EDUCAUSE Annual Conference 

October 25–28, 2022 | Denver, CO: https://events.educause.edu/annual-conference

November 2–3, 2022 | Online: https://events.educause.edu/annual-conference/online-event

Program Tracks

  1. Teaching and Learning
  2. Leadership and Future Workforce
  3. Cybersecurity and Privacy
  4. Student Engagement and Success
  5. Innovation and Emerging Technologies
  6. Supporting Research Computing
  7. Infrastructure and Networking
  8. Policy and Law


Summary for HEIs

Powerpoint slides: kallberg_lehto_educause22_summary_for_HEIs.pptx

Recording from the summary webinar for HEIs: https://video.csc.fi/media/t/0_5dcr6um0

General Sessions

Noteworthy General Observations

EDUCAUSE Digital Transformation (Dx) Materials

Other EDUCAUSE Materials

2022 EDUCAUSE Horizon Report® Teaching and Learning Edition: https://library.educause.edu/-/media/files/library/2022/4/2022hrteachinglearning.pdf

Barriers to Adopting Technology: https://er.educause.edu/-/media/files/article-downloads/eqm0223.pdf

Identifying, Evaluating and Adopting New Teaching & Learning Technologies: https://er.educause.edu/articles/2020/8/identifying-evaluating-and-adopting-new-teaching-and-learning-technologies

A Framework for Student Success Analytics: https://library.educause.edu/resources/2022/5/a-framework-for-student-success-analytics

Saint Mary's University - Inclusive Learning Systems - Reflective Roadmap.pdf

Commercial Materials

TPaCK Framework: https://www.powerschool.com/blog/the-tpack-framework-explained-with-classroom-examples/

2022 State Of Student Success & Engagement in Higher Education: https://www.instructure.com/canvas/resources/higher-education/2022-state-of-student-success-engagement-in-higher-education (marketing info required)

POST-IT Wall / What are the greatest challenges and/or opportunities facing higher education?

Student experience

  • reflecting on needed learning for providing higher education
  • meeting students in person and supporting their success
  • resonating learning modalities for students
  • maintaining a consistent learning experience
  • continuous learning
  • engagement in online learning
  • institutional value propositions
  • mental health, accessibility & general well-being (esp. after Covid)
  • ineffective teaching practices combined with program bloat
  • increasing suite of products
  • proving the value of a degree
  • finding ways for tech to better support student success

Internal issues

  • change fatigue and change aversion combined with an organisational non-ability to pivot fast
  • stakeholder mapping/modelling
  • hiring developers, instructional designers and information security analysts
  • staffing in general and employee retention
  • retention of institutional knowledge and resources
  • cutting costs vs. innovation
  • governance and siloed information
  • relationship between institutional designers, administrators and faculty
  • buy-in from the top

Externally imposed issues

  • changing demographics and the enrollment cliff
  • cybersecurity and compliance
  • accessibility
  • climate change
  • digital innovation & digital transformation
  • remembering higher education is not job training

Breakout Sessions

Session Topic: Cybersecurity

Countdown to Compliance CMMC in 2023

The Department of Defense's CMMC program is projected to become law in May 2023. This session focuses on a CMMC assessment timeline, with 12 key steps and the time it takes to achieve them. The goal is for your institution to be ready to bid for DoD research contracts by May 2023. Attendees receive an assessment timeline created based on panelists' expertise. Each institution can readily see where they are on the timeline and adjust their time, effort, and prioritization as needed.

