High School Students Posing For Photo
Programs and Services » Cybervision20 » Cybervision20

Cybervision20

Cybervision20 Logo

CyberVision20 is a consortium focusing on awareness and monitoring of network vulnerabilities of each district and charter school’s internet facing and internal networks. The major purpose of CyberVision20 is to promote cyber industry best practices, heathy cyber hygiene, and affordable tools to monitor network and system resources. Promoting and training of the use of low cost or best in breed reliable network monitoring tools and resources to reduce the risk of exploitable network vulnerabilities.

Membership includes access to a “Base” product offering, consisting of perimeter and internal monitoring service, vulnerability scanning and remote remediation assistance, Monitored End Point Protection for staff and student devices, and Information Security professional services to assist with security readiness and documentation.

Services are provided by Technology Services staff and ESC-20 partners.

All Region 20 districts receive the following benefits:

  • E-mail alerts of cyber hygiene issues as they arise for district corrective actions
  • Cybersecurity meetings/ events
  • web-hosted cybersecurity TLP-Green and TLP-White industry notices
  • ​​​​​​​Restricted access E-mail notification TLP-Amber and TLP-Red information from ESC-20 cyber partners
“Eyes Front” Initiative (E-mail cyber hygiene) – Professional services to assist LEA’s to correctly implement SPF, DKIM, and DMARC policies to ensure their email security is configured to prevent Business Email Compromise (BEC), and business spam.
Infosec IQ Security awareness training built to educate and engage
Vulnerability Scanning – each LEA is entitled to:
  1. one internal vulnerability scan of any selected 256 (/24) IP addresses within their network. The focus is on scanning critical servers and mission critical workstations to identify any operating system (OS) and application vulnerabilities.
  2. One external vulnerability scan of any selected 256 (/24) IP addresses associated with the LEA to identify any operating system (OS) and application vulnerabilities.