Presentations


Industry Insights Presentations

If you purchased a presentation opportunity at this year’s event, please review the following to best prepare. Everyone who secured a presentation was sent a communication connecting them with our speaker liaison, Sarah Reynolds. Please continue to work with Sarah on development of and any questions you may have regarding your session. Sessions will run concurrently on Thursday, May 2 from 1:45–2:30 p.m.


What is an Industry Insights Presentation?

Industry Insights Presentations are 45-minute presentations that must be educational in nature and conducted in partnership with at least one presenter from a higher education institution. If interested, you may have a small, diverse panel-type session with four presenters/panelists max.


Conference Theme and Tracks

This year's conference theme is, "Reducing Friction While Embracing Shifting Landscapes."

Conference Tracks

Policies that surround cybersecurity and privacy are becoming more complex as governance, risk, and compliance (GRC) issues are on the increase in higher education information technology. This track will encompass areas of leadership, organizational compliance and operation of an institution's GRC programs now and in the future.

This track will explore the ways privacy enables individuals and organizations through privacy programs, assessment of privacy risk, use of privacy engineering and embedding privacy by design, and the role privacy plays in the effective governance and management of data.

Cybersecurity awareness, training, education, and communications are critical components of successful information security and privacy programs. The Cybersecurity Awareness and Training Conference Track is a specialized segment within our conference that delves deep into the strategies, tactics, and methodologies necessary for creating and managing cybersecurity and privacy awareness programs that genuinely empower faculty, staff, and students. This track seeks to answer the pressing questions of how to not only build and staff these programs but also strategically operate them while avoiding the pitfalls of superficial compliance to meet cyber liability insurance requirements.

What best practices and technologies shape your privacy and cybersecurity operations? This track allows you to share what you are doing to prevent, detect, assess, monitor, and respond to cybersecurity threats, privacy violations, and incidents. Share the strategies for cybersecurity and privacy controls and safeguards that are being implemented at your institution to protect the confidentiality, integrity, and availability of institutional data.

Today's cybersecurity and privacy workforce requires continuous learning and professional development at all levels. This track allows you to share ideas and best practices for shaping and developing the next generation of our workforce, as well as sustaining, retaining, training, and creating leadership opportunities for current employees. We also want to hear about your ideas on recruiting new talent and supporting diversity, equity, inclusion, and belong among your teams.

Presenter Resources

For additional information about your role as a presenter, how to promote your session, and answers to other frequently asked questions, visit the Presenter Resources page on the conference website.

Quick Tip: Be sure to provide your Twitter/X handle and other social media channels in your presentation materials, so attendees can connect with you after the event. Check your channels periodically to help answer questions and participate in discussions.