Sponsor: https://www.preveil.com

  • Simplify NIST 800-171, CMMC, ITAR
  • HU:s are major target of cyber security attacks
    • Universities are like small city, have also housing & energy infra
    • Universities were build to share data, not to secure it
    • There are nations that are interested of the data that researches have
    • Universities have 16 different regulations, but if you look into more holistic they are mostly the same and axing for same thing
  • 3 regulatory framework to protect unclassified information
  • TImeline for compliance takes usually a year
  • 5 ways to simplify
    • NIST 800-171 foundation CUI Compliance https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final
    • Inherit Compliance & Documentation from Cloud platforms to store and share CUI
      • Use Cloud tools to implement security
      • Compliance documentation from Cloud platform provider
        • Simplifies the creation of the system security plan
      • Use CMMC AB Certified consultant to augment in house specialist
    • Adopt simple deployment and familiar user interface
    • Implement Strong Zero Trust Security
      • Encrypted Cloud file storage
      • Encrypted messaging
      • End to end Encryption simplifies security and compliance
        • Encrytion 
      • ITAR 120.54 enables uses of cloud service
        • All data is end to end encrypted
        • With FIPS 140-2 or later Encryption
        • Cloud service has no means to decrypt the data
    • Get external Compliance Experience
  • Network with different universities and colleges
  • How to distribute chanes in compliance?
    • 2 types of researches,
      • People who work with army, who know what to do
        • Easy, the want to do the right thing
      • People who doesn't understand what it has to do with research
        • Research steering groups 
        • Trying to find the right lingo and key people to talk with
  • Develop standard set up language and templates to help researches to write required documents.
  • Do's and Don'ts
    • Compliance takes a lot time, make sure that you prioritise the time
    • Make sure that your document is ready before hand
    • You need 2 pieces of evidence in all controls
    • Practise interviews with who are envolved
    • Make sure that you have filled all required documents before hand
    • Make sure that you have strong support from leadership and security
    • Make sure that compliance will become part of the research project plan

What's New in Research Cyber Security in 2022? Perspective from Trusted CI and ResearchSOC

This session covers recent lessons learned about the unique cybersecurity needs of research projects on campus from representatives of the NSF-funded Trusted CI and ResearchSOC centers. Topics include research data integrity, ransomware, Science DMZs, science gateways, software assurance, cybersecurity research transition to practice (TTP), and workforce development.


NSF Science and Compliance

Trusted CI Framework

https://www.trustedci.org/framework

 Best Cybersecurity practices

  • Science Gateways Security
    • Webservers are common target
    • Number of recommendations available

  • Science OT
    • Manytimes running  very old software
    • Also building HVAC
    • At ship Example
      • Cranes
      • Winches
      • Antenna Controllers
      • Door controllers
    • Study findings
      • Security is missing element for OT procurement requiremenrts
      • Organizonal Silos between IT and OT personel
      • No OT security experts
      • Newer OT is more and more software defined, same vulnerabilities than traditional IT services

OmniSOC

  • https://omnisoc.iu.edu
  • ResearchSOC is part of OmniSOC
  • A community approach to defending research and higher education
  • OmniSoc CORE
    • 24/7 always watching
    • Share monitoring capacity
  • Project Liaisons
    • Onboarding
  • Soc - Plus
  • Virtual Cyber Security Services (staffing)

ResearchSOC - tailored for open science

  • OmniSOC Core Services
  • Project Liaison
  • Honeypots & vulnerability scanning
  • Virtual Cyber Security Services (Staffing)

Organisational Trends

  • Threath Landscape
    • Cray Pigeons
      • happened every day, quite common attacks
      • Can be controller with good security controls
    • Internet Noise
      • if it on the internet, it is going to be targeted
      • regular scanning and updating
    • Ransomware
      • Hot topic
      • can be controller with:
        • Network segmentation,
        • network monitoring,
        • basic security controls,
        • educating staff is the best bet
    • Workforce Retension
      • It is really had because of covid and remote work
  • Most of threats are coming lower on ladder
  • Operationl Threads
    • Flat networks 
    • Slow patch cycle
    • Supply chain management
    • Bad inventory

Security Night Live: Cybersecurity Training people want to attend

Cybersecurity starts with our end users, but our traditional training methods usually fly right past them. Discover how Notre Dame created a highly visible and entertaining way to engage thousands of people over a two-day event and gain tools you can use at your institution.

Material online: https://oit.nd.edu/initiatives/nd-cybersecurity-carnival-presented-by-google/?utm_source=go&utm_medium=link&utm_campaign=cybersecuritycarnival22

