Lessons for the Present Day Cybersecurity Conflict in Higher Education

Event Overview

World Wide Technology (WWT) and Fortinet, Inc. are partnering for a 60-minute webinar featuring a conversation between WWT’s Chief Technology Advisor – Higher Education, Michael Sink and Fortinet’s Field CISO for Education, Bob Turner How can education cybersecurity teams use cyber intelligence and the NIST Cybersecurity Risk Framework to best manage incoming threats. This webinar will follow a motivational presentation by country music performer Keni Thomas, a former U.S. Army Special Forces Sergeant, who served as a member of Task Force Ranger in the 1993 United Nations Operation Restore Hope in Somalia. Thomas and fellow Task Force members were involved in the famed “Battle of Mogadishu” which was immortalized in the 2001 film Black Hawk Down. Keni uses that experience to motivate and inspire leaders at every level.

Michael Sink

World Wide Technology

Chief Technology Advisor - Higher Education

Micheal Sink serves as Chief Technology Advisor of higher education at World Wide Technology. In this role, he has the pleasure of engaging with cl...
Bob Turner

Fortinet, Inc.

Field Chief Information Security Officer for Education

Bob Turner is the Field Chief Information Security Officer (CISO) for Education at Fortinet, Inc. where he serves as a senior level strategic busin...
Sergeant Keni Thomas

Emmy-winning producer, CEO Downrange Leadership school, Combat Veteran of the 75th Ranger Regiment, country music star and award winning songwriter

In the summer of 1993 Staff Sergeant Keni Thomas was deployed to Mogadishu Somalia with the 3rd Ranger Battalion as part of an elite special operat...

What to expect

What are the major hurdles to education cyber safety and security in 2022 and 2023? Cybersecurity and IT executives need to know where to point the digital firehose to put out the most destructive cyber fires and still meet current student and faculty needs. This candid conversation between Michael and Bob will include lessons learned and help answer some of today's cybersecurity challenges:
  • Where do we find well trained and dedicated cybersecurity analysts to manage multiple silos of security devices using real time cyber threat indicators and intelligent event data?
  • With so many information sources and methods of analysis in our industry, how do education IT and cybersecurity managers choose the best technology and cyber intelligence data available along with creating proactive playbooks for technical and physical monitoring of information systems.
  • How should higher education cybersecurity teams position themselves and use multiple cyber intelligence feeds to assess material risk and mitigate vulnerabilities and threats?

Goals and Objectives

How can Higher Education cybersecurity teams use cyber intelligence and the NIST Cybersecurity Risk Framework to best manage and avoid incoming cyber threats.

Who should attend?

IT Professionals in Higher Education