“If it's collected, and if it's connected, then we must assume that it can and will be breached..”

Doug Levin, EdTech Strategies  |  December 2017