Cybersecurity Carnival

  • Creating games and attractions
    • Go Phis -attaction
      • Learning object regonize phishing
      • Review and identity examples
      • Throw stuff into stuff
    • Password ring toss
      • Password quality
      • Learning what no to do
      • Throw stuff onto stuff
    • Cover the hopspot
      • Secure home network
      • Get tips and advise
    • Slam Spam
      • Reconizing common scamms
      • Answer T/F questions
      • Thro stuff on stuff
    • Cybersecurity strongman
      • Identity strong passwords
      • Choose between 3 passwords
      • Push stuff to make stuff ding
    • Password poetry
      • Desing a strong password
      • Construct password from a. prompt
      • Move magnetic stuff
    • Always the winner
      • Regonizr real prhishing
      • Try to find the hacker card
    • Lock picking workshop
      • Pick a lock
      • Workshop and hands on practice
      • Prod stuff to open stuff
    • Security night live
      • Real security situations
      • Sketh comedy and student actoris
      • Laugh at and learn stuff
    • Museum of mishaps
      • Virtual presentation of cybersecurity gaffes
      • Parodies of famous art
      • Look at and laugh at stuff

Zero Trust is a Hot Topic?

Zero Trust is one of the hottest topics in cybersecurity. It is also one of the most used and often abused buzzwords in cybersecurity these days. But if you understand it, you don't have to roll your eyes every time you hear it. This session will review the newly released article in the EDUCAUSE Review. We'll give you a brief overview of why ZTA is needed and where it came from. Then we'll cut through the hype and help you understand it based upon a simple definition from NIST SP800-207.

When I can protect Users, Data, devices when they are everywhere?

Deperimeterrization to Bordeless network to Zero Trust

  • What if your all devices are connected to internet
  • Everything can be compromised unless proven differently


Zero trust

Zero trust provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. The goal is to prevent unauthorized access to data and services and make access control enforcement as granular as possible. Zero trust presents a shift from a location-centric model to a more data-centric approach for fine-grained security controls between users, systems, data and assets that change over time; for these reasons. This provides the visibility needed to support the development, implementation, enforcement, and evolution of security policies. More fundamentally, zero trust may require a change in an organization’s philosophy and culture around cybersecurity.

  • National institute of standards and technology NIST publication 800-207 (Published 2020)
  • CISA Zero Trust Maturity Model: https://www.cisa.gov/zero-trust-maturity-model
  • Assume NO security perimeter, NO automatic access once "inside"
  • Protection around every "asset", Trust must be earned for access to every asset, everytime
  • You need to recognise what you need to protect, not just your own endpoints but also those endpoints that access your systems 
  • Not something you can buy, Combination of solutions, each protecting a particular dommain/pillar
  • We need to re-frame our access policies/thinking = Trust comes from policies and policy inputs come from different sources, like SIEM, IDM, PKI, CDM, Activity Logs ....
  • Critical factors
    • Culture and human factor
    • Data encryption - at rest and transit
    • Policy Creation and Access control
    • Micro-segmenting
      • One area/school/department/ down to individual device
    • Automatic and integration
    • Continuous visibility and enforcement
    • Threath Intelligence

The University of North Carolina at Chapel Hill Policies, Procedures and Standards: https://policies.unc.edu/TDClient/2833/Portal/Home/

Educational institutions are a hot target for cybercriminals

In this presentation, Devin Bhatt, acting chief information security officer (CISO) at Federal Student Aid, U.S. Department of Education, will delve into the details of cybersecurity incidents that affect institutions of higher education every day. Discover the most common causes and surprising entry points of breaches, learn best practices for both prevention and mitigation, and explore how to effectively mitigate a cyberattack in progress.

https://fsapartners.ed.gov/title-iv-program-eligibility/cybersecurity

Agenda:

  1. Cyber risk
    1. Breaches made headlines and cause panic and lawsuites
    2. Behind these attacks are financial motives
    3. From heartland payment system breach 2008-2010 caused major credit card companies developed PCI standard
    4. Compliance doesn't mean that you can't be breached, you are just one change away from been able to be breached. You need to focus on continueind security
    5. Increasing ransomware thread, 2020-2021 is a major change
    6. Do the basic stuff, updates, close unused ports, good password, MFA etc
    7. Cybercriminals are now after for also for small companies
    8. If you have sensitive data than can be monetised, you are an target
    9. You can get ranson-ware as a service 
    10. Insiders can cause significant breach
  2. Cybersecurity and risk management
    1. Governance, Risk and Compliance
    2. Outreach, Collaboration, information sharing
    3. Call for action
    4. IHA Cybersecurity newsletter

Session Topic: Digital Transformation and Future Visions

Demystifying Digital Transformation (Dx)

EDUCAUSE has been providing digital transformation resources and institutional self-assessments for nearly five years, and a case could be made demonstrating that elements of Dx have been around for decades. However, as busy leaders and practitioners in the throes of the complex educational technology landscape, many of us have not been able to observe the foundations of Dx. As education, technology, and the workforce continue to shift at breakneck speed, this session is designed to slow things down and to give participants an opportunity to understand Dx, to provide resources and use cases, and to celebrate the practices you may have already established at your institutions. Hear a panel of experts share how they have implemented Dx as part of their institutional culture and how the operational and human resource optimizations have changed the way they serve their students, faculty, and staff.

