First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

HEISC Town Hall Webinar: Strategic Plan Host: Larry Conrad CIO, UNC-Chapel Hill & HEISC Co-Chair.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center AMSAC Update July 10,
BENEFITS OF SUCCESSFUL IT MODERNIZATION
David A. Brown Chief Information Security Officer State of Ohio
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
ERP Security Checklist ENT 2007 Joy R. Hughes VPIT and CIO George Mason University Co-chair STF.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Higher Education-Industry Collaborations to Improve Security Joy Hughes, George Mason University Peter Siegel, University of California, Davis Jack Suess,
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Emergency Communications Management Jonathan Rood CIO and Associate VP, San Francisco State University Laine Keneller Business Continuity Planner & Project.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Program Committee Chair Briefing. Agenda Conference Program Housekeeping Items and Deadlines Action and Information Items Evaluation of PLN.
THE HR APPRENTICERICHMOND THE HR APPRENTICE RICHMOND Marvelous Membership Mavericks.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Assistant Principal Meeting August 28, :00am to 12:00pm.
Program Committee Chair Training. Training Agenda Conference Program Housekeeping items and deadlines Action and Information Items Accomplishment Report.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Serving the Campus Sustainability Community Association for the Advancement of Sustainability in Higher Education.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
OCTOBER 18-21, 2009 RED ROCK HOTEL LAS VEGAS, NEVADA Creating Your Best Experience at The Market Research Event.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
Program Committee Chair Briefing. Conference Program Housekeeping Items and Deadlines Action and Information Items Evaluation of PLN.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Introduction to ACT-IAC Advancing Government through Collaboration, Education and Action.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
+ Privacy, Security, and Identity Management for Research Environments Peter M. Siegel UC Davis Co-chair, Educause-I2 Security Task Force Chair, Internet2.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Making Cross-campus, Inter-institutional Collaborations Work
Welcome to the 2012 EDUCAUSE West/Southwest Regional Conference
EDUCAUSE/Internet2 Computer & Network Security Task Force
Welcome to the 2013 EDUCAUSE Southeast Regional Conference Elevate Your Game: Content, Networking, and Next Steps. How to Make the Most of Your Conference.
Higher Education Information Security Council
Welcome to Seattle & Security 2016!
Strengthening CIO and CISO Collaboration on Security and Privacy
Welcome to the 2012 EDUCAUSE Midwest Regional Conference
Overview of the Information Security Guide: Leveraging the Knowledge and Skills of Your Colleagues Cedric Bennett, Emeritus Director, Information Security.
CIO Constituent Group Meeting
Welcome to the 2012 EDUCAUSE Mid-Atlantic Regional Conference
Program Committee Officer Briefing
Senate Resources at Your Service
Corporate Forum Presented by
Presentation transcript:

First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer Georgia State University

Navigating the Conference Hard Copy Program in your Tote Bag Presentation Slides on Conference Website Most Sessions are on the Ballroom Level Ask Questions of staff at Registration Desk Look for EDUCAUSE staff (maroon ribbon) Look for Program Committee (white ribbon) Look for Security Task Force Members (yellow ribbon)

Conference Program Overview Pre- and Post-Conference Seminars Birds-of-a-Feather Sessions  Affinity Groups (next)  Topical Interests (tomorrow evening) Opening and Closing Keynote Speakers  Ira Winkler, formerly NSA/author of Spies Among Us  Pamela Fusco, industry CISO 7 Concurrent Track Sessions Corporate Displays (AM & PM Break) Lunch Roundtable Discussions

7 Concurrent Tracks 1.Forensics and Incident Handling 2.Policy, Law, and Compliance 3.Security Management and Operations – Effective Practices 4.Security Management and Operations – Strategic Planning 5.Technology Solutions – Emerging Trends 6.Technology Solutions – Sensitive Data Protection 7.Vendors & Partners of IT Products & Services

Corporate Participation Presentation Proposals as part of Track 7: Vendors & Partners of IT Products & Services Corporate Displays  16 During AM/PM Breaks Tomorrow Corporate Sponsorship  Food (breakfast, lunch, breaks, receptions)  Technology (computers, projectors, etc.)  Supplies (tote bags, notepads, etc.) What to Expect – Corporate Contacts

Birds-of-a-Feather Sessions Affinity Groups (Next!) Molly Brown Room  ACC Security Officers  California State University  CIC Security WG  Ivy-Plus Security Group  U of the Big 12  VA SCAN Other Groups Matchless Room  Commuter and 2-Year  Minority Serving Inst.  Research Universities  Small Colleges  State/Regional Networks Topical (Tomorrow at 8:30 p.m.) Colorado Ballroom E  E-Discovery/Electronically Stored Information (ESI)  EDU Partnership Series with SANS for InfoSec Training  Payment Card Industry Data Security Standard (PCIDSS)  Research and Education Networking Information Sharing and Analysis Center (REN-ISAC)  Other Topics

Networking at the Conference Well, there’s wireless access by using SSID: EDUCAUSEAIR There are also Computer kiosks in Silverton Room But, Human Networking is MOST IMPORTANT  Registrations List Online – by name, institution, state, or dynamic search terms Copies available at registration desk  Food: Breakfasts, Breaks, Lunch, and Reception  Group Dinners – Sign Up at Bulletin Board in Lobby  Birds-of-a-Feather Sessions  Before/After Sessions

Making the Most of It 1.Review the program with colleagues to decide which sessions to cover. 2.Plan how you will disseminate new information when you return. 3.Attend sessions that will introduce you to new ideas rather than those where you might feel the most comfortable. 4.Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter. 5.Use your laptop or an kiosk to send yourself reminders about “to-do’s” when you return.

