Welcome to Indianapolis and Security 2012!

31
WELCOME TO INDIANAPOLIS AND SECURITY 2012!

description

Welcome to Indianapolis and Security 2012!. Content, Networking, & Next Steps: How To Make the Most of Your Conference Experience!. Larry Conrad. Jodi Ito. Michele Norin. WELCOME TO Indianapolis! Today’s Informal Agenda. Introductions Conference networking opportunities - PowerPoint PPT Presentation

Transcript of Welcome to Indianapolis and Security 2012!

Page 1: Welcome to Indianapolis  and Security 2012!

WELCOME TO INDIANAPOLIS ANDSECURITY 2012!

Page 2: Welcome to Indianapolis  and Security 2012!

Content, Networking, & Next Steps:

How To Make the Most of Your Conference Experience!

Larry Conrad Michele NorinJodi Ito

Page 3: Welcome to Indianapolis  and Security 2012!

Introductions Conference networking

opportunities Navigating the conference program A few highlights Getting the most out of your

time here After this week

WELCOME TO Indianapolis!Today’s Informal Agenda

Page 4: Welcome to Indianapolis  and Security 2012!

LET’S GET ACQUAINTED! – Meet Your Neighbors

Name Institution Title (or what you do…) Why did you decide to attend this

conference? What questions do you have for

individuals who have attended before?

Goals for the next three days Information and networking needs Specific things/answers you are

hoping to find here

Page 5: Welcome to Indianapolis  and Security 2012!

Affinity stickers

ENGAGE WITH THE COMMUNITYNetworking Opportunities

“Tag” your interests and show your flair with affinity ribbons

and stickers!

Page 6: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception

Mingle with Security and Enterprise IT Leadership Conference attendees!

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Network and relax with colleagues in the

White River Ballrooms G-J

Page 7: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception Lunch and breaks

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Weigh in on hot topics with roundtable discussions or network with colleagues.

Page 8: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception Lunch and breaks Network over dinner

Check out local restaurants recommended by IU staff: https://protect.iu.edu/indyeats

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Get a group together for dinner.

Page 9: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect

Blogs, Twitter, Flickr, YouTube And new this year: Facebook!

www.facebook.com/HEISCouncil

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Tag your content and reflections with #SEC12 to join the backchannel and share your reflections.

Page 10: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect Fun run

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Meet in the hotel lobby on Thursday at 6 am for a

30-minute run!

Page 11: Welcome to Indianapolis  and Security 2012!

Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect Fun run Be an active participant in the sessions you

attend! Ask questions. Contribute to discussions. Continue conversations during breaks, breakfasts, lunch, and

over dinner.

ENGAGE WITH THE COMMUNITYNetworking Opportunities

Page 12: Welcome to Indianapolis  and Security 2012!

Look for us in sessions, between

sessions, and at refreshment breaks

•Susie Henderson – Online Strategies & Programs•Norma Holland – Professional Development•Greg Jackson – Policy •Rodney Petersen – Policy & Security•Shannon Smith – Professional Development•Sondra Smith – Analytics Outreach & Education•Valerie Vogel – Policy & Security

ENGAGE WITH EDUCAUSEMeet EDUCAUSE Staff

Page 13: Welcome to Indianapolis  and Security 2012!

Wednesday during the refreshment breaks and corporate displays(10-10:45 am & 2-2:45 pm) HEISC Co-Chairs EDUCAUSE Staff REN-ISAC Members Department of Education

ENGAGE WITH HEISC and REN-ISACExplore Volunteer Opportunities

Page 14: Welcome to Indianapolis  and Security 2012!

Online Program Print Program

Program-at-a-Glance

Information desk Registration Desk

EDUCAUSE Staff Logo wear, maroon staff ribbon, magnetic badge

Meet the Program Committee Green committee ribbon

NAVIGATING THE CONFERENCEHelp and Resources

Page 15: Welcome to Indianapolis  and Security 2012!

Pre- and post-conference seminars General sessions Track sessions (several will be streamed) Online-only content Corporate displays Lunchtime roundtables Evening BOFs Post-conference resources Giving a presentation? Engage those who

attend your session. Be a reflective practitioner

Blogs, Twitter, Flickr, YouTube, Facebook

NAVIGATING THE CONFERENCELearning and Engagement Opportunities

Page 16: Welcome to Indianapolis  and Security 2012!

CONFERENCE PROGRAMGeneral Sessions

9:00 Wednesday

The Dynamic Landscape, from a Security PerspectiveBrian Tillett, Chief Security Strategist, Public Sector, Symantec Corporation

8:15 Thursday

Ensuring Effective Communications for Information Security on CampusPanel of C-level Executives from 5 Institutions

Page 17: Welcome to Indianapolis  and Security 2012!

