All Events and Webinars

AI in Education Data Security

Education and Research
AI and Emerging Technology
Data Security and Privacy
Leadership and Resilience
Identity and Access
October 30, 2025
AI is creeping into every corner of education, often faster than anyone can properly control it. This session unpacks how that shift is expanding risk across student data, research IP, and identity systems, while governance struggles to keep up. It focuses on what’s actually happening in real environments and how institutions can manage AI-related risk without shutting down innovation or pretending the problem will solve itself.

In-House Specialists

Raluca Saceanu

Chief Executive Officer

External Speakers

Ronan Murphy

Chief Data Strategy Officer

Brian Johnson

Director Information Technology Security

Key Strategic Takeaways

Is AI Expanding Risk Faster Than Security Can Adapt in Education?

AI adoption in education is accelerating rapidly, increasing both the scale and complexity of cyber risk while governance frameworks struggle to keep pace. As AI becomes embedded in learning, research, and administration, it introduces new exposure points across systems and workflows. Organisations must treat AI adoption as a security event, ensuring governance, visibility, and controls evolve in parallel with deployment.

Is Sensitive Student Data Becoming More Exposed and Distributed?

AI systems are driving increased use and sharing of highly sensitive data, including student records, behavioural insights, and academic performance data. These datasets are often retained long-term and accessed across multiple platforms, increasing the risk of overexposure and misuse. Protecting this data requires tighter access controls, clear data ownership, and a disciplined approach to minimising unnecessary data sharing.

Do Privacy Risks Stem From Lack of Visibility and Not Just Threat Actors?

Many AI-related privacy risks emerge not from malicious activity, but from unclear data usage, hidden processing, and limited oversight of how AI systems operate. Institutions often lack a full understanding of how data is being used once it enters AI-driven workflows. Reinforcing principles like data minimisation, consent, and purpose limitation is essential to maintaining trust and regulatory alignment.

Is Identity and Access Complexity Increasing With AI Integration?

AI introduces new layers of identity risk through service accounts, APIs, and automated access mechanisms that often operate with broad permissions. In already complex education environments, this significantly expands the attack surface for credential abuse and lateral movement. Strong identity governance, least-privilege access, and continuous monitoring are critical to securing both human and machine identities.

Is Governance and Visibility the Foundation of AI Risk Management?

AI governance is often fragmented across departments, leading to inconsistent policies, delayed decisions, and weak accountability. Without clear ownership and visibility into AI usage, organisations struggle to assess and manage risk effectively. Leaders must establish centralised governance, map AI usage and data flows, and implement monitoring to detect misuse early while aligning AI initiatives with existing risk and compliance frameworks.

Is AI Expanding Risk Faster Than Security Can Adapt in Education?
Is Sensitive Student Data Becoming More Exposed and Distributed?
Do Privacy Risks Stem From Lack of Visibility and Not Just Threat Actors?
Is Identity and Access Complexity Increasing With AI Integration?
Is Governance and Visibility the Foundation of AI Risk Management?
Watch More
AI and Cybersecurity

Seasonal Cybersecurity Risks for Transport Webinar

Smarttech247 leaders discuss transportation cybersecurity, focusing on OT security, digital twins, evolving threats, third-party risk, and resilience.

HSE Ransomware Attack and the Future of Cybersecurity in Ireland

Cybersecurity leaders discuss HSE ransomware attack and a path forward for Ireland, focusing on resilience, regulation, maturity models, and public awareness

Ransomware Cyber Attack Simulation Webinar

Attack simulation showing a multi-stage ransomware campaign and how Cybereason detects, correlates, and responds to fileless and living-off-the-land techniques.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365