Â鶹ÊÓƵ

Skip to content

Vital cyber information and security brought to SECPSD table

Security threats are always a growing challenge and implementing security measures have to be weighed against budget constraints.
Â鶹ÊÓƵ East Cornerstone head office
Â鶹ÊÓƵ East Cornerstone Public School Division building

WEYBURN — He speaks softly, but also carries a big stick.

The stick is the responsibility factor and is not used as a cudgel for offense but rather a more respectful use within the information and cyber security world in the Â鶹ÊÓƵ East Cornerstone Public School Division.

The stick carrier, Brian Belinsky, provided a 45-minute break out and breakdown regarding information dispensed through the technology paths in the public school division to the board of trustees on Dec. 18.

Belinsky, manager of information systems in SECPSD, had been asked to provide information regarding the dispensing of information via the cyber world and to also address recent updates in the implementation of various cyber security measures during the school board’s open business session.

The presentation, dubbed Navigating the Technology Landscape, was filled with information regarding current and future initiatives for the SECPSD.

Belinsky began with an overview of how the systems roll out and introduced the 11-person front line team to the board members via video photos. He spoke of technology integration, user support systems as well as cyber security measures.

He noted how the area technologists and programming analysts work together to support such endeavours as professional development and support initiatives for staff members. Cyber security training is within this realm as well as emerging technologies and certifications to ensure that what is captured on the learning scales, is retained and deployed.

Recent advancements included some enhanced measures on the cyber security files, technical infrastructure upgrades and a centralization project for school platforms that had brought a dozen more school locations into an upgraded and equal footing with others, pretty well completing what had been a long range goal.

Enhancing cyber security and advancing education technology through the integration of upgrades was explained. The various financial channels that were deployed to provide the necessary materials and equipment were brought forward.

Belinsky broke down the sector’s $2.5 million budget, noting that approximately 35 per cent of that is used for security measures and another $600,000 is for equipment upgrades and $900,000 for school technology upgrades.

He also provided a chart showing the progress of budget allocations over a period of 10-years, pointing out the sectors that were now drawing fewer funds while others were in an expense growth pattern.

It all boils down to access equity in schools, building capacity, innovation in the information systems and general operational efficiency measures, he suggested.

Security threats are always a growing challenge and implementing security measures have to be weighed against budget constraints, he said, noting, “security updates come with a cost.”

Rapid technology advancements and the integration of mobile devices in schools and the system offers all types of additional security challenges, he added.

On the technological growth file, Belinsky noted the opportunities for technology growth such as cloud computing and hybrid cloud solutions.

He added, “the majority of schools enjoy full connection and training.”

There is ongoing awareness training for frequent technology users as well as data management training along with the key (basic) security practices and policies.

The regular use of technology tools can be found in the integration of the Edsby system for educators plus the Sora eLibrary utilization and My School Sask programs as well as others such as bus planners et al.

There is a future roadmap for technology enhancements, he said, such as increases in connectivity, service management data management and analytics, digital transformation and training for staff and students as well as the vital cyber security requirements.

The presentation was then wrapped up with thanks from the board members. 

push icon
Be the first to read breaking stories. Enable push notifications on your device. Disable anytime.
No thanks