  • three shifts needed in the digital transformation of higher education:
    • culture
      • how do we approach things, and which processes?
      • orientation for swift change
      • change management might need a change in management 🙂
    • workforce
      • roles, jobs, functions, training
      • thorough onboarding of new workforce facilitates change

      • e.g. also those that have hands-on jobs work remotely once a week
    • technology
      • easiest
  • digital transformation is a change model, also an intentional business strategy
    • Dx has to be a deliberate process, seeing it through culturally essential
    • metrics to back the process up
      • collaborative activity as indicator for success – who is represented at the table? (library, HR, IT, etc.)
      • adaptation cycle time also as a meter, Dx is a cycle of adaptation, the "continuous development" principle useful
  • Dx should be more human-centred, even if the tech component is obligatory 
  • (none of the panelists actually use the term "digital transformation" of "Dx" in the work)
  • small changes and relations are what create resilience, building resilience important (e.g. cyber security, more student graduations)
  • what can be transformed and what cannot is the framework for Dx
    • the three lenses mentioned above should be utilised when figuring out the framework

      • percentages/importance of those three categories in different contexts

Tech Vision 2022: Emerging Trends and the Higher Ed Response

How are technology trends on the horizon going to transform higher education, and what might institutions do to prepare? How do we see these trends coming alive today? How might the role of IT need to evolve to help lead institutions through the coming transformation? And what technology do CIOs need to be considering today to be ready for the future? Our panel brings together Accenture's Tech Vision 2022 research with a panel of two university CIOs and Microsoft to discuss these perspectives . . . and more.

  • vision: a continuum of seamless experience
  • 2030 metaverse is not prepared by universities, so how to make most of it?

  • challenges:
    • how to evolve student experience, interactions
    • how the university is experienced by stakeholders
    • virtual and physical blurred, same result expected

Four trends:

  • WebMe: internet redesigned, web operated as traversed space, data interaction important for a seamless experience

  • Programmable World: bringing the digital into physical world

  • The Unreal: the synthetic into authentic, building trust, security essential

  • Computing: faster computing enables new kinds of collaboration and evolving research functions

Travis: exciting trends --> completely virtual campus at home university already

  • affordable higher education for anyone who wants it

  • new opportunities and higher education paths for new people outside degree studies

  • growth: 4000 students into 200 000 students

  • newest pivot designed: campus model turned into online model

    • different competences mapped to create individualised opportunities for students

    • more personalised, individualised experiences on the student life path

    • required: getting to know students, using data (also unstructured like sentiment analysis, also mining chat logs), identifying barriers and mindsets for learning, impostor syndrome cures

    • building context for one person

    • machine learning used for minimising relearning via shared taxonomy of actual teaching/course content, automatic recommendations for new courses for learnings

    • curriculum restructured, learned-centric model, not industry-centred anymore

John: IT organisation viewpoint

  • how these things land in different universities?

    • faculty-driven esp. in research

  • when IT support is needed to explore new tech and when traction is gained?

  • tech will not be a limiting factor, but challenges will come in

    • making process repeatable

    • admin functions

    • project managements

    • campus coordination

    • goals vs. strategy

    • process design

    • fragmented experiences

  • personalisation requires understanding individuals, the "human-person"

Rob: tech point of view -- what is coming?

