Schedule

Tuesday, July 18

-

-
  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    Worried about how to secure your data in the cloud? Learn how UC San Diego Health achieves HIPAA and NIST compliance in AWS to support researchers. We will discuss general patterns and common architectures to decouple protected data from processing and orchestration. Understand how to track where data flows through automation leveraging cloud native and partner solutions on AWS.

    Speakers:  Andrew Greaves, Enterprise Research Architect, UC San Diego Health; and Randy Ridgley, Principal Solutions Architect, AWS

  • Beginner

    We’ve long known that phishing and social engineering are the ways most organisations get compromised. Attackers know it’s much easier to find someone who will click than to find a working exploit for a modern operating system or browser. However, most organizations have very little idea which of their people receive sophisticated threats, targeted threats, or even large volumes of threats. We call these targets VAPs (Very Attacked People), and they may not be who you would—

  • Beginner

    Like a river with a flood, or a forest with a fire, sometimes you need to destroy something to renew it. Our IT Governance Committee on Technology & Architecture had become stagnant, and participation waned. Our new steering committee chair asked each committee to review its charge and focus, to ensure we were maximizing our impact. We disbanded the committee and brought together business and technical leaders to create something from the ashes. We set out to—

-

-

-
  • Advanced

    Brief: This workshop will describe steps to stand-up a centralized Project Management Office in an IS environment.  The first half of the workshop will discuss one campus’s 12-month start-up journey, including the Project Management Maturity Model framework, STARS assessment, SWOT analysis, Visioning, Planning, Staff Development, Performance Improvement, and Execution... along with the “magic” key ingredients for success. The second half of the workshop will lead individuals through a STARS profile, mini-maturity audit and readiness checklist.

    Materials: An—

-
  • Intermediate

    Managing large projects and all the tasks and resources that go along with them may seem daunting or overwhelming. But what if you could simplify the project management process but get even more successful results? What if you could put aside complex concepts like “Dependency Mapping”, “Resource Leveling”, and “Work Breakdown Structures” in lieu of a straightforward customer-focused process? 

    The ITS-PRO ontology stands for Project Management, Reporting, and Optimization and is based on breaking down—

  • Beginner

    Answering the question that will be asked by your board: is it worth the risk to secure the digital workplace?
    We will discuss the business cost of a cyber attack from the perspective of a secure foundation for a digital workplace

    How to create a Secure by design location all while enabling your employees to work from wherever and however they desire.

  • Beginner

    Whether designing an app interface or a business process, the same philosophical principles drive both Lean Six Sigma and lean software design and development. By combining the two and understanding that they are complementary and mutually reinforcing, we can leverage our product lifecycle to achieve both process improvement and core UX goals. In this talk, we’ll dive into each stage of the Lean Six Sigma methodology, and how it applies to UX design with real-world examples and—

  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

Wednesday, July 19

-

-
  • Beginner

    IT project stakeholders such as administrators and faculty often want detailed, specific estimates about project cost before they agree to sponsor a project. Unfortunately, as any IT project manager knows, project plans are often full of educated guesses and complete unknowns, which makes any estimate highly uncertain. This session will introduce attendees to strategies for making and discussing IT project estimates that more effectively communicate that uncertainty to stakeholders. We will discuss French and Raven’s power theory,—

  • Beginner

    Disruption from artificial intelligence is the “new normal” within the legal industry. By extension, universities are increasingly using AI to augment front and back-office operations. Although adoption of automating simple, repetitive processes with AI is becoming more common, many universities do not understand what they should expect from this technology. They face challenges defining a business-centric digital strategy for AI initiatives. This session will provide insight into best-practices for defining the elements of a successful digital strategy—

  • Beginner

    How do you build a secure cloud and infrastructure to ensure compliance and qualification for research grants?
     
    Campuses and health centers must meet the obligations related to information security, intellectual property, records, privacy, personal information and encryption stated in research grant opportunities.
     
    As enterprise boundaries continue to evaporate and security threats become more sophisticated, the challenges facing Higher Education security teams are increasing exponentially. Balancing user desire for a seamless experience with regulatory and compliance—

  • Beginner

    This past year at UC Santa Cruz, we changed our development methodology from Waterfall to Agile. This presentation shares some observations, experiences, and lessons our web application development team learned within the first 6 months of switching.

    We'll discuss:

    • Why we switched to Agile.
    • How our new development team is structured.
    • Things we changed over the first 6 months.
    • Some of the lessons we learned.
    • Take-aways from the developer perspective.
    • And, in hindsight, whether we think it—

-

-
  • Beginner

    HPC and AI environments are overflowing with data and struggling with enough processing to leverage that data.  They are frequently siloed as are your traditional batch and newer container workloads.  How can we bridge these divides?

    With datacenter-scale reference architectures, designed specifically for the higher education and research space, you can shorten deployment times, ease operations, and consolidate these silos to provide high performance GPU compute to many different use cases and workloads.  Please join ePlus as—

  • Beginner

    The Sherlock Division at the San Diego Supercomputer Center (SDSC) at the University of California, San Diego has gone from being a federally funded project to a self-sustaining entity, delivering world-class solutions to organizations nationwide. The Sherlock Division’s agility, excellence of services, and continuous innovation enable it to self-sustain, as it is funded through grants and service agreements while not receiving any institutional support from UC San Diego or SDSC. This talk will share some insights on—

  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Intermediate

    As the lines between software, hardware and cloud products become increasingly blurred, more IT products are acquired as services provisioned in partnership with external suppliers.  Additionally, every institution business process owner, whether or not part of the IT organization, needs IT solutions (increasingly SaaS) to achieve their business outcomes.  These changes move the institutional role more from building and running IT, to managing a complex set of interrelated services and supplier relationships.  The rights and responsibilities of—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    UCXX IT PPMO struggled to keep up with demand for new JIRA projects and Confluence spaces. Result was frustrated teams and Cloud instances popping up around campus.

    UCXX and IBM have teamed up to see how using Smart Chat technology and Robotic Process Automation (RPA) can make the experience of requesting new Jira Project and Confluence Spaces go from "Why is it taking so long to get my stuff created" to "Are you serious, that is wicked—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

  • Beginner

    Governance plays a critical role in vetting, approving, and prioritizing IT requests.  Common pitfalls in the life cycle of a service request typically result from inaccurate assumptions that all requests ought to be completed, and/or that all requests are of equal importance.  Often, such assumptions lead IT teams to allocate resources and expertise to requests that are high effort/low impact.  Likewise, this cultural phenomenon leads to a false sense of user-empowerment when it comes to the requesting—

-
  • Beginner

    It’s not just about standing up IT services anymore!  Project success is also about the quality of the underlying business processes and their adoption that leads to successful outcomes…or not. We all know how important business processes are to operating seamlessly and efficiently. And we know how challenging it is to create, optimize and maintain those processes. Learn how one campus is leveraging a state of the art Business Process Mapping (BPM) tool to address these challenges—