|
Welcome Day 2 & Registration - Continental Breakfast |
|
Keynote: U of U CHCP
Tom Cheatham
Abstract
Research computing on campuses is exploding as an ever-increasing and
diversifying set of researchers across many fields embrace high
performance computing, virtualization, large-scale data transfers, and big
data. To support this growth, and to further innovate our campuses, a
nimble, technically savvy, and experienced staff is necessary to help
design, engineer, deploy, and operate these resources. Moreover, we need
to continue to augment the technical staff with experienced facilitators
to help educate, train, advise, and help researchers with their computing
needs, broadly defined. The growth at the University of Utah has been
rapid and may not be sustainable, hence many campuses have united and are
looking for means to share physical, technical, and facilitator resources
through organizations such as ACI-REF, CaRC, and RMACC. Cheatham will
highlight what's going on at the University of Utah, the region and the
nation to innovate, enable and promote research computing on campuses.
Handout
|
|
|
|
|
Packham's Brain Dump
Dave Packham, U of U
Abstract
I will talk about current Hacks/Threats and Cool new innovations that are leading the way our IT lives are changing.
Handout |
Secure Science DMZs
JJ Jamison, Juniper Networks
Abstract
The Science DMZ architecture was developed in part to work around the fact that conventional firewalls are not capable of supporting high speed data transfer flows greater than 20 Gbps. Now that 100G capable firewalls are becoming available network engineers are considering how these firewalls can contribute to the security of their existing Science DMZs. This presentation will provide a brief overview of Science DMZ architectures and describe how 100G capable firewalls can be used within Science DMZs to make them more secure and help Supercomputing Centers; Research Universities; National Labs and other Federal Research Institutions meet FISMA HIPAA and Funding Program Mandates. Field trials and production use of this technology at universities and Federal Research Labs will also be discussed.
|
Healthcare: Changing Over Time
Lonnie Buchanan, IHC
Abstract
A quick look through time at healthcare and how technology has changed and were it is going.
|
CWTS Course Continued
Tom Carpenter, CWNP
A detailed discussion on what Ransomware is, how ransomware is infiltrating networks and how we can detect and prevent these advanced threats from causing harm. Demonstrate the how attacks happen and how they can be resolved.
|
|
The Tiny Hub that Would be Great
Scott Harpster, SEDC
Abstract
I will be showing this new system that will make it easy to send data to easy to configure for alerting on sensor data ranges and creating graphs. I will also talk about the hardware required and the costs to build a device to push to the system. The system is being designed to be light weight and to run on the raspberry pi as a centralized system. This is perfect for the home hardware hacker and also could be great for putting in rooms at a business that need specific sensor monitoring.
|
|
Wired & Wireless Converge Deliver Digital Ceilings
Dave Barker, Cisco
Abstract
Digital technologies are fundamentally changing the world. No place is that more apparent than in enterprises. Today, commercial indoor environments of all sizes are connecting previously disparate building networks. This newly created "Digital Ceiling" brings together Lighting, Building Automation, Security, Analytics, Software and Integration to create a nervous system where "things" are connected and sharing information improving experiences and Results.
Wired & Wireless & Digital Ceilings |
Fiber Fundamentals
Brad Miller, UETN
Abstract
Fiber for the IT Professional (things you need to know). Standards that affect what you should be installing. What works and what does not work. Tools you should have and use.
|
HIPAA, FERPA, PCI, Oh My!
Jerry Smith, U of U Health
Abstract
My presentation will deal with some of the basic audit issues related to HIPAA and PCI. I will discuss some of the issues related to FERPA and how it may impact your environment. I will also discuss breach issues and your obligations in who you must report to and what actions you must take.
