Loading…
ACCS2019 has ended
Beverages and snacks are available from 8am-noon and 12:45pm-4pm in the vendor area Wednesday & 8am-noon and 12:45pm-3pm Thursday.

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Security [clear filter]
Wednesday, March 13
 

9:00am

The Weakest Link
What is the weakest link in information security? Is there a way to "fix" the weak link? Can the "weakest link" be given support that will minimize the weakness?

Speakers
NT

Natalie Talbott

Information Security Officer, Virginia Community College System


Wednesday March 13, 2019 9:00am - 10:00am
Lee

11:30am

Build it Secure: Continuous Improvement in System Provisioning
With the emergence of DevOps models and cloud service provisioning, expediency in provisioning of services is one of the top priorities for many business units across organizations. The inability for IT to quickly meet the needs of these business units can often drive units to adopt shadow IT operations through other service providers, and thus lead to the potential loss of control on sensitive data and information. This presentation will follow VCU's journey in establishing a system provisioning process, and over the years transforming this process with the goal of providing the needed expediency to its customers while maintaining a reasonable expectation of quality and security for its assets. The presenters will discuss the evolution of the system provisioning process and the role of security, in addition to challenges and lessons learned through the transformation. Additionally, the presenters will discuss future plans for the process as it further matures.

Speakers
DH

Dan Han

CISO, Virginia Commonwealth University
Dan is the Chief Information Security Officer for the Virginia Commonwealth University. He has over 15 years of experience working in various roles in IT, and focused on information security management in the higher education and healthcare sector for the past 11 years. Dan specializes... Read More →
CK

Craig Kilgo

Project Manager, Virginia Commonwealth University


Wednesday March 13, 2019 11:30am - 12:30pm
Madison

11:30am

Apple Security Update
Please join Apple for an update on the latest news about security and privacy as it relates to higher education IT. An Apple security engineer will be visiting Virginia to deliver a presentation covering the following topics, and more!
* Understand the advanced security features built into Apple products and how this helps protect institutional data, enable privacy, and empower faculty, staff, and students to be more productive.
* Learn Apple's best practices for managing devices in an increasingly mobile workplace, and how to ensure that IT maintains control of institutional data, while also keeping personal data private.
* Managing software updates to address security concerns.
* What's new in security and privacy for macOS Mojave and iOS 12
* Learn about the T2 chip and new Secure Boot settings in macOS and what this means for imaging, and booting into Windows 10
* Review the latest developments in Touch ID and Face ID to securely unlock Apple devices.
* Update on the latest features in system security, data security, and app security.
* Do you need antivirus software on a Mac or iOS device?
* Learn about the latest in hard drive encryption and data protection, both at-rest and in-transit.

Speakers

Wednesday March 13, 2019 11:30am - 12:30pm
Holley V/VI

11:30am

How to Create a Modern Ransomware Strategy
Government agencies and education institutions are under attack and ransomware is the weapon of choice. Not surprisingly, phishing prevention and education have become top of mind across the globe. Security teams and organizations are constantly working to upgrade their systems and provide better protection to their networks. Meanwhile, the 'bad guys' continually develop new techniques. There is an entire dark market associated with the threat landscape that is automated, scalable and profitable. Developing new threats takes time and expense and so those looking to get around network security measures often target the weakest link in the security chain -- the user. Join Scott Allison, Systems Engineer from Palo Alto Networks to learn about how building a solid prevention strategy, so your organization doesn't become the next Ransomware victim.

Speakers
SA

Scott Allison

Systems Engineer, Palo Alto Networks


Wednesday March 13, 2019 11:30am - 12:30pm
Holley III

1:30pm

Securing Enterprise Applications with LDAP Authentication
In a rapidly evolving application world, we need to focus on securely authenticating users and protecting data as best we can. The VCCS Enterprise Active Directory (EAD) is a complex directory with multiple groups and attributes supporting around half a million identities across twenty-three colleges plus multiple administrative units. This presentation aims to show how you can secure your applications via the LDAP protocol to VCCS EAD for user authentication for faculty, staff and students at our specific college. Topics discussed will cover how we have successfully created portals that house multiple homegrown applications on our existing Windows 2008 server, the particulars of LDAP authentication as well as a migration from Windows to Linux that further tightens security and gives expandability to the platform.

