Speakers | SAINTCON 2019

Content Lineup

The following content has been confirmed but is not yet scheduled.

SHOW ALL KEYNOTES PRESENTATIONS TRAININGS COMMUNITY TALKS LEADERSHIP TRACK


By: Cory Stokes  

Educational Technology leaders need to protect their networks and information security, analyze their current status, and validate what they are doing well. CoSN provides tools and resources that provide insight into how risk can be further reduced in ways that help technology leaders contribute to their schools' primary goals of teaching and learning. We will take a look at and discuss in detail these tools and resources that CoSN provides to us.

By: Jerry Smith  gotmee

This session will help develop and write an organizational information security policy. The session will provide tools for risk analysis, policy development, and resources to develop policies around information security, acceptable use, and other areas of concern that most large educational organizations are faced within today's complex regulatory environment.

By: Kevin Womack  Sheeprock

discuss phishing, what? And why? Training implemented, Then have case study)

By: Scot McCombs  

Panel Discussion topics include User education / phishing / CEO fraud / gift card fraud, successful strategies in end-user data security awareness training.

By: Dan Jones  delta

We all know that security can't stop with the Information Security department and has to extend to every area of our organization. In this presentation, we will explore how we can help our teams and our organizations understand each other's needs and desired outcomes. We will learn about why security professionals are typically drawn to security roles as opposed to a traditional development or engineering role. A possible paradigm of why others in our organization may appear to not be concerned with security will be presented so that we can understand their drivers and decision making rational. Using these definitions we will look at how we can create a security-friendly culture and help each other achieve great things.

By: Bryan Peterson  cicle

Identity & Access Management: The importance and advantages of automatically provisioning users when they come to the institution & especially deprovisioning users in a timely fashion when they leave the institution, big picture thoughts.

By: Carol Lear  

In this presentation, presenters/school law attorneys will discuss local and national examples and cases about students hacking into school databases of various kinds. Presenters will outline how to determine if there is a "breach" of student data, how schools should respond and react, and possible legal and school consequences for students responsible. Time permitting, presenters will also provide an update on court cases about other student misuses of technology that affect school climate, safety and student wellbeing.

By: Heidi Alder  

In this informal discussion, presenters/school law attorneys will discuss and answer questions on local and national examples and cases about students hacking and other technology misuses.

By: Shaun Stapley  cha0swir3

There's still some fear of using the cloud, primarily surrounding data privacy & proper data security.

By: Gavin Anderson  Bangarang143

According to the official Annual Cyber Crime Report, it is estimated to cost upwards of $6 trillion by 2021. This makes hacking a more profitable industry than the global illegal drug trade. But how? Well, that same report states that more than 90% of successful attacks come from phishing emails and luring people to compromised websites. This is why we believe it is so important to regularly train and test our staff to watch for, recognize, and report suspicious email activity.

By: David Sallay  

This session will review updates to policies and procedures that LEAs need to know about student privacy and data security requirements

By: Gavin Anderson  Bangarang143

According to the official Annual Cyber Crime Report, it is estimated to cost upwards of $6 trillion by 2021. This makes hacking a more profitable industry than the global illegal drug trade. But how? Well, that same report states that more than 90% of successful attacks come from phishing emails and luring people to compromised websites. This is why we believe it is so important to regularly train and test our staff to watch for, recognize, and report suspicious email activity.

By: Alan Gibbons  

In this session we are holding a combined UWAG and eduroam user group meeting. We will discuss important security topics relating to WiFi and eduroam in schools and other educational organizations.

By: Jason Eyre  aurathos

UETN embarked on a study of LTE as a future offering in Utah. The Pilot Project is currently a work in progress and new developments are happening every month. This presentation will show the progress made by the committee and where we are expected to end up this year and next.

By: Troy Jessup  Jup1t3r

We will discuss the Top 10 or so findings we often see in penetration tests of institutions, and the best methods to avoid having these issues plague your networks.

By: S J  sj

A discussion of gauging where your organizational security is today as well as a simplified discussion of implementing CSC 20 Controls in your organization.

By: S J  sj

Leaders often have to lead in difficult circumstances. Security incidents are always difficult circumstances. This presentation will discuss how to prepare for and properly lead your organization in handling security incidents.

By: Corey Roach  

Historically, in higher-education, "academic freedom" has often been a phrase used as a trump card to avoid implementing data security. In this presentation, I make the case that data security is not the antithesis of collaboration and innovation, but rather an integral part in providing educators, scientists, and researchers an environment where learning and discovery can flourish.

By: Nate Henne  N8

This will be a review of services offered by UETN and USHE in regards to security assessments and penetration tests.

By: Matt Lorimer  zodiak

"Hello. I'm Bob Ross, and I'd like to welcome you to the first joy of hacking series. If this is your first time with us, I hope you grab a few exploits and some vulnerabilities and come along and hack with us. If you've been with us before, first of all, I'd like to thank you for inviting me back again." There will be resources for, and I'd like everyone to play along on their own devices as a hands-on activity to show you just how easy (and fun) it is to exploit modern computer systems. The purpose is to give you a greater understanding of some of the threats faced by your organizations and give you a glimpse into the attacking side of cyber security. We will be leveraging various tools to compromise patched windows systems. * Session not actually taught by Bob Ross

By: Jeff Egly  

Following the SAINTCON keynote presentations SAINTCON attendees have the opportunity to participate in a keynote panel discussion and Q & A offered through the SAINTCON Leadership Track. The keynote panel discussion and attendee Q&A is facilitated by Jeff Egly, an Associate Director with UETN.

By: Jon Stutz  

The insurance industry's view on Social Engineering. What it is, what losses look like, and how to avoid it.

By: Mark Petersen  

A view on Cyber Insurance Claims Trends. Why do these losses happen and tips on how to limit and avoid them. Information for public schools on obtaining cyber insurance.