Schedule

Tuesday, July 18

-
  • Intermediate

    After building a robust technology stack that includes a data lake and uses AWS to capture learning data from Canvas and campus partners, our university is now developing a custom platform for academic advisors to access and visualize student information. This project supports our ability to promote student success by identifying at-risk students earlier than has ever been possible. This presentation outlines our technical architecture, campus partnerships, and ongoing efforts to apply Canvas Data and other learning—

  • Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We are undergoing a campus-wide initiative to develop new digital learning experience delivery modes and business model. We seek to deploy offerings across multiple platforms to allow for a portfolio of online offerings, from Free to Freemium to Paid. This ecosystem approach is desirable in order to facilitate multiple architectures best suited for particular programs and offerings.

    To achieve this goal, we have—

  • Beginner

    Leveraging the cloud for research shows great promise but many have hesitated due to legitimate concerns. In this session cloud security leader Cisco will clarify the true nature of the risk, qualify its severity and offer a proven 3-step path to neutralize it so that cloud-based research can become a more approachable possibility than ever before.

  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Beginner

    For the Adobe Fellows program, faculty from a range of departments who teach courses in American Cultures—a universal undergraduate requirement with an emphasis on the ethnic diversity of sociopolitical and historical narratives within the United States—develop assignments in which students create projects using the Adobe CC suite of programs, including videos, podcasts, infographics, and Spark webpage presentations.

    The Adobe Fellows program was conceived to:

    • Enrich student learning by promoting innovative methods for engaging with and representing local—

  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    Worried about how to secure your data in the cloud? Learn how UC San Diego Health achieves HIPAA and NIST compliance in AWS to support researchers. We will discuss general patterns and common architectures to decouple protected data from processing and orchestration. Understand how to track where data flows through automation leveraging cloud native and partner solutions on AWS.

    Speakers:  Andrew Greaves, Enterprise Research Architect, UC San Diego Health; and Randy Ridgley, Principal Solutions Architect, AWS

  • Beginner

    We’ve long known that phishing and social engineering are the ways most organisations get compromised. Attackers know it’s much easier to find someone who will click than to find a working exploit for a modern operating system or browser. However, most organizations have very little idea which of their people receive sophisticated threats, targeted threats, or even large volumes of threats. We call these targets VAPs (Very Attacked People), and they may not be who you would—

  • Intermediate

    Faculty are increasingly using Canvas to enhance their face-to-face classes and this has led to a growing interest in online and hybrid courses, which is only further encouraged by our university’s Digital Learning Initiative. However, our department doesn’t have the resources to work directly with every interested faculty member. We needed to find a scalable solution that would allow for interested faculty to develop quality online and hybrid courses and digital course components without having to work—

-

-
  • Beginner

    How can user experience (UX)  techniques be applied to instructional technology services? We’ll describe a case study where we researched and analyzed the experience of instructors teaching large classes (i.e. those that impact the greatest number of students) to build a Journey Map, which in turn helped us identify opportunities to improve our suite of digital learning services. 

  • Beginner

    Answering the question that will be asked by your board: is it worth the risk to secure the digital workplace?
    We will discuss the business cost of a cyber attack from the perspective of a secure foundation for a digital workplace

    How to create a Secure by design location all while enabling your employees to work from wherever and however they desire.

  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    The Student Activity Hub (SAH) combines information about all graduate and undergraduate students into a single repository. Academic analysts, advisors, and faculty can access the curated data through supported reporting and visualization tools: Tableau and Cognos. 

