Schedule

Tuesday, July 18

-

-
  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    In this session, you will learn how mobile app design can be strategically leveraged in innovative ways to make data collection easier and to increase participant engagement. This information includes insights on user-centered approaches for applying design thinking methodology and includes a discussion of design best practices. Case studies of research apps for special populations will be demonstrated.

-
  • Beginner

    SeedMeLab is a set of modular building blocks to create powerful data management and data sharing websites. It enables research teams to manage, share, search, visualize, and present their data in a web-based environment using an access-controlled, branded, and customizable website they own and control. It supports storing and viewing data in a familiar tree hierarchy, but also supports formatted annotations, lightweight visualizations, and threaded comments on any file/folder. SeedMeLab can be easily extended and customized to support metadata, job parameters, and—

  • Intermediate

    There is no recording for this session. The presenters have opted to provide the slides for attendees. These can be downloaded below in the Session Files section - UCTech 2019 Planning Committee

    The battle to make research computing more accessible and secure, while extremely engaging, remains complex. This talk will focus on some of the cutting edge containerized research computing implementations that UCSF has designed, attempted to expand, and used at the Center for Digital Health Innovation—

  • Intermediate

    This session will reveal the journey that the UCLA Web Services Team is going through in transitioning from a traditional web development shop to a data first web services organization in support of research and researchers. Areas of focus will include transitioning from traditional infrastructure to cloud infrastructure as-a-service, APIs for data sharing, and creating new knowledge through collaboration.

    Because research IT has become a commodity, we need to look for other avenues for adding value. One way of doing this—

-
  • Intermediate

    In early 2018, our campus rolled out a AWS environment for research computing with PHI, limited to a certain number of use cases, the idea being that if a researcher has a use case matching an approved one, they will have a much more streamlined option to start working on AWS, while still meeting all the security and compliance requirements. We also limited this to a few research projects at first so that we could refine the—

  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Beginner

    Research facilitation is serious business. Such support is critical to the research and research-coupled academic enterprise. Annual sponsored research in the UC System has grown to over $6 billion dollars (2016-17), yet national sponsors are requiring more external collaboration and are scrutinizing the IT infrastructure that supports research projects. All of this requires complex IT solutions and technology expertise - it is no longer possible for the researcher to act independently, except for the very largest of—

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

Wednesday, July 19

-
  • Beginner

    Do you or your team enter into agreements for IT services, software, hardware or professional services? Does your Unit use Cloud solutions to solve your business problems?  If the answer is yes to any of those questions, then this panel session is for you.

    Earlier in this year, a systemwide workgroup rebuilt Appendix DS in order to make it simpler and easier to use, and to be Supplier friendly.

    In this session, our panel will discuss when—

  • Beginner

    At the request of the presenter, the session recording will not be posted. Please reach out to the presenter with any questions. - UCTech 2019 Planning Committee

    Several teams at our campus are building a research data platform, called Information Commons. Along with software tools and data models this forms an infrastructure serving the campus research community with many different types of de-identified clinical data. Currently available/planned data are electronic health records, images, clinical notes, omics and—

-
  • Intermediate

    ArcGIS is a powerful suite of spatial tools that scales to private enterprises, small cities, and likewise, universities. Structuring enterprise tools in a highly federated environment, such as a university, presents unique challenges, but when done correctly enables researchers to utilize an adaptable research toolkit and collaborate effectively without the overhead of administrative resource constraints. In this session, GIS and IT Professionals from multiple campuses, as well as from the GIS software company, Esri Education Team, will—

-
  • Beginner

    Information security of research data is often an afterthought, until there is a data emergency.  We, in our department, have collaborated with data governance, security, CTSI, and privacy, to establish a procedural and technical plan to help ensure the security of our data delivery.  We have focused on 3 methods to improve our IS: quick disclosure, recurring data requests, and Service Now practices to tighten up our security methods.  In this session I will review these methods—

  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    There is only audio for this presentation so, with permission from the presenter, we have provided the slide deck and any supplemental materials in the Session Files section below. - UCTech 2019 Planning Committee

    Recently we have launched a new initiative in our institution called “Research Enablement” . This initiative has paved the way for IT to understand the research community’s technology needs, so that we can provide them with secure and sophisticated IT solutions to conduct—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Intermediate

    Researchers generate lots of data, and want to store all of it.  As a Research IT group supporting labs and groups with over 1,250 TiB of primary storage, we've built storage solutions of all sizes.  In this session, we'll go over our current solutions for groups with storage needs in the following categories: less than 2 TiB, 2 TiB-200 TiB, and 300+ TiB.  We'll talk about systems built on both flash and magnetic drives, and discuss backup,—

  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

  • Beginner

    Many research support groups across the UC system are not engaging with (or may be completely unaware of) the many regional and national organizations that exist to support research IT professionals. As such, they are missing the chance to connect with peers, learn about how others are addressing challenges, and what good practices are emerging. This leads to time and resources lost to reinventing wheels, and ultimately to less effective support of research on our campuses. Organizations in—

-
  • Advanced

    As the University of California, San Francisco prepares for a containerized future across many different platforms, environments, and teams, the School of Medicine Technology Services team (SOMTech) has begun experimenting with cross-platform containerization solutions. In this experimental architecture, deployment, and development effort, the School of Medicine has built and tested a multi-tenant Kubernetes solution on top of its existing Amazon Research Cloud implementation (ARC + Elastic Kubernetes Service) previously described in the 2018 talk Accelerating Secure Medical—

  • Beginner

    Many research computing services are seeing rapid growth in the use of virtual machine (VM) and container images to support research computation, applications, and workflows (Belmann et al., 2015). These images are used across a range of compute models and disciplines. Researcher interest in VMs and containers is driven by a wide range of considerations, including need to provision and run VM images when using cloud resources; portability of environments to multiple computational resources or platforms; efficiency in—