  • the "why" of tech begins at skill gaps in education

    • enabling new skillsets and new more fair access

  • the "X gap", experience vs. expectations

    • the true value of higher education should be dug up

    • discover the personas of the segments you serve

  • demand for agility has shifted from vendors to universities in the last 20 years

    • tech should be seen as enabler to recognise and serve the diverse groups and individuals of students

Travis:

  • aim at blending synchronised and non-synchronised learning

  • also enabling flexible schedules and life stages

  • new support functions

    • e.g. automated features for disabled students

    • Rob: e.g. use of avatars in front of cameras

John:

  • bigger universities cannot scale up like a small one

  • covid helped to open up teachers' minds

  • accessibility enhanced through contractual demands

Rob: diversity is a mindset

Further articles about tech trends available at: https://www.accenture.com/hk-en/insights/voices

Friends, Not Foes: Why Institutions and Corporations Need True Partnership to Transform

We’ve all seen it: the cold sales call where the rep is selling a solution your institution doesn’t need, using buzzwords galore to keep the conversation going. When you spend painstaking hours completing an RFP and getting your formatting just right, only to find that the institution has decided not to award the proposal. We’re all tired of square-peg/round hole implementations. In transactional buyer versus seller relationships where institutions are unwilling to share their challenges, and corporations are unwilling to develop solutions around institutional needs, everyone loses.

In this session, EDUCAUSE Showcase Series corporate sponsors will join institutions to discuss true partnership, collaboration, and how to co-create solutions together. Get ready to challenge your thinking of how institutions and corporations interact and dream of a future where both groups can solve big issues – together. 

Learning Outcomes:

  • Take away strategies for navigating partnership conversations with confidence
  • Learn about exemplar collaborative projects that benefitted both institutions and corporations
  • Provide feedback on how EDUCAUSE can facilitate better corporate-institution partnerships

  • key challenges in higher ed:

    • in-person/hybrid

    • cost, covid funding gone

    • enrollment, not enough physical space for students

    • Erfan/Berkeley:

      • security, privacy, accessibility, vetting tools before purchase

      • too many tools and platforms, aiming for a standardized experience while having flexibility for instructors

  • Jordan: dichotomy of assessment; learning to think vs. job training

  • Mary:

    • trust via teamwork

    • shared investment to actually development of universities

    • tailored solutions seen through

    • workforce requirements changed and will change more rapidly

    • tech solutions to facilitate transitions to corporate world

    • long-term partnerships

  • Jordan: shared life-cycle understanding

    • new company more agile than more mature companies

    • end-user conversations important

    • realistic expectations from the university

  • Mary: students expect a tech-enhanced experience because of their use of the technology in. their private lives

  • Jordan: common challenge is the roll-out of a solution

    • train the trainer model doesn't work because of workload of key instructors

    • virtual training by the vendor helps in the beginning

  • Mary: professional development included in the tech service brings much value

  • Erfan/Berkeley: symbiotic relationships last the best

  • Jordan: feedback loop should be as direct as possible from the end-user, things get lost in translation via the home organisation

  • Erfan/Berkeley, when have things gone wrong?

    • making changes without informing

    • partnerships directly with instructors kills long-term development

    • "buying something and that it is" can be ok, if the problem is simple and acute

  • Jordan:

    • partner mentality is identifying the problem together (problem first)

    • sales mentality is ramming solutions down the universities' throat (solution first)

  • EDUCAUSE's point of view:

    • product discovery through events

    • discussion and research for companies

    • needs match-making service/portal could be good, a portal that would tell the companies what the universities need

  • inherited partnerships / transitions:

    • connect to the product team in the company, bring your own goals forward

    • personality and/or process, which is it -- identify the problems

    • don't hesitate to escalate

A question to Erfan/Berkeley: if you had a third actor in these partnerships, like a fasilitator of a kind, what would you like them to do?

    • compliance issues are a headache without a consortium / service integrator
    • match-making between universities and vendors to bring forward universities's needs

      • a portal for match-making: better preparation before the purchase

        • possibility to discuss and figure out the real need before buying

        • uni/vendor match-making

        • uni/uni match-making

        • transparency

Session Topic: Service Management

Playing a Symphony without an Orchestra? Implementing and Maintaining ITSM with Little to no Dedicated ITSM Staff

Wesleyan and Bentley University have implemented ITSM with tools designed for large markets. ITSM processes and the tools that support them assume the presence of roles that don't exist in most small to mid-size institutions.—Yet ITSM has value regardless of organization size. These two institutions will share their journeys and how they have effectively matured their organizations.

