Events

Navigating Cyberattacks: Effective Strategies for Better Preparation in Schools

May 13, 2025
11:00 a.m. - 12:00 p.m.

Quick Overview

Educational institutions are increasingly vulnerable to cyber threats. Schools manage vast amounts of personal information across a broad digital landscape. While schools are considered high profile entities where reputational risk is severe, they face significant funding challenges, limiting their ability to invest in cybersecurity infrastructure and personnel.

To view the webinar recording, click here (passcode: .+V0GxdH).

Threat Landscape

How are Schools Being Targeted?

Figure out which threats pose the most risk to your specific institution.

  1. Vendors
  2. Phishing
  3. Remote desktop protocol
  4. Open ports
  5. End of life software
  6. Social engineering

Cyber Attack Statistics

Cyber Claim Life Cycle

The cyber claim process begins with the discovery of an incident, followed by immediate incident response and notification to the insurance carrier. A point of contact is assigned, and approved vendors are selected in coordination with the insurer. Within hours, an initial scoping call is held to assess the situation, after which breach counsel is engaged to guide the response and coordinate containment efforts with internal and external stakeholders.

Be mindful of experience, insurer panel status, response time and data handling practices when selecting vendors. It’s important to address pitfalls in the claims process, like delays in reporting, use of non-approved vendors or lack of documentation.

Role of Breach Counsel

Cybersecurity

With an ever-growing number of security controls available, knowing where to focus your efforts is essential. Implementing the right controls strategically is key for effective cybersecurity. Controls can include employee training, multi-factor authentication, endpoint detection response and secure backups. While these controls are foundational, proactive preparation is just as important to minimize the impact of an incident and accelerate recovery.

Cyber Insurance

Make your policy work for you. It’s not just about having coverage—it’s about understanding how to use it effectively. Know who your panel providers are and what resources are available to you before an incident occurs. Cyber insurance policies provide:

View the Recording

Passcode: .+V0GxdH

Meet the Presenters

Valentino Papa

Cyber Practice Leader, RCM&D

Jennifer Beckage

Managing Director, The Beckage Firm

Scott Morris

SVP, Technology & Security, The Beckage Firm

Hunter Maskill

Executive Vice President, INSUREtrust