1 / 16

First-Time Attendees: How to Get the Most Out of the Conference Experience

First-Time Attendees: How to Get the Most Out of the Conference Experience. Gary Dobbins Program Chair, Security 2008 Director, Information Security University of Notre Dame. Navigating the Conference. Hard Copy Program in your Tote Bag Presentation Slides on Conference Website

salena
Télécharger la présentation

First-Time Attendees: How to Get the Most Out of the Conference Experience

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University of Notre Dame

  2. Navigating the Conference • Hard Copy Program in your Tote Bag • Presentation Slides on Conference Website • Most Sessions are on the Ballroom Level • Some Sessions and Email Room on 3rd Floor • Ask Questions of staff at Registration Desk • Look for EDUCAUSE staff (maroon ribbon) • Look for Program Committee (white ribbon) • Look for Security Task Force Members (yellow ribbon)

  3. Conference Program Overview • Pre- and Post-Conference Seminars • Birds-of-a-Feather Sessions • Affinity Groups (next) • Topical Interests (tomorrow evening) • Opening and Closing Keynote Speakers • Gregory Garcia, Assistant Secretary DHS • Rebecca Whitener, Former CRO EDS • 6 Concurrent Track Sessions • Corporate Displays (AM & PM Break) • Lunch Roundtable Discussions

  4. 6 Concurrent Tracks • Forensics and Incident Handling • Policy, Law, and Compliance • Risk Assessment • Security Management and Operations • Technology Solutions • Vendors and Partners of IT Products and Services

  5. Corporate Participation • Presentation Proposals as part of Track 6: Vendors & Partners of IT Products & Services • Corporate Displays • 15 During AM/PM Breaks Tomorrow • Corporate Sponsorship • Food (breakfast, lunch, breaks, receptions) • Technology (computers, projectors, etc.) • Supplies (tote bags, notepads, etc.) • What to Expect – Corporate Contacts

  6. Affinity Groups (Next!)Washington A & B (Ballroom Level) California State University/University of California Campuses CIC Security WG Commuter and 2-Year Ivy-Plus Security Group Research Universities Small Colleges VA SCAN Other Groups Topical (Tomorrow at 8:30 p.m.)Regency ABCD Ballroom Creating a National Cyber Security Awareness Campaign for Higher Ed Information Security Peer Review Programs Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) SANS-EDU Partnership Security Operation Center (SOC) Other Topics Birds-of-a-Feather Sessions

  7. Networking at the Conference • Well, there’s wireless access by using SSID: EDUCAUSEAIR • There are also Computer kiosks in Lincoln (Third Floor) • But, Human Networking is MOST IMPORTANT • Registrations List • Online – by name, institution, state, or dynamic search terms • Copies available at registration desk • Food: Breakfasts, Breaks, Lunch, and Reception • Group Dinners – Sign Up at Bulletin Board in Lobby • Birds-of-a-Feather Sessions • Before/After Sessions

  8. Making the Most of It • Review the program with colleagues to decide which sessions to cover. • Plan how you will disseminate new information when you return. • Attend sessions that will introduce you to new ideas rather than those where you might feel the most comfortable. • Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter. • Use your laptop or an e-mail kiosk to send yourself reminders about “to-do’s” when you return.

  9. Making the Most (cont’d) • Talk to people at the sessions you attend to create a network of colleagues. • After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned. • Write a summary of what you learned and think of audiences outside your own organization who might find the information useful. • Pass good ideas on, and off, to your staff. Commit to sharing with them, and decide together what makes sense to implement, transform, or aim for in your IT operation and institutional mission. • Realize that the effect on you of attending the conference could be as subtle as a change in attitude. Ideas to Action: Ten Hints for Getting the most from a Conference. By Joan Getman and Nikki Reynolds EDUCAUSE Quarterly, Number 3, 2002

  10. Introduction to the Security Task Force Rodney Petersen Security Task Force Coordinator EDUCAUSE

  11. Intro to Security Task Force • Established in July 2000 • Leadership & Staff Support from EDUCAUSE & Internet2 • Cooperation and Support of Higher Education Associations • American Council on Education • Association of American Universities • National Association of State Universities & Land-Grant Colleges • American Association of State Colleges and Universities • National Association of Independent Colleges and Universities • American Association of Community Colleges • Higher Ed Sector Coordination with Government & Industry • Computer & Network Security: A Resource for Higher Ed http://www.educause.edu/security

  12. Security Task Force Mission The EDUCAUSE/Internet2 Computer and Network Security Task Force works to improve information security and privacy across the higher education sector by actively developing and promoting effective practices and solutions for the protection of critical IT assets and infrastructures.

  13. Working Groups • Awareness and Training • Effective IT Security Practices • Policies and Legal Issues • Risk Assessment • SALSa – Internet2 Initiatives • Security Conference Program Committee

  14. Special Projects • Business Continuity Planning • Disaster Recovery Planning • Data Classification • Encryption Practices & Solutions • PCI DSS Technical Practices & Solutions • Security Awareness Poster/Video Contest • Security Metrics • Third Party Data Handling Agreements

  15. For More Information • Visit: • Security Task Force Leadership at the EDUCAUSE Publications Table in Lobby during Breaks • EDUCAUSE/Internet2 Security Task Forcehttp://www.educause.edu/security • Contact: • Mely Tynan, Tufts, STF Co-Chairamelia.tynan@tufts.edu • Peter Siegel, UC-Davis, STF Co-Chairpmsiegel@ucdavis.edu • Rodney Petersen, EDUCAUSE, STF Staffrpetersen@educause.edu

  16. Questions/Concerns Do you have any questions or concerns?

More Related