transcript

transcript  MCAGP October 2022 Webinar Recording

00:00:00:01 - 00:00:27:23
Speaker 1
Thank you for joining us. We're very excited that so many of you could join the session with regards to the Municipal Cybersecurity Awareness Grant program. I'm Susan Noyce, the acting director for the Office of Municipal Technology. We also have Nick Gonzalez, who's our municipal cybersecurity coordinator who oversees much of the program and does a lot of the communication and backend work as it relates to the grants.

00:00:28:03 - 00:01:00:10
Speaker 1
We also have Ken Wedge, who is a municipal and school I.T. manager. We have Rob DiLeo, who's also part of our team as municipal partnerships. And there is Ethan Sam, who's one of our analysts on the team as well. So thank you for joining us again. So we're going to get started and go over the program. What I'm going to do is just ask that you stay muted until the end and we hope to be able to take questions from you directly at the end.

00:01:01:09 - 00:01:29:07
Speaker 1
If you have your cell phone on, if you just wouldn't mind putting it on silent. And it looks like most of you did a great job as far as renaming yourself. So we appreciate that. So we're going to get started. Do you want to go to the next slide for me, Nick? So our agenda for today is to go over the 2023 application timeline, to go over the program and updates for some of you who may be part of this year's program.

00:01:30:04 - 00:01:52:26
Speaker 1
And, of course, you know, some of you that were not part of this year's program, what the program looks like, what the benefits of the training are, what the response abilities are of EOTSS as the administration, as well as yourselves, as a representative, are, or would be representative for your organization. And any questions and next steps. Okay. So who we serve.

00:01:52:27 - 00:02:21:00
Speaker 1
So for those of you who don't know, perhaps some of you received an email through a blast that we sent out with regard to the Security grant. There are others of you who are very familiar with our office, but we are here to serve municipality and school districts across the Commonwealth. We provide a lot of information about and administer technology grants available to local government and whether it be through iOS such as this grant and I.T. health checks.

00:02:21:12 - 00:03:07:25
Speaker 1
And there's also the Google Glass grants that we help facilitate for the community. Compact cabinet. We create opportunities for regional, in-person and virtual collaboration by working with our regional I.T. directors in the particular regions and coordinate monthly sessions or quarterly sessions to network and collaborate with regard to challenges and questions. We also provide technical assistance on community technology initiatives, and we do a lot of that by, you know, being part of those regional I.T. meetings and hearing what you're saying and just really trying to understand and put some of the pieces together to understand what might good and what are your initiatives and where we might be able to help, as well as promoting state

00:03:07:25 - 00:03:35:15
Speaker 1
resource that can help improve local government operations. So that's kind of a quick picture about who we are and what we do. So for right now, if you could flip back for just a minute now, I'm just going to go over our current program at a glance. So right now for the 2020 program, we have more than 200 organizations that are participating, which equates to about 35,000 individuals that are participating in the program.

00:03:36:09 - 00:04:07:02
Speaker 1
We have procured a larger capacity for the 2023 grant and the applications will be accepted on a rolling basis until all seats are filled or until December 31st, whichever comes first. Okay. So a little overview about the program tracks. So we are again offering three program tracks this year. There will be our year long, which is our most popular training.

00:04:07:10 - 00:04:37:00
Speaker 1
It goes from January to December. There will be four training assignments within each training assignment. There are four training modules. And there will also be eight fishing campaigns that are sent throughout our three year from January to December to measure progress and see see what your your users have learned and whether or not they actually engage with the fishing campaign that comes out.

00:04:38:09 - 00:04:59:17
Speaker 1
We also have an abbreviated option one, which is maybe familiar to some of you, but this was a shortened track that we offered this year. It ran from January to May. It has two training assignments, and those two training assignments will contain four training modules, and they will map to the ones that will be part of the yearlong track.

00:04:59:28 - 00:05:26:10
Speaker 1
And you will receive four fishing campaigns. So it's kind of just sliced in half. And we are offering the abbreviated as an option two as well. So for those of you whereby the timing of January two may mean not work, we are offering the abbreviated option from September to December. The program looks the same again. Content will be a little bit different to training, assignments or modules, each with four fishing campaigns.

00:05:26:16 - 00:05:49:20
Speaker 2
Hi folks, Nick Gonzolas here. I am one of the leads for this program, for the MCAP and we talked a little bit about, you know, some of the things that we're doing on our end for the 2023 round. And, you know, what are some of the benefits of cybersecurity training? So participating organizations benefit from up to date cybersecurity training and are supported by the Office of Municipal and School Technology.