Speakers
MC

Melanie Crouch

Programmer/Analyst, Virginia Western Community College
Melanie is the SharePoint Administrator / Developer at Virginia Western and has eight years of IT experience.
avatar for Shivaji Samanta

Shivaji Samanta

Director of Educational & Information Technologies/CIO, Virginia Western Community College


Wednesday March 13, 2019 1:30pm - 2:30pm
Ampitheater

1:30pm

How to love your Cloud Provider through Security
Where has the love for your data center gone? That's right! To the Cloud. This new love for the cloud has a very key component and that is security. Understanding your security role in this relationship will lead to a long lasting partnership with your Cloud Provider. As you transition to the Cloud its time to put security first."

Speakers
MC

Matt Chicon

Pro Services Engineer, Data Network Solutions
avatar for Jack Daniel

Jack Daniel

Pro Services Engineer, Data Network Solutions


Wednesday March 13, 2019 1:30pm - 2:30pm
Lee

3:00pm

Identity Access Management: How and Why we got here and What you need to Know
Identity Access Management (IAM) is a buzz word everyone in IT and Security hears or even says but how did we get here? Why did it become so prevalent in our world? What do I need to know to prepare for the future (psst - it involves implementing IAM!). This presentation will discuss what IAM is and how it has expanded. The presenter will discuss at different levels to keep the audience "level-set" and will also discuss the future of Identity Access Management.

Speakers
avatar for Michael DArezzo

Michael DArezzo

Director of Security Services, SLAIT Consulting
20 years of IT Experience, 10 years in IT Security. My interests are security strategies, controls and policies, and penetration testing (Network, Web, Social Engineering). CISSP, CISA, and IT Management from University of Richmond


Wednesday March 13, 2019 3:00pm - 4:00pm
Lee

3:00pm

M.A.C.S. - Managing Apple Computers Securely!
SOMTech had a problem where we were giving secured Macs to users, but didn't have a process to ensure that these machines were staying secured over time. Two years ago, we set out to fix this and we have come a long way since then. We now use Jamf to manage our Macs, but many of the solutions that will be discussed can be implemented with other similar tools. We have tried to come up with solutions that benefit both the technicians that support the Macs and the people that use them. Some of the topics to be discussed include encryption, admin rights, patch management, software & printer management, and initial setup processes.

Speakers
WC

Will Crehore

SOM Systems Admin, VCU
I recently began a new position as a Systems Analyst with VCU's School of Medicine after 4 years with VCU's IT Support Center. I am excited for this new step in my career and the new adventures that will come with it. Currently I am building my skills with software such as LANDesk... Read More →
SK

Steve Kuchta

SOM Information Security Manager, VCU


Wednesday March 13, 2019 3:00pm - 4:00pm
Ampitheater
 
Thursday, March 14
 

9:00am

Network & Security with VMware NSX Data-Center
Walking through description on how VMware helps Universities lock down and secure their IT environments in today’s digital works. Allowing for protecting sensitive workloads and simplifying Disaster Recovery to sustain business continuity.

Speakers
RA

Ramy Afifi

Staff NSX Systems Engineer, VMware, INC
TW

Tom Welton

NSX Account Executive


Thursday March 14, 2019 9:00am - 10:00am
Holley V/VI

11:30am

Data Loss Prevention at Shenandoah University
How secure is your institutional data? Are your employees being good stewards of the data they are using and sharing? What measures do you have in place to prevent inadvertent data leaks and compromises of files stored in Google Drive or other cloud storage solutions? What steps or policies do you have in place to prevent the mishandling of data at your University? These were the questions we asked ourselves prior to implementing a Data Loss Prevention system at Shenandoah University. This session will cover our initial thought processes and walk attendees through the steps we took to implement a Data Loss Prevention system at Shenandoah University. Future planned improvements will also be discussed.

