As National University s chief digital officer, Alex Chimon leads both the digital and the data realms, with the strategic goal of improving student outcomes and the student experience. We talked about NU s key digital transformation goals, how the worrisome capabilities of artificial intelligence will impact Dx efforts, overcoming fear of change, and more.
The University of South Carolina Aiken recently found a creative way to staff a new security operations center and give students hands-on cybersecurity training at the same time. We spoke with Ernest Pringle, vice chancellor for IT and CIO at USC Aiken, about creating a student-led SOC, helping students put cybersecurity theory into practice, forging regional cybersecurity partnerships, and more.
With today s advancements in generative AI, the dream of ultra-personalized learning may not be far off from reality. We spoke with Dr. Kim Round, associate dean of the Western Governors University School of Education, about the potential of technologies like ChatGPT for learning, the need for AI literacy skills, why learning experience designers have a leg up on AI prompt engineering, and more.
The use of AI for writing and communication presents an inherent contradiction: Those who can best write with AI will be those who can best write without it, according to Mark Warschauer professor of education and informatics at the University of California, Irvine, and founder of UCI s Digital Learning Lab. We talked about the potential of AI for teaching and learning, overcoming faculty skepticism about AI tools, research questions that should be asked about AI in education, and more.
There’s more to zero trust than the buzzword that gets thrown around so often in the cybersecurity field. While higher education IT professionals often tend to view the approach as simply a way to secure remote access, zero trust can also build security resilience across the enterprise. At a time when cyber criminals are increasingly targeting the education sector, it’s more important than ever to build zero trust into your overall cybersecurity strategy.