00:05:49:28 - 00:06:17:23
Speaker 2
That's us. That's our team. We're part of EOTSS. And so this is what we do. When you partner with us, we administer the trade, the training program, free of, you know, if your organization is accepted. Again, there are this program three, we host quarterly threat briefings with organization. So once a quarter, we have invited all the local coordinators and signatories to come and listen to some of the latest about what's happening on the Massachusetts Commonwealth.

00:06:18:17 - 00:06:44:19
Speaker 2
I'm sorry about the Commonwealth's threats and some of the threats that are out there and some of the things that, you know, up to date issues and cybersecurity and what everybody should know in terms of infrastructure and what's happening with different organizations throughout the state. We also said we're going to report cards. We were I'm sorry, you send four cards that measured that show the progress of the training for for your particular organization.

00:06:45:22 - 00:07:08:14
Speaker 2
And we send a weekly newsletter as well with best practices and program updates. And what we would like you to do is, you know, the reason why we're doing this is we want to do to show how important cybersecurity is. Now for organizations and how it's such a you know, it's an integral part of running the day to day running of organizations.

00:07:08:14 - 00:07:38:01
Speaker 2
So we'd like you to stay aware of growing cybersecurity incidents and trends in local government education, transportation and utility organizations. We'd like to improve the cybersecurity posture of your workforce, and we want you to demonstrate cybersecurity as cybersecurity as an organizational priority. So to achieve success in this awareness training organizations need to demonstrate, buy in and commit what we call local coordinator to oversee the program.

00:07:38:05 - 00:07:59:27
Speaker 2
He is your point person to us, and we're the and we're the point person to our training platform. And so your local coordinator is going to handle all the business on your end. And if there are any concerns, you know, and then we're your little coordinate is going to communicate with us and he or she is going to be the main go between between your organization of users and us.

00:08:00:04 - 00:08:26:24
Speaker 2
So we need a little coordinator to do is enough. The program obviously to articulate its importance and set expectations. We need a coordinator to constantly motivate, consistently motivate, encourage staff participation in the program and completion to ensure we also need a coordinator to ensure safe listing and user and user lists are created and maintained. So again, these user lists are to add people to take it way to change things and rosters and so on and so forth.

00:08:27:28 - 00:09:05:02
Speaker 2
We'd like them to promote collaboration between leadership and look at themselves, obviously to reinforce the train. So really building that bridge between coordinator and administration, we'd like to the little corner to review and share phishing campaign results with the organization for positive reinforcement and to highlight the common areas. We also like them to consider recognition for successful participation with this can come in many forms is obviously left up to the coordinator, but we've seen many programs being put in place to encourage participation, completion of the training.

00:09:05:02 - 00:09:33:10
Speaker 2
We all seek to ensure communication of expectations. And we are obviously at the last, but not at all. Not. Not at all. I'm sorry. And lastly, we'd like yes, we'd like the local coordinators to communicate with us here at the EOTSS. Again, that the little coordinator is going to be the main go between between your organization's users and us.

00:09:33:10 - 00:10:00:25
Speaker 1
And we do. Just to interject here a little bit, we will give you some support tools to help you kind of announce it to your organization, give you some suggestions with regard to how to make your program successful. We encourage you to engage your leadership, to have them articulate how important cybersecurity training is to the organization. And of course, we're here to support you along the way.

00:10:00:25 - 00:10:09:06
Speaker 1
So if you have any questions or things that come up, you know, certainly we're here to support you in making sure that this program is a success.

00:10:09:28 - 00:10:32:11
Speaker 2
So so to bring it down a little bit more and to add to what Susan they were just saying, you know, here's what it looks like for the low point in terms of like the day to day, the coordinator, informed staff of the training program and its importance and notifies the staff, you know, the users of upcoming assignments and assessments.

00:10:32:11 - 00:10:58:16
Speaker 2
Obviously, the little corner communicates with the end users and coordinates with us. So also we'd like to coordinate with department heads, the leadership to bring out the right information and content around department level, department level, pretty efficient and encourage departments with low participate rates to become better engaged. Obviously, that motivation piece is really important. We'd also like coordinators to give periodic updates.

