“If it's collected, and if it's connected, then we must assume that it can and will be breached..”

Doug levin, edtech strategies  |  december 2017