HIPAA and PCI Are you a covered entity and do you handle pci transactions, what merchant level are you? This is information you must understand in order to comply with these regulations. If you are not a covered entity, then you do not need to comply with HIPAA, you do need to recognize that if you do store sensitive data you have an obligation to protect that data. Does your organization process credit card transactions? If that is the case, then you must abide by the standards as provide by PCI, which is not a government body but a industry organization. How many transactions in a year do you process? That number is what determines your merchant level. The higher the number, the tighter the regs become. What to do if you identify a breach. What are your obligatory reporting responsibilities depending on which data ends up being disclosed?
HIPAA, FERPA, PCI, Oh My!
|
|
Lunch |
|
The Art and Science of Managing Technical Support
Tim Smith, Cache School District
Abstract
Effectively manage technical support so it doesn't manage you, or Making your customer base happy to see you.
Handout
|
Calling All Charter Schools!
Charice Carroll and Kim Davis, UETN
Abstract
Come meet the UETN Technical Advocate Team for charter schools and learn about services and support that UETN can offer your school. Explore opportunities with E-rate Interactive Videoconferencing (IVC) Networks Security and more. We will also demonstrate some of the latest video conferencing and collaboration tools. Ample time will be given to ask questions and get the information that you need now.
Handout
|
LAN Infrastructure Basics
Bill Parr, Cisco Systems
Abstract
Intro discussion on LANs VLANs Spanning-Tree Etherchannel etc.
|
CWTS Course Continued
Tom Carpenter, CWNP
|
|
The 12 Layer IT Infrastructure Model
Scott Howard, Me Inc.
Abstract
Information Technology can seem daunting. The 12 layer method will break out confusing aspects into layers. Then these layers can be analyzed for threats and defenses so effort can be placed where its needed most.
The 12 layer method is loosely based on the 7 layer OSI model. On the whiteboard I'll make series of blocks that stack on top of one another like a Jenga game. The stack is made up of the Goals,Plans,Budgets of the decision makers. Then the IT Staff, Then Physical Facilities like power and AC. Then add the Network layer. Then servers and endpoints are made up of Hardware/OS/Apps/Data. All of this is to support the computer users. And they in turn support the Clients/Customers. Any network can be diagrammed. From the diagram a basic risk analysis spreadsheet can be made. The columns are the INVENTORY, DEFENSES, THREATS, VULNERABILITY ASSESSMENT (to compare threats versus defenses). Then a RISK ANALYSIS (that prioritizes the VA results. Then a REMEDIATION LIST, then REPORT TO AUTHORITY, then a column for CHANGE MANAGEMENT so moving forward we solve problems before they're built.
|
New Classroom Technologies: What IT Needs to Know
Kimberly Davis and Charice Carroll, UETN
Abstract
Innovative teachers are using more and more technology in the classroom. This is great for education but can be scary for those tasked with support. This presentation will explore some of the newest educational technology trends including teaching tools, video capture, videoconferencing, web conferencing and more so you can be ready to offer support. Also learn about FREE tools available to you and your teachers from UEN so that you can be on top of tech without killing the budget. We will discuss classroom technology including BoardShare, Swivl,and UEN Interactive Video Conferencing services. Desktop conferencing tools such as Google Hangouts, Zoom, Cisco CMA (formerly Acano), and WebEx will also be discussed. We may include collaboration tools including Blackbox Coalesce and ClickShare. We will answer questions about how to support video conferencing and collaboration tools on school networks, etc.
Handout
|
Healthcare Best Practices
Sean Black, UETN
Abstract
Discuss steps needed to protect your organization from breaches, malware, and physical intrusions.
Provide power point slides and documentation for the following: Endpoint security anti Malware admin accounts physical security How to resolve level four / five vulnerabilities.
