Eric Muckensturm

Eric Muckensturm

IT Strategy Manager, Cybersecurity

Schedule a Meeting

About Eric Muckensturm

Eric Muckensturm, IT Strategy Manager for Cybersecurity, is a highly skilled expert in network infrastructure and cybersecurity, offering strategic guidance and support to school districts across Illinois. With a deep understanding of the unique challenges faced by K-12 institutions, Eric works closely with districts to enhance their cybersecurity posture, resilience, and overall IT maturity.

He provides a comprehensive range of services designed to strengthen security at every level, from assessing vulnerabilities and mitigating risks to implementing industry-leading standards, frameworks, and best practices. His expertise helps districts align with regulatory requirements, safeguard sensitive student and staff data, and build robust defenses against evolving cyber threats.

Through proactive collaboration, education, and tailored solutions, Eric empowers Illinois public school districts to navigate the complexities of cybersecurity with confidence, ensuring a safer and more secure digital learning environment for students and educators alike.

Contact Information

  • Email: emuckensturm@ltcillinois.org

Eric’s Upcoming Events

Be Connected: Physical Inventory

| Free

You cannot protect what you don’t know you have. Grab your inventory list and tune as we discuss strategies for keeping this “living document” and critical security tool up-to-date in the face of constant hardware moves and additions.

Eric Muckensturm
Eric Muckensturm
IT Strategy Manager, Cybersecurity, Learning Technology Center

Be Connected: Patch Management

| Free

There’s a better way to patch! Let’s dig into how your district can shift from reactive clicking to a structured lifecycle of testing and deploying updates across servers, workstations, and network firmware.

Eric Muckensturm
Eric Muckensturm
IT Strategy Manager, Cybersecurity, Learning Technology Center

Be Connected: Physical Network Security

| Free

A strong firewall can’t do much if someone has unauthorized access to your server room or a network jack. Learn how to lock out that vulnerability by “locking and logging” IDF closets and disabling unused wall ports.

Eric Muckensturm
Eric Muckensturm
IT Strategy Manager, Cybersecurity, Learning Technology Center