first-time attendees: how to get the most out of the conference experience gary dobbins program...
TRANSCRIPT
First-Time Attendees: How to Get the Most Out
of the Conference ExperienceGary Dobbins
Program Chair, Security 2008Director, Information Security
University of Notre Dame
Navigating the Conference
Hard Copy Program in your Tote BagPresentation Slides on Conference WebsiteMost Sessions are on the Ballroom LevelSome Sessions and Email Room on 3rd FloorAsk Questions of staff at Registration DeskLook for EDUCAUSE staff (maroon ribbon)Look for Program Committee (white ribbon)Look for Security Task Force Members (yellow ribbon)
Conference Program Overview
Pre- and Post-Conference SeminarsBirds-of-a-Feather Sessions Affinity Groups (next) Topical Interests (tomorrow evening)
Opening and Closing Keynote Speakers Gregory Garcia, Assistant Secretary DHS Rebecca Whitener, Former CRO EDS
6 Concurrent Track SessionsCorporate Displays (AM & PM Break)Lunch Roundtable Discussions
6 Concurrent Tracks
1. Forensics and Incident Handling
2. Policy, Law, and Compliance
3. Risk Assessment
4. Security Management and Operations
5. Technology Solutions
6. Vendors and Partners of IT Products and Services
Corporate Participation
Presentation Proposals as part of Track 6: Vendors & Partners of IT Products & Services
Corporate Displays 15 During AM/PM Breaks Tomorrow
Corporate Sponsorship Food (breakfast, lunch, breaks, receptions) Technology (computers, projectors, etc.) Supplies (tote bags, notepads, etc.)
What to Expect – Corporate Contacts
Birds-of-a-Feather Sessions
Affinity Groups (Next!)Washington A & B (Ballroom Level) California State
University/University of California Campuses
CIC Security WG Commuter and 2-Year Ivy-Plus Security Group Research Universities Small Colleges VA SCAN Other Groups
Topical (Tomorrow at 8:30 p.m.)Regency ABCD Ballroom Creating a National Cyber Security
Awareness Campaign for Higher Ed
Information Security Peer Review Programs
Research and Education Networking Information Sharing and Analysis Center (REN-ISAC)
SANS-EDU Partnership Security Operation Center (SOC) Other Topics
Networking at the Conference
Well, there’s wireless access by using SSID: EDUCAUSEAIRThere are also Computer kiosks in Lincoln (Third Floor) But, Human Networking is MOST IMPORTANT Registrations List
• Online – by name, institution, state, or dynamic search terms• Copies available at registration desk
Food: Breakfasts, Breaks, Lunch, and Reception Group Dinners – Sign Up at Bulletin Board in Lobby Birds-of-a-Feather Sessions Before/After Sessions
Making the Most of It
1. Review the program with colleagues to decide which sessions to cover.
2. Plan how you will disseminate new information when you return.
3. Attend sessions that will introduce you to new ideas rather than those where you might feel the most comfortable.
4. Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter.
5. Use your laptop or an e-mail kiosk to send yourself reminders about “to-do’s” when you return.
Making the Most (cont’d)
6. Talk to people at the sessions you attend to create a network of colleagues.
7. After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned.
8. Write a summary of what you learned and think of audiences outside your own organization who might find the information useful.
9. Pass good ideas on, and off, to your staff. Commit to sharing with them, and decide together what makes sense to implement, transform, or aim for in your IT operation and institutional mission.
10. Realize that the effect on you of attending the conference could be as subtle as a change in attitude.
Ideas to Action: Ten Hints for Getting the most from a Conference.By Joan Getman and Nikki Reynolds
EDUCAUSE Quarterly, Number 3, 2002
Introduction to the Security Task Force
Rodney Petersen
Security Task Force Coordinator
EDUCAUSE
Intro to Security Task Force
Established in July 2000Leadership & Staff Support from EDUCAUSE & Internet2Cooperation and Support of Higher Education Associations American Council on Education Association of American Universities National Association of State Universities & Land-Grant Colleges American Association of State Colleges and Universities National Association of Independent Colleges and Universities American Association of Community Colleges
Higher Ed Sector Coordination with Government & IndustryComputer & Network Security: A Resource for Higher Ed http://www.educause.edu/security
Security Task Force Mission
The EDUCAUSE/Internet2 Computer and Network Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.
Working Groups
Awareness and Training
Effective IT Security Practices
Policies and Legal Issues
Risk Assessment
SALSa – Internet2 Initiatives
Security Conference Program Committee
Special Projects
Business Continuity PlanningDisaster Recovery PlanningData ClassificationEncryption Practices & SolutionsPCI DSS Technical Practices & SolutionsSecurity Awareness Poster/Video ContestSecurity MetricsThird Party Data Handling Agreements
For More Information
Visit: Security Task Force Leadership at the EDUCAUSE
Publications Table in Lobby during Breaks EDUCAUSE/Internet2 Security Task Force
http://www.educause.edu/security
Contact: Mely Tynan, Tufts, STF Co-Chair
[email protected] Peter Siegel, UC-Davis, STF Co-Chair
[email protected] Rodney Petersen, EDUCAUSE, STF Staff
Questions/Concerns
Do you have any questions or concerns?