Speakers
DF

Danny Fox

Senior Information Technology Security Officer, Shenandoah University
KL

Ken Lambert

Associate Director, Network Technology & Infrastructure, Shenandoah University
avatar for Devon Taylor

Devon Taylor

Assistant Director, Technology Support Services, Shenandoah University


Thursday March 14, 2019 11:30am - 12:30pm
Holley I/II

11:30am

Detecting and Mitigating the Top 2019 Cyber Threats
As time rolls on, hackers continue to evolve their capabilities and attack vectors. 2017 was the year of Ransomware, 2018 was the year of Crypto Mining Botnets, but what will 2019 be the year of? In this presentation, we will look at the major cyber threats we have seen over the previous years, discuss the new top threats we see in 2019, and provide recommendations for detecting and protecting yourself from such threats.


Speakers
SB

Steven Bay

Director, Threat Reconnaissance Unit, Security On-Demand in Partnership with Technology Integration Group


Thursday March 14, 2019 11:30am - 12:30pm
Holley VII

11:30am

A New Approach to Digital Education & VMWare's Digital Backpack
Academic institutions have always found ways to push boundaries. Today, the ability to rapidly adopt new learning, teaching, and business models have department heads conferring with campus CIOs to more aggressively pursue IT and business transformation initiatives that improve offerings while also reducing costs. Although once sufficient, siloed IT systems are no longer suitable to address new learner demographics and demands nor to thwart increasingly advanced cyber threats. The rise in non-traditional over traditional student enrollment and online learning as an integral part of the educational landscape requires IT teams at academic institutions to adopt more modern, integrated approaches that enable limitless learning. Key to success is
simultaneously reducing IT complexity across student learning, faculty teaching, advanced research, and collaborative work environments, as well as protecting student privacy, financial data and transactions, health services data, and the myriad of other sources of sensitive information in higher education.

Speakers
BL

Brice Layton

End User Computing Specialist, VMWare
avatar for Chris Reed

Chris Reed

EUC Strategist - VMWare's Office of the CTO, VMWare
Help people by building lasting relationships. Learn what I don’t know, teach what I do and enhance the quality of life for others through technology. PROFILE:An award-winning, influential business and technology leader with over 20 years of experience and exceptional critical thinking... Read More →


Thursday March 14, 2019 11:30am - 12:30pm
Holley V/VI

1:30pm

Keeping Students Safer with End-to-End Security
Today, IT teams at colleges and universities are tasked with not only keeping the network secure, which is challenging enough on its own, but also with protecting end user devices and ensuring physical safety. All of these serious responsibilities, paired with limited resources, create a challenge for higher education IT teams. How do you protect endpoints, networks, and students, all at the same time?

Meraki is uniquely positioned to help education IT teams do just that. With solutions that span all three areas, you can ensure student and staff devices are secure, the network is safeguarded from vulnerabilities, student data is protected, and everyone is safe walking around campus — all from one, easy-to-manage location. Attend this session to learn how to implement a similar solution in your higher education environment.

Speakers
JC

JT Clay

Consulting Sales Engineer, Cisco Meraki
SN

Shannon Nagel

Product Sales Specialist, Cisco Meraki


Thursday March 14, 2019 1:30pm - 2:30pm
Monroe

3:00pm

Crosstalk: Keeping A/V Infrastructure Secure
Have you recently integrated A/V devices with network capabilities? Do you know the proper steps to secure it, or have you considered the security risks your device poses to the network? We’ll talk about the security risk of networked devices, the importance of network security, demystify ‘security’ jargon and discuss resources your Security team can provide. Join VCU’s Media Support Services and Information Security team as we discuss this emerging field.

