Girvetz Hall - Room 2123

Girvetz Hall

UC Santa Barbara
Santa Barbara, CA 93106
United States

Room 2123

Tuesday, July 19

-
  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Beginner

    Like a river with a flood, or a forest with a fire, sometimes you need to destroy something to renew it. Our IT Governance Committee on Technology & Architecture had become stagnant, and participation waned. Our new steering committee chair asked each committee to review its charge and focus, to ensure we were maximizing our impact. We disbanded the committee and brought together business and technical leaders to create something from the ashes. We set out to—

-

-
  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

Wednesday, July 20

-

-
  • Beginner

    In an effort to streamline and modernize our application development process, Educational Technology Services has started to implement new project management practices. We’ve recently started to create interactive, high-fidelity web application prototypes to promote collaborative conversations around the app’s structure, user interface, and workflow, as well as a collective understanding on the scope of the app’s features. The goal of this change is to reduce the friction between developers and stakeholders to create a final product that—

-
  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

-