00:11:00:01 - 00:11:26:24
Speaker 2
Obviously with staff to maintain engagement and promote engagement. Celebrate your successes as an organization in terms of organization completion or official results and phishing campaigns, statistics, so on and so forth, to share relevant cybersecurity topics and stuff that you might learn in our newsletter or from the press briefings. That's always very important to share that information with your users and again, recognize that participation and progress.

00:11:27:07 - 00:12:00:00
Speaker 2
And we encourage you to use existing communication channels and even in a build your own as well, especially if you're a municipality to, you know, have your administration involved, mayor involved this like board manager and, you know, use internal newsletters to communicate your training completions and different different parts of this effort, the security awareness program and obviously to have staff as well.

00:12:00:00 - 00:12:23:05
Speaker 2
So let's get into train schedules now. This is what the year long training track schedule looks like. So in January, we're going to give you your initial cyber strength assessment. That's a diagnostic in terms of how what your cyber posture is as of that date. And then in February, we have one that gets released. In April, we have assignment to June, we have assignment three.

00:12:23:19 - 00:12:45:01
Speaker 2
And in September we have assignment four. We have and after that, we have our final cyber strike assessment, which is another assessment to see how far you've come from the very beginning and your organization's during the year. We have eight phishing campaigns or phishing simulations. These are fantastic campaigns that we actually we sent out phishing emails to your users.

00:12:45:01 - 00:13:06:02
Speaker 2
And if they click, we get statistics and we actually give you your phishing report. So this happens four times from February to May and four time from September, four times the monthly from September to December. So again, February, March, April, May each month, year one phishing simulation in September, October, November, December, each month gets one fish's phishing report.

00:13:06:13 - 00:13:33:27
Speaker 2
And then we report to you weekly. In terms of how far how far are your I'm sorry, we report weekly the completion rates of your users and you'll get a spreadsheet every week that shows just how far they've come, who completed, who started and who hasn't. So that's where the year long training track for the abbreviated option one training track we have in January.

00:13:33:27 - 00:13:54:26
Speaker 2
We have the initial cyber strength assessment. We have the final one that goes through February and assignment two that goes out in April. There is no Assignment three or something for delegate and then your users will get their final cyber strength assessment. In May. There will be four phishing simulations that happen from from February to me again, one in February, one in March, one April when in May.

00:13:55:07 - 00:14:25:24
Speaker 2
And you'll be giving weekly reporting stats and information as well for the abbreviated option to train draft schedule. You have a it starts this September with your initial cyber secure settlement and then October you'll have the release of assignment three. In November you'll have the release of Assignment four. In December, you'll have the final cyber strength assessment that will be for phishing campaigns or phishing simulations done throughout from from September to December.

00:14:26:02 - 00:14:49:16
Speaker 2
Again, one in September, one October one in November. And when December and there will be weekly reporting giving as well during this training track. So with that, I'm going to stop right there and field any questions and I will be here. Are there any questions that need to be addressed, anything in a chat or anybody would like? Yep.

00:14:49:19 - 00:15:22:24
Speaker 2
So the first question I got, how long does it take to complete each assignment? I'll take it from here, if that's okay. Is everybody... Can everybody hear me? Am I still on? Did I get a thumbs up? You're good. Okay, great. So I'm going to take it from here.

00:15:23:03 - 00:15:45:06
Speaker 2
James. So, James Ryan, we have. How long does it take to complete each assignment? Each assignment. Okay, so that's for within. They're four assignments, right? And for each of the shortened tracks, you have to within each assignment there are four modules, each module takes between is between ten and 15 minutes long. So each assignment is about an hour.

00:15:45:22 - 00:16:02:29
Speaker 2
So if you're on the year long track, it's going to take you between four and probably four and a half, 5 hours for the entire training. Again, for assignments, each segment is roughly about an hour long and then you have the two assessments.

00:16:02:29 - 00:16:35:21
Speaker 1
And maybe to clarify, we understand that not everybody can necessarily finish the assignment in or module is all in one sitting. So it does it can be stopped and then it can be picked up where you left off, does that answer the question? Hopefully, anybody who has or is currently part of our program, I'm seeing questions about do we need to apply again?

00:16:35:21 - 00:17:06:00
Speaker 1
Yes, you do. We assess this every year. You know, it's it's a program that we determine whether or not we're able to offer every year. So there is an application problem and I'm sorry, application form annually and those are currently available on our website. Okay. Does everyone complete the assignment or just the coordinator? So I'll let you take that one.


