Schedule

Tuesday, July 19

-
  • Beginner

    Leveraging the cloud for research shows great promise but many have hesitated due to legitimate concerns. In this session cloud security leader Cisco will clarify the true nature of the risk, qualify its severity and offer a proven 3-step path to neutralize it so that cloud-based research can become a more approachable possibility than ever before.

  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Beginner

    Worried about how to secure your data in the cloud? Learn how UC San Diego Health achieves HIPAA and NIST compliance in AWS to support researchers. We will discuss general patterns and common architectures to decouple protected data from processing and orchestration. Understand how to track where data flows through automation leveraging cloud native and partner solutions on AWS.

    Speakers:  Andrew Greaves, Enterprise Research Architect, UC San Diego Health; and Randy Ridgley, Principal Solutions Architect, AWS

  • Beginner

    We’ve long known that phishing and social engineering are the ways most organisations get compromised. Attackers know it’s much easier to find someone who will click than to find a working exploit for a modern operating system or browser. However, most organizations have very little idea which of their people receive sophisticated threats, targeted threats, or even large volumes of threats. We call these targets VAPs (Very Attacked People), and they may not be who you would—

-

-

Wednesday, July 20

-

-
  • Beginner

    Disruption from artificial intelligence is the “new normal” within the legal industry. By extension, universities are increasingly using AI to augment front and back-office operations. Although adoption of automating simple, repetitive processes with AI is becoming more common, many universities do not understand what they should expect from this technology. They face challenges defining a business-centric digital strategy for AI initiatives. This session will provide insight into best-practices for defining the elements of a successful digital strategy—

  • Beginner

    How do you build a secure cloud and infrastructure to ensure compliance and qualification for research grants?
     
    Campuses and health centers must meet the obligations related to information security, intellectual property, records, privacy, personal information and encryption stated in research grant opportunities.
     
    As enterprise boundaries continue to evaporate and security threats become more sophisticated, the challenges facing Higher Education security teams are increasing exponentially. Balancing user desire for a seamless experience with regulatory and compliance—

-
  • Beginner

    HPC and AI environments are overflowing with data and struggling with enough processing to leverage that data.  They are frequently siloed as are your traditional batch and newer container workloads.  How can we bridge these divides?

    With datacenter-scale reference architectures, designed specifically for the higher education and research space, you can shorten deployment times, ease operations, and consolidate these silos to provide high performance GPU compute to many different use cases and workloads.  Please join ePlus as—

  • Beginner

    The Sherlock Division at the San Diego Supercomputer Center (SDSC) at the University of California, San Diego has gone from being a federally funded project to a self-sustaining entity, delivering world-class solutions to organizations nationwide. The Sherlock Division’s agility, excellence of services, and continuous innovation enable it to self-sustain, as it is funded through grants and service agreements while not receiving any institutional support from UC San Diego or SDSC. This talk will share some insights on—

  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—