Security and Privacy

Platinum Sponsor: Cisco - The Multicloud Approach: Answering Cross-Technology Challenges with Cisco Multicloud Portfolio

Managing multiple clouds doesn’t need to be complicated.  Experience how Cisco and our partner ecosystem bring together essential networking, security, analytics and management solutions to simplify how you connect, protect and consume your chosen Clouds.  Bringing together Cisco’s heritage of networking and security and aligning with today’s modern application architectures and new innovations so Cisco can help deliver on your mutlicloud strategy.

Security and Privacy
Advanced

Constructing the Cyber-Risk Talent Cistern (NEWLY ADDED SESSION)

David Rusting

The challenges of attracting and retaining cybersecurity talent have increased over the past several years, which puts the saying "necessity is the mother of invention" to the test. This session will explore the market forces behind the talent demand, the unique challenges it presents to UC, and how UC is collectively working to address it.  We will also explore once you have the talent, how do you keep them motivated and engaged?  This will be an interactive session, with industry data, live polling, anecdotes from across UC, and a four-step process toward filling your "cyber-cistern".

Professional Development
Security and Privacy
Beginner

Looking Through Your Windows: The Personal and Professional Privacy Implications of Using the Windows Operating System

Toby Barber

This session will discuss privacy and security issues with the residual artifacts created when using the Windows operating system. The features and functionality of the Windows operating system and applications provide a rich user experience but along with the usability benefits comes privacy trade-offs and forensic evidence for security investigations.

Security and Privacy
Intermediate

Secure and Collaborative UC Data Exchange

Ilvana Mesic

As part of the UC system wide Cyber Security Initiative, UCOP Information Technology Services partnered with each campus and the UC Production Control Shared Services Center (PCSSC) to migrate all UCOP file transfers off the existing UCOP server. The project goal is to improve the security of our UC data being exchanged between the campuses and UCOP, by improving the credentials used, protecting data-in-motion, protecting data-at-rest, improving management and monitoring of data exchanges.

Security and Privacy
Beginner

Endpoint Engineering Panel

Jeremy Phillips / Cosmo Martinez / Paul Sosbee / Alex Kim / Steve Pigg

The cost of care-and-feeding for user endpoints like desktop and laptop computers and mobile devices throughout their lifecycle typically far exceeds the purchase cost. Endpoint engineering (also called desktop engineering) is the practice of managing those costs, improving manageability and reliability of endpoints, securing endpoints, managing endpoint inventory, and generally improving the user experience of using endpoints. Many UC campuses engage in endpoint engineering activities.

Security and Privacy
Beginner

Securing Enterprise Applications in AWS

Byron Walker / Graham Freeman

In less than 18 months, UC Santa Cruz moved two major mission-critical applications - consisting of nine distinct components - from on-prem to the cloud.  In this talk, we will discuss at a high level:

  • the impetus behind these changes,

  • the security and organizational workflow benefits,

  • the environmental sustainability impact,

as well as some of the nitty-gritty:

Security and Privacy
Intermediate

Multi-Factor Authentication at UCOP and beyond

Eric Goodman / David Rusting

This session will begin with an overview of UCOP's MFA deployment, key decisions and lessons learned. Next we'll compare UCOP's solution to what other UC locations have done. Finally, we'll discuss how location MFA deployments can support stronger authentication for system-wide applications. 

Security and Privacy
Intermediate

Application Whitelisting And Your Managed Desktops

Aakash Shah / Jeremy Paje

Have you considered deploying Application Whitelisting for your managed desktops?  We'll discuss how the central campus IT unit at UC Irvine has set up Microsoft AppLocker in Windows 7 and Windows 10, the benefits and productivity improvements we have experienced for both the Desktop team as well as the clients, the challenges we have faced, and the shortcomings of AppLocker.

Security and Privacy
Intermediate

Managing User Access: How to Manage the Herd

Jeffrey Crawford / Warren Leung

Is the Service Portfolio for your organization growing? Is your organization taking a cloud first strategy? Have you ever wondered how you will manage access between all your on premises and cloud services? Come see how UCLA and UCSC are tackling their role and access management challenges.

Security and Privacy
Technology and Security Policy
Intermediate