00:17:09:04 - 00:17:38:06
Speaker 2
Okay. I'm not quite sure about the question. Does everyone complete the assignment or just everyone completes assignment and the coordinator does as well? If that's the question, it's the assignment that all of the training, if you know, when you join the program, you give us a roster of all the users here in your organization and then where you obviously choose the training track and then your users are registered and they're given both assignments or for the assignments, depending on which track you're on.

00:17:38:23 - 00:17:52:09
Speaker 2
Yes, it's up to them to complete the assignments. The coordinator again should take part in it because obviously they're going to use the use. They're going to be doing the same training. So, yes, a coordinator does it as well.

00:17:53:28 - 00:18:23:05
Speaker 1
And certainly you want to you want to experience it also and see what kind of training is being delivered. And you're probably going to need to field questions. So I'm sure at first, you know, some folks are going to be a little unclear. So, you know, it's better for you to participate in the training as well to make sure you can answer appropriately as far as feedback on who may have clicked when they should have or is it just a departmental report won't talk about how that sliced and diced?

00:18:23:05 - 00:18:25:11
Speaker 2
Sure, I'm just not quite sure. Can you repeat the question?

00:18:25:12 - 00:18:47:21
Speaker 1
Is it do we get feedback as to who may have clicked when they should have, or is it just a department report? So I'm thinking maybe that was a shouldn't have. So maybe with the phishing campaign, you, you know, if they clicked on something, do they know what users have engaged in that patient campaign and what happens.

00:18:48:22 - 00:18:51:28
Speaker 2
To clarify what Susan just said too, Each phishing campaign has

00:18:51:28 - 00:18:52:19
Speaker 1
Campaign.

00:18:52:21 - 00:18:55:04
Speaker 2
Has a potential email or phishing campaign that.

00:18:55:04 - 00:18:55:17
Speaker 1
Goes in.

00:18:55:27 - 00:19:16:22
Speaker 2
And there's a link within it. So what we don't want you to do is click and yes, when the phishing campaign runs and usually runs between a week and nine days when that finishes, yes, every local coordinator will get a breakdown of who clicked and who didn't clicked and who opened it as well. So that yes, you'll definitely get reports on that.

00:19:16:22 - 00:19:46:04
Speaker 1
Okay. I'm taking a question from Joseph Young and he thought of creating a one time module. I would like something for onboarding new employees. So it's not a practice we plan on getting into, really. We encourage our security training to happen all year long because the threat landscape is changing all year long. And we want to make sure that your users and everybody is thinking about cyber security awareness year long.

00:19:46:04 - 00:20:13:15
Speaker 1
So we're finding that a lot of folks are making the cybersecurity training part of the onboarding process. So as they're onboarded, they kind of set the expectations that they will need to participate in the cybersecurity training and then you just get them registered as a user, they get an email and then they get started in the training.

00:20:13:15 - 00:20:35:29
Speaker 2
And there's a question from Mary Beth Quinn. Can you give an example of an assignment? We don't have an online platform, so that's something we can go in and show you a portion of it. But we'd be happy to. If you leave your email address, I can send you some screenshots of what it might look like. Again, each assignment takes about an hour within each time, and our four modules.

00:20:35:29 - 00:21:03:10
Speaker 1
And we can just include that as part of maybe put it at the end of the presentation and include that for folks any sort of kind of one time module, do I need to sign everybody up on the grant application? You just need to submit the application. The application form itself asks for the personal contact information of the person filling out the application.

00:21:03:10 - 00:21:42:18
Speaker 1
It's going to ask for grant signatory so somebody who has the authority to sign that grant application. And then we're going to ask you to identify a local coordinator. And there's going to be some a set of like a handful of questions with regard to your environment as it relates to, for instance, domains and do have access to safe listing and your network and things like that to kind of make sure that you meet some of the minimum requirements for the grant and the grant signatory and the local coordinator to be the same person and what is the signatories responsibility.

00:21:43:28 - 00:22:27:09
Speaker 1
So yes, you can be both the grant sticking point and the auditor. What is the secretary's responsibility? Typically, we we defer to the signatories kind of being the leader for the organization. So this is somebody that the LC would lean on. And if you're one on one in the same, I'm really help with the messaging with regard to cybersecurity training for the organization and making for that other leadership in the organization understands that you have engaged in this program, you're getting users trained, make sure that they are aware of it, they support it.

