Schedule
Tuesday, July 19
-
Sponsor
Hatlen Theater
Beginner
Leveraging the cloud for research shows great promise but many have hesitated due to legitimate concerns. In this session cloud security leader Cisco will clarify the true nature of the risk, qualify its severity and offer a proven 3-step path to neutralize it so that cloud-based research can become a more approachable possibility than ever before.
Securing Information, Assets and Systems
Girvetz Hall - Room 2123
Beginner
According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks. The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware. This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers. Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —
-
Securing Information, Assets and Systems
SSMS - Room 1301/1302
Beginner
Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—
Sponsor
MCC - Theater
Beginner
Worried about how to secure your data in the cloud? Learn how UC San Diego Health achieves HIPAA and NIST compliance in AWS to support researchers. We will discuss general patterns and common architectures to decouple protected data from processing and orchestration. Understand how to track where data flows through automation leveraging cloud native and partner solutions on AWS.
Speakers: Andrew Greaves, Enterprise Research Architect, UC San Diego Health; and Randy Ridgley, Principal Solutions Architect, AWS
Beginner
We’ve long known that phishing and social engineering are the ways most organisations get compromised. Attackers know it’s much easier to find someone who will click than to find a working exploit for a modern operating system or browser. However, most organizations have very little idea which of their people receive sophisticated threats, targeted threats, or even large volumes of threats. We call these targets VAPs (Very Attacked People), and they may not be who you would—
-
Sponsor
Mosher Alumni Hall
Beginner
There is only audio for this recording so, with permission from the presenter, we have provided the slide deck and any supplemental materials in the Session Files section below. - UCTech 2019 Planning Committee
Dasher solutions architects will showcase real life projects where we leveraged Aruba Networks wireless solutions including ClearPass NAC and Meridian beacon technology for mobile engagement. We’ll also be sharing technical insight into Hewlett Packard Enterprise Synergy and the new HPE Primera storage offering.—
-
Sponsor
Mosher Alumni Hall
Beginner
Answering the question that will be asked by your board: is it worth the risk to secure the digital workplace?
We will discuss the business cost of a cyber attack from the perspective of a secure foundation for a digital workplaceHow to create a Secure by design location all while enabling your employees to work from wherever and however they desire.
Intermediate
At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee
We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.
- How to learn to use the SIEM
- Best use of vendor resources
- What we expected & what we got
- Leveraging for a small team
- Metrics vs Measurements/Actionable Numbers
- Runbook-style procedures
- Extending to the cloud
- Useful dashboards/reports
- What we would do differently
Securing Information, Assets and Systems
UCEN - SB Mission Room
Intermediate
When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.
This talk will present our experience securing a serverless application. It is for developers, system administrators, and—
Securing Information, Assets and Systems
North Hall - Room 1109
Intermediate
This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.
Wednesday, July 20
-
Securing Information, Assets and Systems
Girvetz Hall - Room 2123
Beginner
Do you or your team enter into agreements for IT services, software, hardware or professional services? Does your Unit use Cloud solutions to solve your business problems? If the answer is yes to any of those questions, then this panel session is for you.
Earlier in this year, a systemwide workgroup rebuilt Appendix DS in order to make it simpler and easier to use, and to be Supplier friendly.
In this session, our panel will discuss when—
Sponsor
MCC - Theater
Beginner
Hybrid cloud, multi-cloud, HPC, and big data don't have to be complex! Learn how Google Cloud Platform can be an enterprise platform for securely tying together your legacy systems and public clouds to build compelling solutions for researchers, faculty, staff, and students across your campus.
Sponsor
Mosher Alumni Hall
Beginner
Public clouds offer a lot of benefits due to their inherent agility and scalability. However, it is easy to blow up your budget without adequate visibility and control over cloud consumption. In this session, we will talk about how UC San Diego grappled with spending dozens of hours per month to manually figure out who was consuming what resources across their hundreds of AWS accounts. Nutanix was able to help UC San Diego build automated chargeback reports—
-
Sponsor
MCC - Theater
Beginner
Disruption from artificial intelligence is the “new normal” within the legal industry. By extension, universities are increasingly using AI to augment front and back-office operations. Although adoption of automating simple, repetitive processes with AI is becoming more common, many universities do not understand what they should expect from this technology. They face challenges defining a business-centric digital strategy for AI initiatives. This session will provide insight into best-practices for defining the elements of a successful digital strategy—
Sponsor
Mosher Alumni Hall
Beginner
How do you build a secure cloud and infrastructure to ensure compliance and qualification for research grants?
Campuses and health centers must meet the obligations related to information security, intellectual property, records, privacy, personal information and encryption stated in research grant opportunities.
As enterprise boundaries continue to evaporate and security threats become more sophisticated, the challenges facing Higher Education security teams are increasing exponentially. Balancing user desire for a seamless experience with regulatory and compliance—
-
Sponsor
Mosher Alumni Hall
Beginner
HPC and AI environments are overflowing with data and struggling with enough processing to leverage that data. They are frequently siloed as are your traditional batch and newer container workloads. How can we bridge these divides?
With datacenter-scale reference architectures, designed specifically for the higher education and research space, you can shorten deployment times, ease operations, and consolidate these silos to provide high performance GPU compute to many different use cases and workloads. Please join ePlus as—
Sponsor
MCC - Theater
Beginner
The Sherlock Division at the San Diego Supercomputer Center (SDSC) at the University of California, San Diego has gone from being a federally funded project to a self-sustaining entity, delivering world-class solutions to organizations nationwide. The Sherlock Division’s agility, excellence of services, and continuous innovation enable it to self-sustain, as it is funded through grants and service agreements while not receiving any institutional support from UC San Diego or SDSC. This talk will share some insights on—
Beginner
Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors. Discover how your organization can save time by using AWS Secrets Manager.
See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required. Watch and learn how we modified our Java—
Securing Information, Assets and Systems
Girvetz Hall - Room 2127
Beginner
Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.
In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—
-
Securing Information, Assets and Systems
Girvetz Hall - Room 2123
Beginner
Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.
This presentation will trace the path that we took from this beginning to functional—
Securing Information, Assets and Systems
Girvetz Hall - Room 2127
Intermediate
Title
Securing International Student & Scholar Success
Summary
The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—