Cybersecurity

Tabletop Exercises (TTX)

Center for Internet Security (CIS) Tabletop exercises are available for use with users, administrators, and technical professionals. Tabletop exercises are meant to help organizations consider different risk scenarios and prepare for potential cyber threats. All of the exercises can be completed in as little as 15 minutes, making them a convenient tool for putting your team in the cybersecurity mindset. In addition, each scenario will list the processes that are tested, threat actors that are identified, and the assets that are impacted.

See More

Student Data Privacy Consortium (SDPC)

Learn more about the Student Data Privacy Consortium (SDPC). The LTC is the Alliance Member of the SDPC providing access to SDPC resources such as the IL-NDPA and the database for managing data privacy agreements to all Illinois School Districts.

See More

K12 SIX

Learn more about the K12 Security Information Exchange (K12 SIX). The K12 Security Information Exchange (K12 SIX) is the only national non-profit organization solely dedicated to protecting the U.S. K12 community—including school districts, charter schools, private schools, and regional and state education agencies—from emerging cybersecurity threats.

See More

The K-12 Cyber Incident Map

The K-12 Cyber Incident Map, a visualization of publicly disclosed school cyber incidents from 2016 to present. Maintained as a public service by K12 SIX.

See More

CISA Ransomware Guide

On September 30, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center released a joint Ransomware Guide, which is a customer centered, one-stop resource with best practices and ways to prevent, protect and/or respond to a ransomware attack.

See More

CoSN Cybersecurity Toolkit

Controlling access to organizational systems and resources is an essential element of cybersecurity. The traditional approach to access control has been to assign usernames with complex password requirements, generally a combination of up to eight letters, numbers, and special characters. However, in an era of sophisticated hackers and cybercriminals, this cybersecurity approach is no longer adequate. Download our new Authentication Management Toolkit to improve your security stance.

See More