00:22:27:29 - 00:23:02:10
Speaker 1
And it's also nice to kind of acknowledge that. And, you know, if you're having staff meetings, you know, with regard to a regular schedule, you can talk about this or bring it up and get some feedback and make sure people are engaged in it. And also, you know, it might help to work with identifying ideas for participation. There's a lot of organizations that just try and get really creative with little prizes or acknowledgments on on that one.

00:23:02:10 - 00:23:33:02
Speaker 1
Or I want to say the completion rate. So, you know, if you have a department signed out and say you have five departments off, that they set up a little competitiveness. And, you know, the first department to complete assignment one gets, you know, we'll get a pizza and drinks for their department. So they just really try and make it a little competitive, make it engaging and have an opportunity for the individuals to talk about it among among themselves and a group as well.

00:23:33:02 - 00:23:51:03
Speaker 1
I will throw that link in the chat for the application. Am I missing any questions here? It's going to go grab the link.

00:23:51:03 - 00:24:11:11
Speaker 2
So Heather, to what I just to follow up on this question, if it hasn't been answered already, I was going to add to it. So when you do do complete the application, eventually it's going to come to us and we're going to decide whether, you know, obviously decision's going to be made about your organization and then if you're accepted into the grant, into the program, that's when you wait.

00:24:11:18 - 00:24:29:10
Speaker 2
You know, there's there's an onboarding process in terms of getting your users into our system, and that will be shared with you a little later on. But yeah, no, you do not have to provide everybody you don't have to have everybody on the signup in the initial application. Oh, you're welcome, Heather.

00:24:35:04 - 00:24:43:18
Speaker 1
And I just threw the link to the application in the chat.

00:24:43:18 - 00:24:45:03
Speaker 2
Folks. Are there any other questions?

00:24:45:03 - 00:24:52:28
Speaker 1
How much this is your time to kind of ask anything that you're curious about or want to get clarification on?

00:24:54:00 - 00:25:03:25
Speaker 2
So John Tomas de Tomaso has a question. Susan, these only take it, or did you think I wasn't happy? Do I? I'm I'm actually kind of.

00:25:04:13 - 00:25:06:02
Speaker 1
Yeah, go ahead. I can follow it.

00:25:06:27 - 00:25:22:21
Speaker 2
Sure. Hi, John. So the content is going to be different for next year. Again, the threat keeps always changing, so there's always going to be something new. But there are the basics that are going to be involved. And are they going to be the same modules? No, they're not. They're going to be different. They will obviously. Again, the basics will be covered.

00:25:22:21 - 00:25:36:06
Speaker 2
But again, but to repeat this as well, you know, the threat keeps always changing. So we always compensate for that. We always take into consideration when we formulate our assignments. So, yes, if the targeting is going to be different.

00:25:50:13 - 00:26:41:03
Speaker 1
And we do try and you know, we have a blend of organizations that have participated before. You know, this would be their fourth year. They get accepted into the grant program. You know, we have some that are new this year, so we really try and be respectful to the audience that we are working with. So, you know, there may seem like training topics that are repetitive, but they're really nice refreshers on items that everybody needs to be reminded of because it's very easy to have an oversight on something and just click on something accidentally or, you know, whatever it may be or there might be something a little bit new, you know, that's happening, you

00:26:41:03 - 00:27:08:21
Speaker 1
know, as it relates to any phishing campaigns or password stuff. So, you know, we try and integrate that stuff as much as we can. So you may find, you know, a subject, it should be similar. But I think the learning component will be a little bit different. Can the local coordinator get a stipend for the time they put in on this?

00:27:08:21 - 00:27:45:01
Speaker 1
Well, that's really up to your leadership. We're administering the grant. We're offering the grant to municipalities. That's really up to you and your organization with regard to any compensation. That's not something we get into when we receive a list of emails or domains to white lists of the fishing campaign. Doesn't get caught in quarantine. Absolutely. Easily. Yes, that will be all part of the initial training session that we have with the local coordinators and the leadership.

00:27:45:21 - 00:28:27:08
Speaker 1
And we give you time to do that. And we also do testing along the way for each of the fishing campaigns to make sure that they are making it through your network. And we work with the agencies on that. Local coordinators want to make sure we're not missing anything here as the LC need to be. The i.t coordinator are have extensive i.t knowledge.

00:28:27:08 - 00:29:07:29
Speaker 1
The LC doesn't need need to be the i.t coordinator or have extensive i.t knowledge, but you do need to have access to a person or organization that does that can take care of the safe listing. For example, or handle any networking related questions that, you know, anything that may get stuck in your network that we need to have addressed, you know, somebody who will be able to put together a user list, the LC may be able to do that, but they may need help from the IT person because you want to make sure you're capturing everybody in your domains.

