing it, so. allowing students use chat, Camba AI, any type It's just kind changing. way teachers doing checks understanding right understand concept Seems lot colleges are, know, heard couple professors who encouraging They're still gonna about what wrote. Chat write absolutely no clue wrote, you're going be trouble, right? There's gonna, there's, they're having find alternative ways. Now we that's maybe creative writing something where using And Catcher built into That detects generated by It an additional subscription. Our librarian folks did purchase overall, man, we're just, telling Scott too long got back RTM conference Orlando, Florida largest school districts country were there I'm majority them embracing. trying ways block because matter what. That's been our stance on doesn't mean that's, the, way. we've done So. opposed per se. more saying You, utilizing paper go about. tracking after fact. mentioned didn't know. somebody thought another point Google Classroom. of. checker, correct? Google, has, originality reporting, think it's called. basically does similar when turned against, Same plagiarism, supposed beyond only what's web plagiarism domain domain. don't whether not. Yeah, heavy catching anything generated, but. me, mean, every single day. You there's log quicker been, chasing tail try And, this, yeah. Okay. Anybody else? Not Travis. From St. Edmunds. talking Matt Schilling asking How dealing with, classroom school, it? Stop comments put spot. Okay, anyone else comments? their Patterson. Travis Patterson Edmonds. joined Alright, wanted there, Mr. Chilling? Alright. questions. want in, can quickly run through too. sure, ahead. We're working building security now. Door access next 2 weeks. pretty excited part governor's grant. order now cameras. got. thanks update then. Was process smooth paperwork approval funding Where Is wasn't enough get accomplish change? Project change project. A terrible amount so full disclosure hundred $1,000 considered schools even though contiguous roof beds reported schools. 100,000 us thirds there. came rest own. spending $50,000 project total. We'll have. Some chunky blind spots. I've business office haven't directly numbers portion estimated completion date addition everything they've on. gave him December 30 could move another, affect dole out quarterly basis. Sounds good. Well, thanks, Matt. go, and, Jeremy Aaron waiting patiently contacted company called Koro I'll Jeremy. Sure, Scott. Just background guys, actually, across, Prairie Lakes Carson Elson, Cherokee, actually longer Cherokee thank time he's talk cybersecurity frameworks solution around show quick glance tool, answer might let's being said, Aaron, pull that, presentation? so, thanks. letting today, guys. I, ran training internally last Friday element good least high level align overall attack. Kill chain most threat actors take environment. As well maps. To environment helps institutions. Protect themselves, general under more. Focus bad these days historically. Let me Sure screen I'd love chiming anybody familiar Lockheed Martin. chain, model, will. ring bells? No, okay, okay. hopefully see this slide which short essentially black hat malicious person target. Would start really 7, different phases. Again, developed plagiarizing content anyway, starts reconnaissance phase, figuring after. Who either data need potentially ransom perspective, phase much keep off dark best can. thing can, phase. weaponization very well. This actor to, tie. Based reconnaissance, sort exploit. Could piece malware social engineering. Campaign. What, am this? campaign. There against individuals a, organization. than coupling exploit Delivery where, many vendors help deliveries okay figured attack use. sending email USB drive knocking door engineer information you. definitely come play from, standpoint, anti-moer thing. If fails, right, happen. Exploitation entered, able executing exploiting target based delivery chose. After installation. establish command control finally, acting objectives, worst place be. Fortunately, National Institute standards, framework designed counteract 5 core pillars, identification assets protect. protection those assets. detection breach regarding Followed adequate response. take. ultimately, 4 previous legs fail, recovery. itself. holistic Think protecting students, include areas Koro. Helps protect environments won't necessarily quite bit. kick second short, terms getting inventory cloud application environment, users connected device endpoint agent. obviously protecting, customers, wide variety threats. loss prevention, encryption drives. provide encryption. Anti-mower capabilities. full, gen AV deploys machines areas. On side, let, no, provider ever perfect, When failed where. EDR comes actively searching devices network abnormal processes. They indicate somebody's compromised layering mower VR endpoint. via filtration phishing emails. latent emails, stripping before response deleting infected We're, quarantine malware. down duplicated. Duplicated Because are. Doing things perimeter also multi, it's, multiple NIST framework, guess, say. spend look behavior user. monologued Jeremy, any? Any comments, call here? silence no. mind stop sharing Thank sure kinda, helpful guys? all? Good kinda heads nod Great hear. Koro's goal simplify especially schools, generally few factors limiting. manpower. Budget time. Let's really, probably. Responsible managing tools build tool designed. Really IT professionals hats. other projects highly automated, Handle critical automatically until chance further. Are dashboard? Cool. perfect. In of, doing, top coverage, apps, user, behavior, your, email. assuming workspace. Perfect. Devices. antivirus, also, data. leads tile, both leaving sensitive lie. interesting. reading study, weeks ago, data, valuable medical records impersonate identity. health healthcare hospitals doctors stuff big budgets. issue reasons why seeing attacks records. actors, than, credit card number instance. works admin Now, below hand system may resolved