    In the initial phase, the SAH is designed to make institutional and operational reporting easier by providing access to 15 years’ worth of student data—

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

  • Beginner

    How do you effectively support a network of over 1,500 concurrent courses, whose online pages are collectively accessed over 2 million times each week? In supporting a customized, self-hosted learning management system, data and data visualizations are a foundational element of our decision-making. Take a look inside our tool kit and find out how we use different resources to help us monitor the pulse of our learning management system. Google Analytics, Splunk, Tableau, and other custom reporting and data visualization tools—

Wednesday, July 19

-

-
  • Beginner

    Over the past two years, with input and vision from researchers building high-performance systems such as the Pacific Research Platform (PRP), we have built out a hybrid cloud/on-premises environment for student Data Science and Machine Learning, supporting both coursework and student-focused independent study research.  The system is now used by 1300 students per quarter across multiple departments and disciplines, from Engineering, to Cognitive Science, to Visual Arts.   We will share technical and non-technical lessons learned in the—
  • Beginner

    Disruption from artificial intelligence is the “new normal” within the legal industry. By extension, universities are increasingly using AI to augment front and back-office operations. Although adoption of automating simple, repetitive processes with AI is becoming more common, many universities do not understand what they should expect from this technology. They face challenges defining a business-centric digital strategy for AI initiatives. This session will provide insight into best-practices for defining the elements of a successful digital strategy—

  • Beginner

    How do you build a secure cloud and infrastructure to ensure compliance and qualification for research grants?
     
    Campuses and health centers must meet the obligations related to information security, intellectual property, records, privacy, personal information and encryption stated in research grant opportunities.
     
    As enterprise boundaries continue to evaporate and security threats become more sophisticated, the challenges facing Higher Education security teams are increasing exponentially. Balancing user desire for a seamless experience with regulatory and compliance—

  • Beginner

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    Artificial intelligence-supported business processes are changing how we do business, how we manage risk, how we communicate, and how we organize. We have started down the path of building the foundation to enable our organization to benefit from these innovations. In our talk, we will cover:  
    - how the data and data warehouse of the future is changing  
    - how we—

-
  • Beginner

    Attendees will be able to see how they can leverage their existing systems to create opportunities for learning and development outside of the classroom that's accessible for staff, students, and anyone with the appropriate credentials (as needed). Specifically this session will cover how to start a social learning site, and a Transferable Skills Library using Drupal 8, a word analyzation tool, e-learning videos, and job descriptions. Additionally we'll review how to measure the impact of these efforts—

-
  • Beginner

    HPC and AI environments are overflowing with data and struggling with enough processing to leverage that data.  They are frequently siloed as are your traditional batch and newer container workloads.  How can we bridge these divides?

    With datacenter-scale reference architectures, designed specifically for the higher education and research space, you can shorten deployment times, ease operations, and consolidate these silos to provide high performance GPU compute to many different use cases and workloads.  Please join ePlus as—

  • Beginner

    The Sherlock Division at the San Diego Supercomputer Center (SDSC) at the University of California, San Diego has gone from being a federally funded project to a self-sustaining entity, delivering world-class solutions to organizations nationwide. The Sherlock Division’s agility, excellence of services, and continuous innovation enable it to self-sustain, as it is funded through grants and service agreements while not receiving any institutional support from UC San Diego or SDSC. This talk will share some insights on—

  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Beginner

    Funding bodies, campus initiatives, and professional associations have recently placed an increasing importance on training as a way to help researchers, librarians and IT staff better engage with the expanding array of tools, research techniques, and vast amounts of data.  The objective of many of these training programs is to improve the skills of researchers, librarians and IT staff in working with data. But how do we do this effectively in a way that promotes inclusivity? The—

  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

-

-
  • Beginner

    Standard ED5A of the Liaison Committee on Medical Education standards for accreditation of a medical school states that:

    ED5A. A medical education program must include instructional opportunities for active learning and independent study to foster the skills necessary for lifelong learning.

    At our medical school, we have incorporated instructional technology tools into the learning environment to enhance learner engagement and collaboration and to promote active learning. In this session we will:

    •    Provide participants with an—

  • Beginner

    Instructional media is ubiquitous in higher education. Whether it is lecture-captures, just-in-time instruction, fully produced videos, or quickly recorded feedback, we are all creating a significant amount of media! In this presentation, you'll hear the story of one campus' approach to supporting media capture and providing media management solutions. We started with a set of requirements, organized research into trends (and forward looking vision), asked for vendor demos, evaluated solutions, and made a selection. The final solution,—