Security and Privacy Lightning Round
Authenticated Guest Wireless Access: Simplicity and Security
Christopher Keslar, University of Pittsburgh
The need for guest access is growing as more campuses provide wireless coverage. This presentation will explore a solution for on-demand guest wireless access through a user-friendly and secure process.
Automated Network Access Control at the Edge
Michael S. Hawkins, University of North Carolina at Chapel Hill
Hear how, with a small staff, we reliably manage, secure, prioritize, and deliver voice, video, and data services for over 30,000 people while complying with local, state, and federal regulations.
Caught in the Middle: Implementing University Security Policies at the College Level
Jamey Hansen, University of Minnesota
University security mandates are on one side; independent faculty on the other. Learn how our college IT office walked the fine line between security and service.
Discovering Network Usage Trends and Security Risks Through Network Information Analysis
Matt Tolbert, University of Pittsburgh
This session will share how the University of Pittsburgh successfully captures and visualizes network data to understand network traffic patterns and detect network-based security threats.
NEW! Not in your program!
Contract Themes for Data Protection
Michael A. Corn, University of Illinois at Urbana-Champaign
This session will provide a synthesis of data protection considerations when establishing contract relationships, and will introduce attendees to a comprehensive treatment of this topic that was recently completed by the EDUCAUSE/Internet2 Security Task Force.
Securing Data at Rest, Chandragupta Gudena, Bridgewater State College
CISO, University of California San Diego
Jamey HansenCIO, College of Liberal Arts, University of Minnesota
Chris KeslarTechnologist, University of Pittsburgh
David StackEmeritus, University of Wisconsin-Milwaukee
Ryan TurnerHead of Networking, University of North Carolina at Chapel Hill