The K-12 Cybersecurity Resource Center website will be the new home of the K-12 Cyber Incident Map and related cybersecurity resources and commentary that has been published on this website. Over the coming days and weeks as cybersecurity resources are migrated to their new home, visitors will be redirected to the new site – and what is now legacy content on this site will be removed. For the foreseeable future, EdTech Strategies will continue to host education technology news, research, and commentary. However, new research and commentary on cybersecurity and related issues will be published at The K-12 Cybersecurity Resource Center.
Why Launch a New Website?
A few reasons:
- The K-12 Cyber Incident Map was launched as a proof-of-concept. Since its launch just over a year ago, the Map and related resources have been: (a) cited in testimony to the U.S. Congress, State legislatures, and federal agencies; (b) cited in major media, education trade outlets, podcasts, and blogs; and (c) used by school district leaders, educators, and organizations to help advocate and plan for better K-12 cybersecurity practices. The need and demand for this information has been demonstrated.
- As the interest in this work has grown, there are myriad enhancements and directions it could take that would benefit the K-12 community. These enhancements involve technical (back-end) work, more robust research capabilities, and better communications tools. To that end, the work begged for its own identity and to be disentangled from the broader focus and technology of its home at EdTech Strategies. A new website gives it a clean platform from which to grow.
- The K-12 Cyber Incident Map and all of the cybersecurity- and privacy-related work conducted to date on this site has been self-funded. These are important issues, and I have been privileged to be in a place to offer it as a free and fully independent resource for the K-12 community. I am mindful of the pros and cons & tools and techniques available to raise money for an effort like this. For this reason, I have integrated the ability for individuals and institutions/companies to directly support the work (in a manner similar to Patreon, but under my direct control). Site supporters will have input into future enhancements to the work and other benefits to be determined. Recent online commentary (such as this) from friends and colleagues has spurred me to take this step:
As I prepare for a presentation on contemporary legal issues in education, I’m reminded that any school system that isn’t consulting @douglevin‘s work (and compensating him for his work) on cybersecurity / data privacy is making a huge mistake. https://t.co/mniH1EDlTL
— Jon Becker (@jonbecker) April 13, 2018
I’m grateful for the nudge and for the ensuing conversation it generates. (Also, note that I am available for speaking, training, custom research and other consulting opportunities.)
What Does it Mean for Visitors to This Site?
For those who have been interested in the full range of issues covered at EdTech Strategies, you now will need to visit two websites (or two RSS feeds) to follow the work.
If you just came for the cybersecurity work, update your bookmarks and you’ll be all set. Same great content, new URL.
Note that some visitors to this website receive automated emails to inform them of new posts. Out of respect for your privacy and preferences, I will NOT automatically be subscribing users of this site to any new communication tools that may be used by the K-12 Cybersecurity Resource Center website now or in the future. As always, you may unsubscribe to any EdTech Strategies automated emails via the ‘unsubscribe’ link in each message.