  • session about ITSM challenges from the point of view of small universities
    • ServiceNow, full-time SNow staff 0-1 per uni

Past: disparate

  • systems
  • communication
  • understanding of services

→ immature system

  • vision important, what ITSM means for our institution?
  • correcting processes to break down silos and processes, not IT systems
  • aiming for common understanding
  • Snow as a purpose-built space – complexity and size were daunting
  • Wesleyan: cmdb seen as a foundation for other development work
    • cmdb team was the core process team for SNow
  • Bentley: important players identified first, fitting the current processes to SNow, partner approach
    • distributed roles important, knowledge base was to shared as widely as possible

Where are we now?

  • internal adoption expansion

  • Bentley: still some "project-to-project" development silos, security group cooperation better

  • Wesleyan: from 2014 onwards no emails allowed for support requests, nowadays positive feedback is the norm

    • ITSM is now clearly institutionally beneficial, not just IT enhancing!
  • bringing new things (even non-IT things) under the umbrella of SNow (for tracking etc.)

ITSM Community Group (CG) Meeting

  • ITSM Community Group—more than just an email list! Join us for a time of community building and networking. Learn about the ways the CG can support your professional development as we share all the resources we have to offer and the exciting things planned for the future.


Resource for service management needs: https://bit.ly/ITSM-CG-Wiki

Join the Slack group at https://bit.ly/ITSM-CG-Slack

  • ESM = Enterprise SM, basically SM without the IT
    • next paradigm!

    • the customer (enduser for CSC) doesn't need to know who mounts a monitor on the wall

  • iPass: good tool for asset management

    • definitions of assets

    • how assets can be identified

    • people responsible of assets

    • sub-services, service requests

    • one portal app, universal portal also for EMS

      • different ticketing systems below the hood ok

    • start with the service catalogue

      • foundation for ticketing

  • people have to acknowledge, especially the leadership, that their work impacts others' work

    • only then it is possible to do service management

    • service owners, product owners, product managers all aboard

  • feedback loops important, of course

  • Question: what would your university want to hand over to a service integrator?
    • Answer: service catalogue standards (portfolio mg) and facilitating a consortium of sharing knowledge
      • about sharing knowledge between universities
        • different attributes in repositories of knowledge

        • start within the service management context, then expand

        • open sharing, but also demands IDM and access mg

        • FitSM processes: continual service improvement mg, change management, etc.

Session Topic: Learning Analytics

Continuous Course Improvement with Learning Analytics Dashboards

Learning analytics dashboards have helped our course designers refine and personalize suggestions while reviewing and designing courses. They've also surfaced opportunities to sustain design conversations and encourage continuous improvement. In this session, we'll share our dashboards, discuss the relationship building involved in their design, construction, and distribution, and share specifics regarding their successful use in the course review, design, implementation, and iteration process.

  • about analytics for supporting courses that repeat

  • aim: targeted conversation after the first implementation of the course
    • building trust with the faculty, listening (survey model might work as well)

    • aligning design work goals

    • demonstrating your expertise to the instructor

  • dashboards were created one dataset at a time, not by showing everything to the teacher at once

    • first present easy-to-understand data, teachers' questions guide the next steps

  • also non-pedagogic challenges appear in the data, e.g. grades for assignments are not on time, grades don't appear in the grade books etc.

marketing course:

  • fluctiation in 3, 4, 6

    • reason: thursday turn-ins for assignments

business course:

  • hybrid class, bad grades from outside of the class assignments

    • videos were not easily available

    • context for different assignments

math course:

  • grading happened only after the first test, so there was no feedback for students on the the first three quizzes

Dashboards are a good communicational tool -- a "soft" approach -- when discussing changes in teaching.

Sharing information more broadly to support the design of courses important.

  • Co-Pilot monitors data and and inteferes non-intrusively.

  • The process enables a light way to provide a way to reach out to teachers to need support.

  • More teachers can be reached (15-20%) , not just the 5% in development semesters.

  • Later recommendations can be shared for 100% of the teachers, design suggestions for continuous class development.

Reaching Students Where They Are: The Power of Data and Analytics

Today, the backbone of the college experience isn't solely the physical campus but also the digital environment. An institution must "reach learners where they are"—sensing and responding to students' needs with custom-tailored learning experiences. This panel session examines factors contributing to recent declining enrollment and graduation rates, and provides strategic guidance on using data and analytics to personalize the college experience to move away from a one-size-fits-all approach.

