Speakers | SAINTCON 2019

Content Lineup

View Schedule

SHOW ALL KEYNOTES PRESENTATIONS TRAININGS COMMUNITY TALKS LEADERSHIP TRACK Expand All


By: Cory Stokes  

Educational Technology leaders need to protect their networks and information security, analyze their current status, and validate what they are doing well. CoSN provides tools and resources that provide insight into how risk can be further reduced in ways that help technology leaders contribute to their schools' primary goals of teaching and learning. We will take a look at and discuss in detail these tools and resources that CoSN provides to us.

Please view the Schedule for more information

By: Jerry Smith  gotmee

This session will help develop and write an organizational information security policy. The session will provide tools for risk analysis, policy development, and resources to develop policies around information security, acceptable use, and other areas of concern that most large educational organizations are faced within today's complex regulatory environment.

Please view the Schedule for more information

By: Kevin Womack and Gavin Anderson  Sheeprock

discuss phishing, what? And why? Training implemented, Then have case study)

Please view the Schedule for more information

By: Scot McCombs  

Panel Discussion topics include User education / phishing / CEO fraud / gift card fraud, successful strategies in end-user data security awareness training.

Please view the Schedule for more information

By: Bryan Peterson  cicle

Identity & Access Management: The importance and advantages of automatically provisioning users when they come to the institution & especially deprovisioning users in a timely fashion when they leave the institution, big picture thoughts.

Please view the Schedule for more information

By: Jeremy Cox  supertechguy

TBD

Please view the Schedule for more information

By: Carol Lear  

In this presentation, presenters/school law attorneys will discuss local and national examples and cases about students hacking into school databases of various kinds. Presenters will outline how to determine if there is a "breach" of student data, how schools should respond and react, and possible legal and school consequences for students responsible. Time permitting, presenters will also provide an update on court cases about other student misuses of technology that affect school climate, safety and student wellbeing.

Please view the Schedule for more information

By: Heidi Alder  

In this informal discussion, presenters/school law attorneys will discuss and answer questions on local and national examples and cases about students hacking and other technology misuses.

Please view the Schedule for more information

By: Shaun Stapley  cha0swir3

There's still some fear of using the cloud, primarily surrounding data privacy & proper data security.

Please view the Schedule for more information

By: David Sallay  

This session will review updates to policies and procedures that LEAs need to know about student privacy and data security requirements

Please view the Schedule for more information

By: Alan Gibbons  

In this session we are holding a combined UWAG and eduroam user group meeting. We will discuss important security topics relating to WiFi and eduroam in schools and other educational organizations.

Please view the Schedule for more information

By: Jason Eyre  aurathos

UETN embarked on a study of LTE as a future offering in Utah. The Pilot Project is currently a work in progress and new developments are happening every month. This presentation will show the progress made by the committee and where we are expected to end up this year and next.

Please view the Schedule for more information

By: Troy Jessup  Jup1t3r

We will discuss the Top 10 or so findings we often see in penetration tests of institutions, and the best methods to avoid having these issues plague your networks.

Please view the Schedule for more information

By: S J  sj

A discussion of gauging where your organizational security is today as well as a simplified discussion of implementing CSC 20 Controls in your organization.

Please view the Schedule for more information

By: S J  sj

Leaders often have to lead in difficult circumstances. Security incidents are always difficult circumstances. This presentation will discuss how to prepare for and properly lead your organization in handling security incidents.

Please view the Schedule for more information

By: Corey Roach  

Historically, in higher-education, "academic freedom" has often been a phrase used as a trump card to avoid implementing data security. In this presentation, I make the case that data security is not the antithesis of collaboration and innovation, but rather an integral part in providing educators, scientists, and researchers an environment where learning and discovery can flourish.

Please view the Schedule for more information

By: Nate Henne  N8

This will be a review of services offered by UETN and USHE in regards to security assessments and penetration tests.

Please view the Schedule for more information

By: Jeremy Cox  supertechguy

TBD

Please view the Schedule for more information

By: Matt Lorimer  zodiak

"Hello. I'm Bob Ross, and I'd like to welcome you to the first joy of hacking series. If this is your first time with us, I hope you grab a few exploits and some vulnerabilities and come along and hack with us. If you've been with us before, first of all, I'd like to thank you for inviting me back again." There will be resources for, and I'd like everyone to play along on their own devices as a hands-on activity to show you just how easy (and fun) it is to exploit modern computer systems. The purpose is to give you a greater understanding of some of the threats faced by your organizations and give you a glimpse into the attacking side of cyber security. We will be leveraging various tools to compromise patched windows systems. * Session not actually taught by Bob Ross

Please view the Schedule for more information

By: Jeff Egly  

Following the SAINTCON keynote presentations SAINTCON attendees have the opportunity to participate in a keynote panel discussion and Q & A offered through the SAINTCON Leadership Track. The keynote panel discussion and attendee Q&A is facilitated by Jeff Egly, an Associate Director with UETN.

Please view the Schedule for more information

By: Jon Stutz  

The insurance industry's view on Social Engineering. What it is, what losses look like, and how to avoid it.

Please view the Schedule for more information

By: Mark Petersen  

A view on Cyber Insurance Claims Trends. Why do these losses happen and tips on how to limit and avoid them. Information for public schools on obtaining cyber insurance.

Please view the Schedule for more information