First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.

Slides:



Advertisements
Similar presentations
Starting an ESC Chapter in Your State. Energy Services Coalition Mission To promote the benefits of, provide education on, and serve as an advocate for.
Advertisements

Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
George A. Ramirez July 26, To provide information on how to coordinate, plan, and staff a Chapter Conference. What we will cover:  Pre-Conference.
Unit 16: Outreach and Resources Unit Introduction and Overview Unit objective:  To identify existing outreach programs related to COOP and opportunities.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Maximize Your “Trends in Recruiting” Experience Tips for New Members and First Time Attendees Presented by: Midwest ACE Membership Committee.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
CSCMP ROUNDTABLES One CSCMP. History 1963 Established as National Council of Physical Distribution Management 1968 Roundtables Established 1985 Council.
BCNET Security Policies Jens Haeusser Information Security Officer, UBC and Chair, Security Working Group, BCNET Internet2 Joint Techs Vancouver, BC July.
2012 National PBIS Leadership Forum Hyatt Regency O’Hare Rosemont Illinois October 18-19th 2012 School-wide PBIS: A Framework for Effective Teaching &
Texas Parent to Parent Regional Marketing Partners Training.
Laurie Wieder President Prince William Regional Chamber of Commerce.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Prevention and Remediation in Selected Industrial Sectors, June 2005, Ottawa NATO’s Scientific Programme Thomas Strassburger Ottawa, Canada NATO’s.
Before you are seated, please look inside the back of your nametag for a slip of colored paper. Please seat yourself at the table bearing a sheet of paper.
CEBP Learning Institute Fall 2009 Evaluation Report A collaborative Partnership between Indiana Department of Corrections & Indiana University November.
Serving the Campus Sustainability Community Association for the Advancement of Sustainability in Higher Education.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Prevent Information and Overview Updated October 2013, Education Office.
OCTOBER 18-21, 2009 RED ROCK HOTEL LAS VEGAS, NEVADA Creating Your Best Experience at The Market Research Event.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
August 8, Students Center for Innovations Wednesday August 14 th, 2006.
Program Committee Chair Briefing. Conference Program Housekeeping Items and Deadlines Action and Information Items Evaluation of PLN.
Shared Assessment Committees Update ©2012 The Shared Assessments Program. All Rights Reserved.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
1 Tallinn, 7 June 2010 – roundtable with the HEREs EU support to HIGHER EDUCATION REFORM EXPERTS.
EDUCAUSE/Internet2 Computer & Network Security Task Force Update Dan Updegrove VP for IT, University of Texas at Austin Task Force Co-chair Tempe,
Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council.
Welcome First-Time Attendees! Tuesday, February 16, :00 A.M – 8:45 A.M. Hyatt Regency Monterey Hotel and Spa.
PTA PROGRAMS ENRICH YOUR SCHOOL BY IMPLEMENTING CREATIVE AND EFFECTIVE PROGRAMS Peninsula District PTA Leadership Training Pam Croom, Hampton Council President.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
Volunteering and You: Getting Involved in ACUI Joe Gutowski Case Western Reserve University ACUI Volunteer Development Coordinator.
What is the Prevent Duty? Part of the 2015 Counter Terrorism and Security Act. A duty to protect ‘people from being drawn into terrorism’ by “extremists.”
COLLABORATE 13- OAUG FORUM OAUG Speaker Orientation March 19 th at 3:00 PM March 21 st at 11:00 AM.
Resents p Reverse Trade Show Events Maryland Public Purchasing Association, Inc. “Building Bridges” October 16, 2007 “Opportunity Knocks” November 10,
The Evolving IG Lead Role Phil Walker IGA. The IG Lead Role I am constantly surprised by the breadth and variety of work undertaken by IG Leads, but there.
ALPA Information Technology Conference November 16-18, 2005.
SPECIAL EVENT& CONFERENCE PLANNING Karen Goodlad, HMGT 1101 F12.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Welcome to the 2012 EDUCAUSE West/Southwest Regional Conference
EDUCAUSE/Internet2 Computer & Network Security Task Force
Welcome to the 2013 EDUCAUSE Southeast Regional Conference Elevate Your Game: Content, Networking, and Next Steps. How to Make the Most of Your Conference.
Higher Education Information Security Council
Welcome to Seattle & Security 2016!
January 29th, :30PM 1106 Mechanical Engineering
Welcome to the 2012 EDUCAUSE Midwest Regional Conference
Overview of the Information Security Guide: Leveraging the Knowledge and Skills of Your Colleagues Cedric Bennett, Emeritus Director, Information Security.
Welcome to the 2012 EDUCAUSE Mid-Atlantic Regional Conference
Information Technology
Program Committee Officer Briefing
Student Data & Privacy.
Presentation transcript:

First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University of Notre Dame