CONFERENCE PROGRAMTrack Sessions

Awareness and Training Technology Concepts Advanced Technology Governance, Risk, and Compliance Corporate and Campus Solutions (includes

Institutional speakers)

Page 18: Welcome to Indianapolis  and Security 2012!

8:30-9:00 Welcome and Introductions(White River Ballroom E)

11:45-1:00 Lunch and Roundtable Discussions (White River Ballroom F)

4:00-5:30 Extended Track Sessions (90 minutes)

5:30-6:30 Joint Reception (White River Ballrooms G-J)

6:30-7:00 PGP Key Signing(Meeting Room 103/104)

8:30-10:00 Birds-of-a-Feather Sessions(White River Ballroom F)

CONFERENCE PROGRAMWednesday Highlights

Page 19: Welcome to Indianapolis  and Security 2012!

6:00-6:45 Fun Run(Hotel Lobby)

9:45-10:45 and 11:00-12:00 Joint Sessions (for Security and Enterprise attendees)

12:00-10:00 REN-ISAC Member Meeting (REN-ISAC members only)

1:00-4:30 Post-conference Seminars(separate registration required)

1:00-5:00 Enterprise IT Leadership Conference (continues through Friday at 2:15)

CONFERENCE PROGRAMThursday Highlights

Page 20: Welcome to Indianapolis  and Security 2012!

To complete session and overall conference evaluations!

CONFERENCE PROGRAMDon’t forget…

Feedback is essential to continuous improvement –

as a speaker and as a conference host.

Page 21: Welcome to Indianapolis  and Security 2012!

Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002

10 ways to get the most out of the conference

1. Review the program with colleagues to decide which sessions to cover (do this every time you

attend a conference).

2. Attend sessions that will introduce you to new ideas, rather than those where you might feel the most comfortable (professional stretch).

3. Plan how you will disseminate new information when you return.

Page 22: Welcome to Indianapolis  and Security 2012!

10 ways to get the most out of the conference

4. Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter.

5. Use your laptop or mobile device to send yourself “to do” reminders for when you return.

Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002

Page 23: Welcome to Indianapolis  and Security 2012!

10 ways to get the most out of the conference

6. Talk to people at sessions to create a network of colleagues.

7. Write a summary of what you learned and think of audiences outside your own organization who might find the information useful.

8. After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned.

Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002

Page 24: Welcome to Indianapolis  and Security 2012!

9. Pass good ideas on to your staff. Commit to sharing with them, and discuss together what makes sense to implement or aim for within the IT operation and institutional mission.

10. Realize that the effect of attending the conference could be as subtle as a change in attitude.

10 ways to get the most out of the conference

Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002

Page 25: Welcome to Indianapolis  and Security 2012!

Established in July 2000

Support from: EDUCAUSE, www.educause.edu/security/ Internet2, www.internet2.edu/security/

In close coordination with: REN-ISAC, www.ren-isac.net/

Introduction to HEISCCo-Chairs: Larry Conrad and Michele Norin

Page 26: Welcome to Indianapolis  and Security 2012!

Improve higher ed information security, data protection, and privacy programs

Engage community members Collaborate with partners from government,

industry, and other academic organizations Actively develop and promote

Leadership Awareness and understanding Effective practices and policies Solutions for the protection of critical data, IT assets, and

infrastructures.

HEISC Mission2012-2013 Strategic Plan

Page 27: Welcome to Indianapolis  and Security 2012!

Guide Infographic Effective Security Metrics GRC FAQ Incident Checklist Mobile Device Security

Guidelines Two-Factor

Authentication

HEISC ResourcesNew!

Page 28: Welcome to Indianapolis  and Security 2012!

HEISC ResourcesComing soon!

2013 Student Poster and Video Contest

Security Tips for Traveling Abroad Data Privacy Month Resources Information Security Program

Benchmarks Guidance for CISOs (e.g., career

progression plan)

And more...

Page 29: Welcome to Indianapolis  and Security 2012!

Awareness and Training Chairs: Nicole Kegler and Ben Woelk

Governance, Risk, and Compliance Chairs: David Escalante and Doug Markiewicz

Technologies, Operations, and Practices Chairs: Jim Taylor and Marcos Vieyra

Information Security Guide Editorial Board Chairs: Ced Bennett and Tom Davis

Security Professionals Conference 2013 Chair: Paul Howell 2014 Chair: Cathy Bates

VOLUNTEERShare and Grow Expertise

Page 30: Welcome to Indianapolis  and Security 2012!

Join the Security Discussion List Connect with community

Visit the Information Security Guide Toolkits, case studies, and more

Attend EDUCAUSE Live! Free web seminars

Explore a wealth of PD opportunities http://www.educause.edu/pd

STAY ENGAGEDAdditional HEISC and EDUCAUSE Resources

Page 31: Welcome to Indianapolis  and Security 2012!

Here’s to a Terrific Learning and Networking Experience!

Questions about the conference or HEISC?

Look for the yellow HEISC ribbons!

[email protected]