or, pre-configured settings select. give level, app we're, hooking O. 365 set up, permissions make nobody's logging outside US, restrict static IP. ties user standing fall norm. like. Superman travel mentioned, administrator account escalating privileges disabling firewalls like, beginning end year, mass deletion download. be, teacher. Preparing lesson plans, grab plans go. Just, multitude downloading files, indicator activity. Whether insider potential actor. Email, as, cool protection, tool. one. Big industry seen become almost bottleneck emails held small team army necessary filter out. works, own quarantine. junk folder, deleted etc. They'll subfolder labeled suspected. treat extra granularity. sight, mind, teacher missing assignment suspected folder folder. add both, Gmail Outlook report feel something, passed through. fishing. What open ticket Council. mentioning, call. found people have, success conjunction enable proactive about, game. device, wanna pause. Anyone far? demoing product called, Checkpoint. Sure. seems somewhat decipher. differences then, increase QR code handles Erin, probably equipped Sorry. Got cold now, Checkpoint frequently. We've, competed many, times. fishing scan scanning you, URLs. contents That, could, malicious. maybe, land later nitty gritty platform looks yeah, you'll some, similarities. similarities, word, overlap between do. Appreciate Thanks, Aaron. Did question, Landon? offline, follow interested learning console. includes antivirus. difference antivirus standard traditional looking signatures, whereas behavioral base threats signature defender gravity zones SDK. agent unique. You'll functionality standard, zone. reinvent wheel? robust library. portion, used for, lies lies, alerting is, seen, administrators specific keywords fields create ad hoc bullying filter. alcohol, types words, design better idea opportunities, maybe. emailing work home, realizing contains, student. area gonna. Come play, heavily flag compare, flagged major compliance frameworks. see, hey, waste Scott's at? number, check, context determine, legit violation important determines important, ticket. crucial, flagrant violation, it'll closed tickets fatigue behind tickets. Does, sense? winded. 30,000 foot view, pane glass. didn't, solutions marketplace area. 12 dashboards aren't intercommunicating each other. spots not, intelligence giving view. Erin happy down, implementing let We'd schedule Oh, forward absolutely. process, we'll meet timeline through, evaluation. free trial solution. One shines ready backs. trial, setup takes 5, 10 min implementation deployment less hour. month site process. question. questions? note takes, week learn normal sets behavior. default, settings, speak, box, notice noise significantly reduced Of appreciate talked vendors, glad decided and. hope fantastic week. sounds wouldn't send contact information, hold notes archive later. documentation sharing. Yep, worries. fine. Thanks. Have great Foley, today? Pretty Anything? share? sorry, Somali active bracket business. PC backup workspace backup, implement At in? Yes. Anything Alrighty. introductions wise, new face Matthew Rogers New STT Lakes. at. Manson Northwest Webster Emmisburg Started ago space meetings man spot, speed networks share group man? preaching choir public prevent. Teachers might. Might worthwhile endeavor prevent get. Forced seize whatever. Cause contract on, for. Weeking documents. already or? Can applicable. worries, always stuff. Landon, you? First stuff, welcome, mats barely hang gotta Foley heck? true. Wow. technically Shilling well, match show. scenes, asked name Yeah. Gosh, see. can't hint checkpoints coming demo us. scheduled. pick Also, American time, ITEC demo. went sessions impressed product. combines paging systems clock Bell system, emergency alerts Digital powered screens POE. Takes watts equivalent AP, A/C power. you'd little? Screened phones. screen. little. syncs Weather Service. severe thunderstorm, tornado, across tell Fire alarm. buildings physical lock buttons. sample looked these. But, button pushed, displays gymnasiums remember documents example push panic buttons, dashboard whole older glass story there? us, our, elementary instead All analog wire digital separate bell usually controller amplifiers. you've got, Primex, transmitters everywhere. Right. instead, happen outputs sound, announcements. Instead announcements kids building. strobe effect class period strobes attention flashes names hearing, change. examples lockdown button. those. Trigger. Doors shut locations. disables key cards But. server rack cloud? how's hitting devices? Yup, guess Landon. yet. sign life away, mess don't, gut tells host this. web-based, information. Actually, missed stopping Monday. Thursday meeting. worth wait district fair enough. makes sense. No. parts started putting together registration link 48 practice workshop. November fifteenth. is. K forwarded Infotech per, whatever AA here, Prairie. folks, free. catch You're hear Heartland tenth heard? engineering folks. available. Jason. fifteenth jump. again. dropped case again, catch. hardening practices Fortnite engineers cost 2, $300 hour them. bugging, charge session. saw ITECH Oh Jason, landed? demoing, never Webcam Okio cam, think. awesome. said session, session randomly left walked awesome, click picture won't. anyways. wand. all, camera falls nothing. webcam, microphone camera. calls laptops prop face. wand projecting. flip side zooms document. follows moving book needing closer adjustments resets page again thought, holy cow, phenomenal buying document spending, 200 bucks minimum Duquesne brand believe dollars. talking, drop cameras wow, all. No Yesterday, Service Day, switches firewall working. Other firewall, going. my, up. plugged along everything's busy starting slow down. Next Don't vendor yet meeting, planning Thursday, Brainstorm, recommend day, kettles. offline online versions those? Online. oh, Yep. version supported languages, wrong early stages plan. Maybe few. Nice. Brainstorm? submitted his That'll experience.