  • data and AI can be used as a voice for the students, so students do not have to realise their challenges themselves

  • Georgia State covid data:

    • no new equity gaps

    • graduation numbers up

    • BUT those that started studies during Covid have done really badly

      • non-passing up 40-50%

      • engagement down

      • national dip coming in graduation!

  • Georgia State: tracking students for years

    • March 2020: logging on to LMS as a metric

    • 30000 outreaches during that year

  • by capturing signs of academic inactivity, personal and technical problems surface

    • chatbots may discover crises via trigger words and connect the student with a human

  • tech requires us to understand our organisation better

  • even automatic "nudges" can have a large impact in making sure dipping students pass a course
  • away with the silos!

    • chatbots should answer all kinds of questions, not just e.g. one department's themes

    • tech has to be seamless throughout the campuses, ways of working have to change

    • technology should not make the call, but help the person do it --> more agency to instructors, not less

  • then technology can create trust between the faculty and students

    • (even automated) feedback makes it easier for students to resist negative factors

    • transparency relating to students' future -- where they are and where they are going

    • right major at the end of the first year is a great indicator for graduation on time

    • alumni positions, salary info etc. can and should be shared with beginning students, not later during the third year

  • what is coming next:
    • personalised education --> better relation of graduation
    • 70% better graduation rate through leveraging data during the last decade
    • personalised education also gaps equity gaps
  • transforming the learning experience to what "study" was 500 years ago  passion-based  demands doing the basic "knowledge pouring" faster --> more time to cultivate the passion of the learner

Other Breakout Sessions

Institutional Resilience: What it is and why higher Education needs it right now

The term “resilience” is being used a lot these days in connection with recovery from the pandemic and post-pandemic higher education. But exactly what is resilience, why is it important, and what do institutions need to do to become more resilient? In August, EDUCAUSE convened an expert panel of CIOs and CISOs, as well as risk, HR, and business officers, to define institutional resilience for higher education and identify the activities and resources that could help advance institutional knowledge and practice. Join us to learn more about resilience and how it applies to higher education.

It is really hard to see what is in the future?

  • World is different and difficult place, work, sosio economy, politics, climate change is effecting people

  • Higer ED is in burning platform, we must change or die
  • Small colleges have to do same things than large universiusities does
  • US (and Finland) birth rate is going down, means there will be enrolment issues
  • People doesn't value higher education
  • Pandemic and economy is affecting students

    • There have been a panel that has been defining educates institutional resilience and make recommendations for EDUCAUSE
    • institutions are responsible for institutional resilience 

  • What did the panel look up to make the definition, the work is not ready yet, it is in early stage
    • They look what was already released (ISO standard 22316:2017) and studies

  • Outcomes:
    • Restoration vs transformation

    • Point of resilience is not to go back to old, but to transform

Overcoming Market Challenges in Higher Education IT Organization Design and Operation

The higher education IT landscape is more complicated than ever before. IT budgets are shrinking, security threats are on the rise, and finding talent is increasingly difficult. In this session, we explore some field-tested strategies to position your technology organization for success despite these challenges.

Higher education challenges covered in this session:

Challenge 1. Enrollment decreasing

Challenge 2. Data breaches (multiple systems --> multiple potential weaknesses)

Challenge 3. Vendor prices are increasing

  • Cloud investment:

    • less threat surfaces

    • automation

    • find advocates among teachers

    • bring forward the successes and savings

  • Recruitment
    • consider non-IT people
    • emphasis on training programmes, higher retention that way too

  • Data tip: ETL options coming in a few years

Poster Sessions

Experiences implementing a Learning Management System through the lens of Digital Transformation

At its heart, digital transformation requires intentional shifts in culture, workforce, and technology, and it is the marriage of these shifts that provides the mechanism for achieving and sustaining desired transformations. Join us to hear how a midsize college successfully leveraged the EDUCAUSE Dx framework to transform the way it approaches teaching and learning through the selection and implementation of a new learning management platform in less than one year.

EDUCAUSE poster: https://www.canva.com/design/DAFMxasdCzQ/0vk6F6RlU3MZcyXodo0VRA/view?utm_content=DAFMxasdCzQ&utm_campaign=designshare&utm_medium=link2&utm_source=sharebutton

Ascending the Mountain of Digital Transformation: Views from Base Camp

The Big Ten Academic Alliance is on a digital transformation journey to expand access for our stakeholders' collaboration that reaches across more than 650,000 students and faculty at our institutions. We are striving to enhance diversity and equity among peer groups and major stakeholders alike. We must think differently and be agile, assess current resources, and creatively fill open positions with different skills and backgrounds supporting this transformation. The risk of inaction is far too great.