Speakers
avatar for Jesse Castellani

Jesse Castellani

Junior Risk Analyst, VCU
RN

Ryan Neilson

Security Operations Team Lead, VCU
avatar for Anthony Tran

Anthony Tran

Security Analyst, VCU



Thursday March 14, 2019 3:00pm - 4:00pm
Ampitheater

3:00pm

Implementing a Cloud Security that makes sense!
Cloud technologies have expanded what we do today from having an elastic data center, hyper computing availability, secure and deep storage, and applications at our fingertips. But all magic comes at a price! With availability comes surface attack area. This presentation will walk a user through the landscape of the Cloud and some examples of how to protect your data, staff, faculty, and students in a new model of security.

Speakers
avatar for Michael DArezzo

Michael DArezzo

Director of Security Services, SLAIT Consulting
20 years of IT Experience, 10 years in IT Security. My interests are security strategies, controls and policies, and penetration testing (Network, Web, Social Engineering). CISSP, CISA, and IT Management from University of Richmond


Thursday March 14, 2019 3:00pm - 4:00pm
Holley VII

4:15pm

Creating Security Action and Security Awareness Programs
Like many other small institutions, the University of Lynchburg has no dedicated security personnel. Yet I knew we needed to beef up internal security measures and launch a cyber security awareness program to improve the knowledge of all members of the campus community.

In this session, I will share the process and tools I used to create and implement a successful security plan and to create and launch a well-received cyber security awareness program across campus.

Speakers
avatar for Jackie Almond

Jackie Almond

Director, Information Technology & Resources, University of Lynchburg



Thursday March 14, 2019 4:15pm - 5:15pm
Holley IV
 
Friday, March 15
 

9:00am

Let's Talk MFA
George Mason is in the middle of a large scale rollout of Multi-Factor Authentication. During this interactive session, we will share what we have learned to date as well as facilitating discussion with our audience. Whether you have already rolled out MFA and have lessons learned to share or you're exploring MFA for use later, or somewhere in between, please join us for what should be a productive discussion.

Speakers
TH

Tracy Holt

Manager, Service Design, George Mason University
Tracy Holt is currently the manager of Service Design at Mason. Tracy leads projects related to the implementation of new services that integrate with Office365 and/or Mason's central authentication services.
avatar for John Prette

John Prette

Sr. IT Portfolio and Project Manager, George Mason University
John Prette is a business and technology leader with over 25 years of IT experience in IT Governance, Portfolio Management, Project Management, Business Analysis, Communications, process development, and software development. As the Senior IT Portfolio and Project Manager in George... Read More →


Friday March 15, 2019 9:00am - 10:00am
Holley IV

10:15am

Securing Access for Higher Ed with Cisco Duo
The cloud and mobility have changed academic culture. Students, faculty and staff need access to data from anywhere at any time and from any device they choose. This deperimeterization coupled with decentralization of IT creates a new set of security challenges that educational institutions must meet.

It’s critical to protect access to applications and data. And more than 300 educational institutions trust Duo to provide seamless and secure access to the resources and applications they need to connect students and staff to information.

Duo supports accredited U.S.-based institutions through InCommon and Internet2’s NET+ program, allowing them to deploy our Unified Access Security platform broadly, efficiently and cost-effectively. Please join us to learn how Duo’s Unified Access Security (UAS) can help you protect all users, all devices and any application on your institution’s network.

Speakers
SM

Shavon Marley

Virtual Sales Account Manager, Cisco Systems


Friday March 15, 2019 10:15am - 11:15am
Monroe

11:30am

Security SIG
Speakers
avatar for Darlene Quackenbush

Darlene Quackenbush

Information Security Officer, James Madison University
Darlene leads JMU’s information security program in the areas of security planning, risk and contingency management, and incident response. She also facilitates information technology policy development, strategic planning, and audit processes for JMU's Information Technology department... Read More →


Friday March 15, 2019 11:30am - 12:30pm
Holley I/II