00:29:08:13 - 00:29:40:03
Speaker 1
You want to make sure you're providing us all the domains for the users that you are, are would like to include in the training. So as long as you have access to someone who oversees your i.t, if you are not the person, it should work fine. And that's you know, we do see that frequently. It's not uncommon. For buy-in what percentage of employees of an organization need to participate?

00:29:41:26 - 00:30:18:29
Speaker 1
You know the ideal situation would be for everybody. Each employee obviously needs to have a network specific email assigned to your organization. So as long as they have that, we encourage as many employees in your organization to participate as possible. You know, I guess it's really about, you know, your leadership, their commitment to cybersecurity, their commitment to ensuring that the staff is trained.

00:30:18:29 - 00:30:54:00
Speaker 1
So, I mean, that's all a big part of it, and that's part of the consideration. Are there any penalties of only a certain percentage of the people we signed up to complete the whole training? No, there's not any penalties. I mean, it's really again, what expectations are you setting with your employees? So, you know, many organizations when they sign up, obviously, you have our the timeline of when the training is delivered and is being executed throughout either of the abbreviated tracks or the year long tracks.

00:30:54:00 - 00:31:18:18
Speaker 1
And many will say, you know, we would like to have, you know, your assignment one done by such and such a date. We would like to have your assignment, too, done by such and such a date or you know, they say as long as they have the training all done by the end of the year and they've completed both of their initial and final assessments, they're satisfied with that.

00:31:18:18 - 00:31:38:21
Speaker 1
So you really just need to kind of figure out what's going to work for your organization. That's hard for us to do because we're not obviously inserted in there. We don't understand specifically how things are organized and set up. So that's really something that you need to make a determination on yourself through your organization.

00:31:39:01 - 00:31:57:04
Speaker 2
So the question by Steve, so with much of the PD time already taken up by required programing skills, do you have any suggestions for getting buy in from staff for what might become a voluntary program? Does the state have any feedback on whether this could count towards PDP points? Have you taken this one? If you want to jump on it

00:31:58:13 - 00:32:25:03
Speaker 1
You know, I, I guess, you know, generally speaking, I, we can certainly share with you at the very beginning of the program that was a huge challenge for schools. We've seen that objection mellow a bit. Now that we're in our or going into our fourth year, some of them are getting more creative with how they are getting these teachers and administration trained.

00:32:25:17 - 00:32:53:17
Speaker 1
Some are using PD days, the abbreviate track are very popular with schools because they can do, you know, get a good chunk of training. But it's less of a time commitment as far as points. That's not something that we really get into. But we do make sure that we communicate with DESE with regard to the training and the program.

00:32:53:17 - 00:33:22:09
Speaker 1
So, you know, it's really, I think something that you need to work with organized organizationally back in. And we are seeing, you know, of the applications actually we have already seen this year. We're seeing a lot more schools join in for the training, which I was a bit surprised, honestly, to see that many so quickly embracing it and signing up for the grant.

00:33:22:09 - 00:33:28:11
Speaker 1
So we understand the question and the challenge. I don't know if you want to add anything to that Nick.

00:33:29:14 - 00:33:49:14
Speaker 2
Yeah, you know, coming from a school system myself, you know, having each school district handle it differently, each school handle it differently, it's not something that we can do from our side. Yeah, we've seen you know, we've seen school districts work with unions. We see school districts utilize PD time, PD days and also PDP points as well.

00:33:49:14 - 00:34:00:06
Speaker 2
So again, it's it's really left up to the discretion of the district. Unfortunately, we don't have we don't steered in any way that way. But again, you know, we've seen many creative strategies.

00:34:03:12 - 00:34:16:01
Speaker 1
For those still left in the audience to have you participated in a cybersecurity awareness program already, or is this something that would be new to your organization?

00:34:18:18 - 00:34:49:12
Speaker 1
Glad to hear that, Mike. We're just going to hang out here and in the event that somebody else shows up late. So you are welcome to drop off or. You're welcome to hang in, whichever works for you. Well, I guess I'm going to call it guys. It's 1257, so I think we'll just stop the meeting. I'm going to stop the recording cam now.

00:34:50:11 - 00:34:51:00
Speaker 1
Thank you.