Handout
|
Discussing Wireless Tools that Help Provide Effective Educational Wireless Systems
Alan Gibbons, Cache School District; Jack Erickson, Ken Munford, Scott Harpster, Josh Kleinke, Brent Prisbrey, Mark Houtz and Kevin Womack
Abstract
In this workshop we are discussing what tools the different educational institutions throughout Utah are using to design monitor and support wireless networks to provide reliable and robust networks that enhance the learning environment. Come learn and share in this open discussion group formatted session.
|
|
Snacks / Break |
|
Ransomware
Evan Shelley, Rubrik
Abstract
Ransomware, what is it, how is it effecting people and how is industry trying to recover from it. Ransomware discussion as well as solutions to help recover from it.
|
How UEN helps distribute public radio to rural Utah
Lewis Downey, U of U KUER Radio
Abstract
The presentation is ~16 PPT slides progressing through the evolution of KUER public radio distribution to rural Utah culminating in improvements made possible by UEN WAN assistance.
|
Performance troubleshooting across Networks
Joe Breen, U of U - CHCP
Abstract
Presentation on network troubleshooting between multiple sites. Not getting the expected network bandwidth between two sites that you manage? Are you dropping packets? Do you know? Are you using tools that test only the network? Or, are testing full systems? Do you need to routinely guarantee the performance of your link? Network troubleshooting is often a hop by hop effort. This talk will cover some of the tools and techniques by which to troubleshoot. The talk will cover topics such as Bandwidth Delay product, the impact of dropped packets on Wide Area transfers, tools such as the perfSonar suite, and techniques for managing high bandwidth links.
Performance Troubleshooting across Networks
|
Android@School: Using Android@Work for Teacher BYOD
Josh Kleinke
Abstract
Come and learn about Google's Android@Work feature and see how to create a work profile on a Teacher's personal device.
Android@Work
|
|
JUNOS Boot Camp
John Somm, Juniper Networks
Abstract
Come join Juniper Systems Engineers for a 90-minute HANDS-ON, free training. We will explore the basics of Juniper’s award winning Network Operating System – JUNOS. During this exciting training, you will learn NOS fundamentals, how JUNOS works, what makes JUNOS different, and how our Carrier Class DNA translates into everything we do – including brining you capabilities and features you can’t find in other manufacturers' NOS.
|
iboss Distributed Web Gateway Platform: Protecting your Distributed World
Chris Park, iboss Cybersecurity
Abstract
Overview will cover CIPA Compliance, selective SSL Decryption, support for one-to-one computing and BYOD initiatives, defense against non-standard protocols, advanced malware protection, and mobile device management.
iboss has a history of success in protecting school networks from Seattle to Boston. We secure more school network traffic than any other cybersecurity solution, with proven deployments spanning millions of devices and at speeds of over 100 Gbps. And no other solution has received more third-party validations, including the FIPS 140-2 government security standard and Common Criteria international standard. The iboss Distributed Gateway Platform meets the needs of K-12 schools with capabilities that include CIPA Compliance across all devices on or off campus with selective SSL decryption, support for one-to-one and BYOD initiatives, advanced malware protection, and mobile device management.
|
FileWave - Simplified Management for Windows, MacOS, iOS, Android, & NOW CHROMEOS Devices within a single platform
Avery Thomas, Filewave
Abstract
FileWave Team will take you through an overview of how FileWave has been simplifying Endpoint Management in Utah and across the Country. Since 1992, FileWave has lead the marketplace providing education, enterprise, and government institutions around the world with enterprise level, multi-platform systems, and mobile endpoint management software to assist IT teams throughout the lifecycle process of imaging, deployment, management, tracking and maintenance. FileWave’s all-inclusive, highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both client (desktop/laptop) and mobile devices across Windows, Mac, iOS, Android, and ChromeOS
|
|
Update and Discussion on UETN Wireless Role and the eduroam Pilot Project
Cory Stokes, UETN
Abstract
Over the last several months UETN has been developing a strategic plan for their wireless role to better help support their customers. This includes the implementation of the eduroam pilot project. Come review and discuss this plan as well as how eduroam provides a valuable wireless access service for your faculty staff and students.
|
|
|
Final - Survey Prize Give-away |
|
|
|