Navigating the Conference Hard Copy Program in your Tote Bag Presentation Slides on Conference Website Most Sessions are on the Ballroom Level Some Sessions and Room on 3 rd Floor Ask Questions of staff at Registration Desk Look for EDUCAUSE staff (maroon ribbon) Look for Program Committee (white ribbon) Look for Security Task Force Members (yellow ribbon)

Conference Program Overview Pre- and Post-Conference Seminars Birds-of-a-Feather Sessions  Affinity Groups (next)  Topical Interests (tomorrow evening) Opening and Closing Keynote Speakers  Gregory Garcia, Assistant Secretary DHS  Rebecca Whitener, Former CRO EDS 6 Concurrent Track Sessions Corporate Displays (AM & PM Break) Lunch Roundtable Discussions

6 Concurrent Tracks 1.Forensics and Incident Handling 2.Policy, Law, and Compliance 3.Risk Assessment 4.Security Management and Operations 5.Technology Solutions 6.Vendors and Partners of IT Products and Services

Corporate Participation Presentation Proposals as part of Track 6: Vendors & Partners of IT Products & Services Corporate Displays  15 During AM/PM Breaks Tomorrow Corporate Sponsorship  Food (breakfast, lunch, breaks, receptions)  Technology (computers, projectors, etc.)  Supplies (tote bags, notepads, etc.) What to Expect – Corporate Contacts

Birds-of-a-Feather Sessions Affinity Groups (Next!) Washington A & B (Ballroom Level)  California State University/University of California Campuses  CIC Security WG  Commuter and 2-Year  Ivy-Plus Security Group  Research Universities  Small Colleges  VA SCAN  Other Groups Topical (Tomorrow at 8:30 p.m.) Regency ABCD Ballroom  Creating a National Cyber Security Awareness Campaign for Higher Ed  Information Security Peer Review Programs  Research and Education Networking Information Sharing and Analysis Center (REN-ISAC)  SANS-EDU Partnership  Security Operation Center (SOC)  Other Topics

Networking at the Conference Well, there’s wireless access by using SSID: EDUCAUSEAIR There are also Computer kiosks in Lincoln (Third Floor) But, Human Networking is MOST IMPORTANT  Registrations List Online – by name, institution, state, or dynamic search terms Copies available at registration desk  Food: Breakfasts, Breaks, Lunch, and Reception  Group Dinners – Sign Up at Bulletin Board in Lobby  Birds-of-a-Feather Sessions  Before/After Sessions

Making the Most of It 1.Review the program with colleagues to decide which sessions to cover. 2.Plan how you will disseminate new information when you return. 3.Attend sessions that will introduce you to new ideas rather than those where you might feel the most comfortable. 4.Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter. 5.Use your laptop or an kiosk to send yourself reminders about “to-do’s” when you return.

Making the Most (cont’d) 6.Talk to people at the sessions you attend to create a network of colleagues. 7.After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned. 8.Write a summary of what you learned and think of audiences outside your own organization who might find the information useful. 9.Pass good ideas on, and off, to your staff. Commit to sharing with them, and decide together what makes sense to implement, transform, or aim for in your IT operation and institutional mission. 10.Realize that the effect on you of attending the conference could be as subtle as a change in attitude. Ideas to Action: Ten Hints for Getting the most from a Conference. By Joan Getman and Nikki Reynolds EDUCAUSE Quarterly, Number 3, 2002

Introduction to the Security Task Force Rodney Petersen Security Task Force Coordinator EDUCAUSE

Intro to Security Task Force Established in July 2000 Leadership & Staff Support from EDUCAUSE & Internet2 Cooperation and Support of Higher Education Associations  American Council on Education  Association of American Universities  National Association of State Universities & Land-Grant Colleges  American Association of State Colleges and Universities  National Association of Independent Colleges and Universities  American Association of Community Colleges Higher Ed Sector Coordination with Government & Industry Computer & Network Security: A Resource for Higher Ed

Security Task Force Mission The EDUCAUSE/Internet2 Computer and Network Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.

Working Groups Awareness and Training Effective IT Security Practices Policies and Legal Issues Risk Assessment SALSa – Internet2 Initiatives Security Conference Program Committee

Special Projects Business Continuity Planning Disaster Recovery Planning Data Classification Encryption Practices & Solutions PCI DSS Technical Practices & Solutions Security Awareness Poster/Video Contest Security Metrics Third Party Data Handling Agreements

For More Information Visit:  Security Task Force Leadership at the EDUCAUSE Publications Table in Lobby during Breaks  EDUCAUSE/Internet2 Security Task Force Contact:  Mely Tynan, Tufts, STF Co-Chair  Peter Siegel, UC-Davis, STF Co-Chair  Rodney Petersen, EDUCAUSE, STF Staff

Questions/Concerns Do you have any questions or concerns?