Schedule

Tuesday, July 18

-
  • Beginner

    UC IT leaders have joined with EDUCAUSE to commit to greater equity and inclusion in shaping the next generation of technology professionals and leaders. This conversation between UC’s Systemwide CIO and Vice Provost for Diversity and Engagement will help IT professionals understand why diverse and inclusive workplace environments are essential for more effective and creative teams of IT professionals. Participants will learn about real-life scenarios and the resources available to help create diverse and inclusive environments.  Participants will have opportunities—

  • Intermediate

    Fostering digital Inclusion and Accessibility is an ethical and legal responsibility of all IT professionals. To assist with this goal, the Office of the President funded Siteimprove as an accessibility scanning tool and training resource across UC. While introducing this tool at our campus UCSF, we began leading a culture change and developed some recipes for accessibility success.

    A good set of recipes help when planning a large event. We started with an appetizer for an initial warm—

  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Beginner

    It has been a full year since this speaker presented on her documented harassment and retaliation experiences in IT and across multiple investigative entities at UC. This presentation focuses on addressing these questions: 

    1. How have IT and the University responded to date and are these responses meaningful?
    2. Is IT a measurably safer and more inclusive place for women now than before the articles (see below)?
    3. Have campus investigative offices modified their policies and processes?   
    4. Is zero tolerance—
  • Beginner

    Our IT workforce has increasingly diversified, in demographics as well as thought.  Therefore it is critical to adapt, ensuring that we create and foster inclusive environments, structured to maximize opportunities to share knowledge and collaborate.  Roles that were never previously categorized as IT, many of which live in Analytics departments or on Informatics teams, are now directly contributing more than ever to the larger IT strategy.  In order to allow these new players to breakdown silos and—

  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    Mentoring, either as a mentor or as a mentee, is all about ideas: learning about new ways of approaching problems and being open to new ideas and ways of thinking. Mentoring programs are one of the best ways to build sustainable IT workforce. 

    The WHPC Mentoring Program is a mostly online, robust mentoring program connecting women from around the world with mentorship and support that will help them to achieve their full potential as HPC professionals. This program provides—

  • Beginner

    Have you ever been involved in a conversation or interaction where someone says or does something that demonstrates a lack of respect or inclusion based on a personal attribute such as gender, race, ethnicity, age, etc. and everyone freezes, no one knows what to say or do?    This session will present some anonymous real life examples and allow participants to practice techniques and responses to non-inclusive behavior as a recipient or supporter/ally. Our presentation will arm participants with ready responses in common—

  • Beginner

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    EDUCAUSE recently asked higher ed CIOs to sign a statement that recognizes the value of diversity, equity, and inclusion in the workplace. A number of UC location CIOs signed, pledging to take concrete actions both in their own organizations and as part of the larger higher ed community to foster diverse and inclusive environments. Come hear from several of our own—

-
  • Beginner

    Think about your cube-mate or office-mate.  Do you know what motivates them to get up and come to work?  Do you know what keeps them up at night? What do they dream about changing on your campus and in your city?  

    Relationships drive us.  Stories power those relationships.  Engagement at work will thrive and grow when people know each other - not just their names, but their passions, hopes, and fears.  Learn how to have a—

-

-
  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

  • Intermediate

    There is currently an effort to increase the ranks of trans and gender-nonconforming workers in the technology industry nationwide. In the UC we are expanding and diversifying our culture through Transgender Health Benefits, Nondiscrimination Policies, and the inclusion of all-gender restrooms. The UC also acknowledges that we have much to do to create a safer and inclusive campus climate for trans and gender-nonconforming people. In this talk we will learn about the history of trans people in—

Wednesday, July 19

-
  • Beginner

    Do you or your team enter into agreements for IT services, software, hardware or professional services? Does your Unit use Cloud solutions to solve your business problems?  If the answer is yes to any of those questions, then this panel session is for you.

    Earlier in this year, a systemwide workgroup rebuilt Appendix DS in order to make it simpler and easier to use, and to be Supplier friendly.

    In this session, our panel will discuss when—

  • Beginner

    UC has a systemwide contract for the Siteimprove web accessibility review tools, which are available to everyone at UC. Learn how you can use them to make sure your websites are accessible to people with disabilities. The tools regularly scan your public websites to check for and show you how to fix any accessibility issues with the web pages and PDF documents. The Siteimprove tools also support standards for quality assurance (spelling, broken links), SEO, and p—

-
  • Beginner

    At the request of the presenters, this session was not recorded. - UCTech 2019 Planning Committee

    IT professionals face unbounded demand, constantly shifting technologies, and limited resources. As a result, our approaches to problem-solving require grit and perseverance and can too quickly exhaust us if we lack a framework and shared mindtools to manage our own and our teams’ expectations, not to mention those of our campus stakeholders.  In this session, two CIOs describe their theory and—

  • Intermediate

    Automated tools can do a lot to help you with website accessibility. But to really achieve accessibility, you also need to understand and incorporate key accessibility concepts into your website and web app design. Join this session to learn more advanced skills to make your websites and web apps accessible. Topics covered will include best practices for website design, how to pick platforms and frameworks, when to use ARIA, and how to use all your development tools—

-
  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Beginner

    Cognitive diversity is the recognition that people differ in their perspectives and how they process information. A greater diversity of thought allows teams to tackle uncertain, complex situations with far greater success than less diverse teams. In fact, Harvard Business Review has identified cognitive diversity as a key predictor of team performance and success.

    This session will begin with a definition of cognitive diversity, with an emphasis on its value to the organization. Second, the session will—

  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

-