Making the Most (cont’d) 6.Talk to people at the sessions you attend to create a network of colleagues. 7.After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned. 8.Write a summary of what you learned and think of audiences outside your own organization who might find the information useful. 9.Pass good ideas on, and off, to your staff. Commit to sharing with them, and decide together what makes sense to implement, transform, or aim for in your IT operation and institutional mission. 10.Realize that the effect on you of attending the conference could be as subtle as a change in attitude. Ideas to Action: Ten Hints for Getting the most from a Conference. By Joan Getman and Nikki Reynolds EDUCAUSE Quarterly, Number 3, 2002

Introduction to the Security Task Force Joy Hughes Co-Chair, EDUCAUSE/Internet2 Security Task Force Vice President and CIO, George Mason University

Intro to Security Task Force Established in July 2000 Leadership & Staff Support from EDUCAUSE & Internet2 Cooperation and Support of Higher Education Associations  American Council on Education  Association of American Universities  National Association of State Universities & Land-Grant Colleges  American Association of State Colleges and Universities  National Association of Independent Colleges and Universities  American Association of Community Colleges Higher Ed Sector Coordination with Government & Industry Computer & Network Security: A Resource for Higher Ed

Security Task Force Goals The Security Task Force has identified and is implementing a coordinated strategy for computer and network security for higher education. The following strategic goals have been identified:  Education and Awareness  Standards, Policies, and Procedures  Security Architecture and Tools  Organization and Information Sharing

Education and Awareness Goal To increase the awareness of the associated risks of computer and network use and the corresponding responsibilities of higher education executives and end- users of technology (faculty, staff, and students), and to further the professional development of information technology staff. Programs  Awareness & Training Working Group  Annual Security Professionals Conference (2002-present)

Education & Awareness (cont’d) Accomplishments  Leadership Strategies Book on Security (2003)  ACE Letter to Presidents (2003)  National Cyber Security Awareness Month (annually in October)  Cybersecurity Awareness Resource CD (now online)  Cybersecurity on Campus Executive Awareness Video (2005)  Computer Security Student Video Contest (2006 and 2007)  Outreach to Higher Ed Associations and Beyond (2003-present) Partnerships  National Cyber Security Alliance (  National Centers of Academic Excellence in Information Assurance Education  SANS EDU Training Partnership

Standards, Policies, & Procedures Goal To develop information technology standards, policies, and procedures that are appropriate, enforceable, and effective within the higher education community. Programs  Policy and Legal Issues Working Group  Risk Assessment Working Group  EDUCAUSE D.C. Office - Public Policy and Government Relations  EDUCAUSE/Cornell Institute for Computer Policy and Law

Standards, Policies, & Procedures (cont’d) Accomplishments  Principles to Guide Efforts to Improve Computer and Network Security in Higher Education (2003)  Publication of White Paper on “IT Security for Higher Education: A Legal Perspective” (2003)  Information Security Governance Assessment Tool (2004)  Risk Assessment Framework (2005)  Data Incident Notification Toolkit (2005)  Elements of Model Security Policy (2006)  Guidelines for Responding to Compulsory Legal Requests for Information (2006)  Guidelines for Data Sanitization (2006)  ERP Security Checklist (2007) Partnerships  National Association of College & University Attorneys (NACUA)  National Institute for Standards in Technology (NIST)

Security Architecture and Tools Goal To design, develop, and deploy infrastructures, systems, and services that incorporate security as a priority; and to employ technology to monitor resources and minimize adverse consequences of security incidents. Programs  Effective IT Security Practices Working Group  SALSA and Other Internet2 Working Groups  PKI, Middleware, and ID Management Initiatives

Security Architecture & Tools (cont’d) Accomplishments  Effective Security Practices Guide (2004 and 2006)  Effective Security Practices & Solutions Form (ongoing)  Whitepaper on Automating Network Policy Enforcement (2004)  Center for Internet Security Benchmarks (2004) Partnerships  The Center for Internet Security  DHS National Cyber Security Division  NSF Middleware Initiative – Enterprise and Desktop Integration Technologies (NMI-EDIT)

Organization and Information Sharing Goal To create the capacity for a college or university to effectively deploy a comprehensive security architecture (people, process, and technology), and to leverage the collective wisdom and expertise of the higher education community. Programs  Security Task Force Executive Committee & Leadership Team  Annual Security Professionals Conference  Research & Education Networking ISAC (REN-ISAC)

Organization & Info Sharing (cont’d) Accomplishments  Security Discussion Group  REN-ISAC Trusted Communication Network  Annual Security Professionals Conference Partnerships  U.S. Department of Homeland Security U.S. – Computer Emergency Readiness Team (US- CERT)

For More Information Visit:  Co-Chairs Joy Hughes and Peter Siegel at the STF Information Table in Lobby during Breaks  EDUCAUSE/Internet2 Security Task Force Contact:  Joy Hughes, GMU, STF Co-Chair  Peter Siegel, UC-Davis, STF Co-Chair  Rodney Petersen, EDUCAUSE, STF Staff

Questions/Concerns Do you have any questions or concerns?