EDUCAUSE poster: https://btaa.org/docs/default-source/default-document-library/btaa-educause-dx-poster.pdf?sfvrsn=dcdab348_3

Accelerating Organizational Agility and IT Velocity with DevOps and Change-Enabled Release Teams

Research suggests organizations that adopt a DevOps culture with well-defined practices based on ITIL are more likely to have better outcomes versus organizations that implement DevOps alone. Many organizations struggle integrating DevOps and the ITIL Change Enablement practice. We will present a proposed circular model for the cultural and seamless integration of DevOps practices with Change Enablement by shifting the practice and process of change approval to the start of DevOps workflows.

EDUCAUSE article: https://www.educause.edu/working-groups/papers/2022/accelerating-organizational-agility-and-it-velocity-with-devops-and-change-enabled-release-teams

IT Service Foundations: Integrating Strategic Initiatives to Deliver Business Value

Is the delivery of your IT services built on a solid foundation of standard delivery with service insights and financial transparency? This poster session will highlight how enterprise architecture and strategic planning activities enabled collateral benefits through the alignment of the following strategic initiatives: IT financial management, hardware asset management, application of service standards, service catalog alignment, and adoption of service management roles.

Is Your Organization Ready for IAM? 10 Steps to a Successful IAM Implementation

More than 50% of IAM implementations are not successful, and even more do not deliver the promised value. A significant number of unsuccessful IAM implementations are because the organization was not "ready" for an IAM program. Our presentation provides the top 10 steps that Higher education organizations should take to make themselves ready for an IAM program and guarantee a successful implementation that delivers its promised value.

Ch-ch-ch-ch-changes, Turn and Face the Change: Maximizing LMS and Technology Support Transitions

Is your institution in the midst of making some major technology or technology support team changes? If so, join us to learn how a new instructional design and technology team at an R1 university successfully led their organization through an LMS transition in the middle of an academic year. This presentation will highlight how they came together as a new team and used transitions to develop unique training experiences and foster continued growth.

Maintaining Your Sanity and Your Survey Data: How to Build Clean and Functional Longitudinal Datasets

Building clean and functional longitudinal datasets from messy student survey data can seems like a daunting and time-consuming challenge, but there are ways to make it easier! In this demo, you'll learn tips and tricks for generating a spotless dataset by normalizing data at the point of collection, minimizing duplication when collecting multiple submissions per respondent, eliminating unwanted outliers, and transforming wide datasets to long formats for easier visualization and reporting.

Ethical Use of Student Data in Predictive Analytics and Interventions

Do you gather, use, or share quantitative or qualitative student data in predictive analytics or for targeted interventions? How do you ensure that data is being used in ways that provide benefit without doing harm? Human subjects' data protection goes beyond IT security. Come join this discussion about ethics, privacy concerns, and responsible, mindful use of students' personal data in higher education contexts, and help develop a list of best ethical practices for your next project.

Using the NIST Cybersecurity Framework for Information Security Program Strategic Planning

WTC Consulting, Inc. (WTC) worked with a university client’s Information Security Office to develop a five-year information security program strategic plan. WTC first assessed the client’s information security program utilizing the NIST Cybersecurity Framework (CSF), identifying areas of strength and gaps in maturity levels and associated risks. WTC worked with the client to develop 35 initiatives to improve maturity levels in targeted security controls and planned the implementation time frames and cost requirements associated with the initiatives. WTC projected improvements to the information security program maturity levels referencing the NIST CSF.

User Experience and Service Design Practice Community Group (CG)

Want to learn how other campuses are leveraging User Experience and Customer Experience techniques to measure value and align their IT services to meet customer needs? Are you looking for peers on your journey to becoming a service design practitioner? Come join our emerging community!

Design Thinking Infograph

EDUCAUSE Community Groups

We understand the power of leveraging community to solve your professional challenges. Stop by our poster session to learn about the personal and professional benefits of participating in EDUCAUSE Community Groups (CGs) and working groups.


  • No labels