Schedule

Tuesday, July 18

-
  • Beginner

    Starting with a Rose-Bud-Thorn activity last spring, over the last year, our campus has created an engaging goal planning project. This project includes everyone in IT working together on teams to achieve strategic goals that will move the department forward. This project was designed to promote communication and collaboration while giving everyone shared ownership in defining and achieving the goal. For this presentation, we will describe the process and then discuss outcomes and lessons learned.

  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    Phrases never uttered at a modern UC campus:

    • “Sure, we have enough room for all our staff.”
    • “We actually have too many conference rooms.”
    • “We want to do less collaboration. So, we’re going to keep people spread out and siloed.”

    One UC tech department finally said, “Enough is enough!” and decided to do something about it. The result: A complete gutting of the office suite, a year-long relocation, and the resulting modern, open office environment. Walls replaced—

-
  • Beginner

    Do you have trouble connecting with your clients and customers? Perhaps you are challenged working with your boss or colleagues or would like to increase your confidence to advance your career. This workshop will teach you the 5 points in the Self-coaching model; a framework to classify and categorize all situations. This is a technique used to monitor personal effectiveness by uncovering a higher self-awareness. Use the self-coaching model to monitoring undesired outcomes. Participants will learn how to effectively self-coach, create an individual growth plan—

-
  • Beginner

    There is no recording for this session. The presenters have opted to provide the slides for attendees. These can be downloaded below in the Session Files section - UCTech 2019 Planning Committee

    Setting a workplace goal is easy but accomplishing that goal can be incredibly hard. Personal blockers such as negative talk, fear, procrastination and perfectionism can sink one's efforts before they start. Conversely, a focused effort, support, and sponsors can help one achieve even the most—

  • Beginner

    Whether you have team members who are off-site employees or you’re working on a project that involves cross-campus collaboration, remote work comes with its fair share of challenges and considerations. If remote work isn’t ingrained into your department’s culture, problems won’t be far behind. Projects can be delayed because dispersed teams aren’t used to communicating with out-of-office colleagues. Discontent may simmer if in-office workers don’t feel comfortable contacting off-site ones. Your stakeholders might feel that your team—

-
  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Beginner

    Whether you want to learn a new skill, increase your chances for landing a new job, or just want to collaborate with other like-minded individuals on projects, networking is an essential tool.

    In this session, the speaker will share how the use of effective networking brought their department new clients.

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

Wednesday, July 19

-

-

-
  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

  • Beginner

    We often joke that we need to "manage our manager." What do IT staff really want? How do we create an environment where people feel that their skills are appreciated and utilized? How does that affect retention? I'd like to analyze some issues that cause conflict in the IT world. Then, we will discuss some strategies for making more accurate project estimates and balancing work and tasks, and what changes we can make.

-
  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Beginner

    At the request of the presenter, the session recording will not be posted. Please reach out to the presenter with any questions. - UCTech 2019 Planning Committee

    Successful individuals are enhanced by ongoing professional and leadership development. Douse some fuel with enriched mentoring aligned to individual career interest then you shall see your gems taking their true form.   Join us and learn how our IT/CS Development and Mentorship Program (DMP) has grown from infancy four years ago—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

-
  • Beginner

    With the goal of starting COPs at all UC campuses, this workshop will show you how to leverage resources to build a broad and diverse network of practitioners in:

    Our Business Excellence Community of Practice (BECoP) is a consortium of these local communities of practice that has been growing and thriving and has lessons, tips and tools to share. This community serves as a tool for—

  • Promoting Growth and Retention in IT
    Hatlen Theater

    Beginner

    I will talk about hiking the Pacific Crest Trail and wilderness backpacking in general. I will bring my backpack and unpack it to show the gear I use/used and answer any questions about hiking the PCT, especially from the perspective of being a solo woman hiker.

    People in tech should step away from tech now and then and being alone in the woods is one way to refresh oneself as well as trigger personal growth. Solo hiking—

  • Beginner

    We hear the importance of having inclusive, collaborative teams, but often lack effective tools and practices needed to support this change.  To truly leverage diversity within teams, they need to actively foster open communication and dialogue, prioritizing different perspectives as input into decisions.

    Drawing from our experience implementing Agile methodologies and inclusive meeting practices within our IT department, we will walk through several techniques used at the group, divisional, and departmental level that help individuals be heard,—