310 likes | 408 Views
Welcome to Indianapolis and Security 2012!. Content, Networking, & Next Steps: How To Make the Most of Your Conference Experience!. Larry Conrad. Jodi Ito. Michele Norin. WELCOME TO Indianapolis! Today’s Informal Agenda. Introductions Conference networking opportunities
E N D
Content, Networking, & Next Steps:How To Make the Most of Your Conference Experience! Larry Conrad Jodi Ito Michele Norin
WELCOME TO Indianapolis!Today’s Informal Agenda • Introductions • Conference networking opportunities • Navigating the conference program • A few highlights • Getting the most out of your time here • After this week
LET’S GET ACQUAINTED! – Meet Your Neighbors • Name • Institution • Title (or what you do…) • Why did you decide to attend this conference? • What questions do you have for individuals who have attended before? • Goals for the next three days • Information and networking needs • Specific things/answers you are hoping to find here
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers “Tag” your interests and show your flair with affinity ribbons and stickers!
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Mingle with Security and Enterprise IT Leadership Conference attendees! Network and relax with colleagues in the White River Ballrooms G-J
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Lunch and breaks Weigh in on hot topics with roundtable discussions or network with colleagues.
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Lunch and breaks • Network over dinner • Check out local restaurants recommended by IU staff: https://protect.iu.edu/indyeats Get a group together for dinner.
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Lunch and breaks • Network over dinner • Create, capture, reflect • Blogs, Twitter, Flickr, YouTube • And new this year: Facebook! www.facebook.com/HEISCouncil Tag your content and reflections with #SEC12 to join the backchannel and share your reflections.
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Lunch and breaks • Network over dinner • Create, capture, reflect • Fun run Meet in the hotel lobby on Thursday at 6 am for a 30-minute run!
ENGAGE WITH THE COMMUNITYNetworking Opportunities • Affinity stickers • Welcome reception • Lunch and breaks • Network over dinner • Create, capture, reflect • Fun run • Be an active participant in the sessions you attend! • Ask questions. • Contribute to discussions. • Continue conversations during breaks, breakfasts, lunch, and over dinner.
ENGAGE WITH EDUCAUSEMeet EDUCAUSE Staff Look for us in sessions, between sessions, and at refreshment breaks • Susie Henderson – Online Strategies & Programs • Norma Holland – Professional Development • Greg Jackson – Policy • Rodney Petersen – Policy & Security • Shannon Smith – Professional Development • Sondra Smith – Analytics Outreach & Education • Valerie Vogel – Policy & Security
ENGAGE WITH HEISC and REN-ISACExplore Volunteer Opportunities • Wednesday during the refreshment breaks and corporate displays(10-10:45 am & 2-2:45 pm) • HEISC Co-Chairs • EDUCAUSE Staff • REN-ISAC Members • Department of Education
NAVIGATING THE CONFERENCEHelp and Resources • Online Program • Print Program • Program-at-a-Glance • Information desk • Registration Desk • EDUCAUSE Staff • Logo wear, maroon staff ribbon, magnetic badge • Meet the Program Committee • Green committee ribbon
NAVIGATING THE CONFERENCELearning and Engagement Opportunities • Pre- and post-conference seminars • General sessions • Track sessions (several will be streamed) • Online-only content • Corporate displays • Lunchtime roundtables • Evening BOFs • Post-conference resources • Giving a presentation? Engage those who attend your session. • Be a reflective practitioner • Blogs, Twitter, Flickr, YouTube, Facebook
CONFERENCE PROGRAMGeneral Sessions 9:00 Wednesday The Dynamic Landscape, from a Security Perspective Brian Tillett, Chief Security Strategist, Public Sector, Symantec Corporation 8:15 Thursday Ensuring Effective Communications for Information Security on Campus Panel of C-level Executives from 5 Institutions
CONFERENCE PROGRAMTrack Sessions • Awareness and Training • Technology Concepts • Advanced Technology • Governance, Risk, and Compliance • Corporate and Campus Solutions (includes Institutional speakers)
CONFERENCE PROGRAMWednesday Highlights • 8:30-9:00 Welcome and Introductions(White River Ballroom E) • 11:45-1:00 Lunch and Roundtable Discussions (White River Ballroom F) • 4:00-5:30 Extended Track Sessions (90 minutes) • 5:30-6:30 Joint Reception (White River Ballrooms G-J) • 6:30-7:00 PGP Key Signing(Meeting Room 103/104) • 8:30-10:00 Birds-of-a-Feather Sessions(White River Ballroom F)
CONFERENCE PROGRAMThursday Highlights • 6:00-6:45 Fun Run(Hotel Lobby) • 9:45-10:45 and 11:00-12:00 Joint Sessions (for Security and Enterprise attendees) • 12:00-10:00 REN-ISAC Member Meeting (REN-ISAC members only) • 1:00-4:30 Post-conference Seminars(separate registration required) • 1:00-5:00 Enterprise IT Leadership Conference (continues through Friday at 2:15)
CONFERENCE PROGRAMDon’t forget… To complete session and overall conference evaluations! Feedback is essential to continuous improvement – as a speaker and as a conference host.
10 ways to get the most out of the conference • Review the program with colleagues to decide which sessions to cover (do this every time you attend a conference). • Attend sessions that will introduce you to new ideas, rather than those where you might feel the most comfortable (professional stretch). • Plan how you will disseminate new information when you return. Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
10 ways to get the most out of the conference • Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter. • Use your laptop or mobile device to send yourself “to do” reminders for when you return. Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
10 ways to get the most out of the conference • Talk to people at sessions to create a network of colleagues. • Write a summary of what you learned and think of audiences outside your own organization who might find the information useful. • After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned. Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
10 ways to get the most out of the conference • Pass good ideas on to your staff. Commit to sharing with them, and discuss together what makes sense to implement or aim for within the IT operation and institutional mission. • Realize that the effect of attending the conference could be as subtle as a change in attitude. Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
Established in July 2000 Support from: EDUCAUSE, www.educause.edu/security/ Internet2, www.internet2.edu/security/ In close coordination with: REN-ISAC, www.ren-isac.net/ Introduction to HEISC Co-Chairs: Larry Conrad and Michele Norin
Improve higher ed information security, data protection, and privacy programs Engage community members Collaborate with partners from government, industry, and other academic organizations Actively develop and promote Leadership Awareness and understanding Effective practices and policies Solutions for the protection of critical data, IT assets, and infrastructures. HEISC Mission 2012-2013 Strategic Plan
Guide Infographic Effective Security Metrics GRC FAQ Incident Checklist Mobile Device Security Guidelines Two-Factor Authentication HEISC Resources New!
HEISC Resources Coming soon! • 2013 Student Poster and Video Contest • Security Tips for Traveling Abroad • Data Privacy Month Resources • Information Security Program Benchmarks • Guidance for CISOs (e.g., career progression plan) • And more...
VOLUNTEER Share and Grow Expertise • Awareness and Training • Chairs: Nicole Kegler and Ben Woelk • Governance, Risk, and Compliance • Chairs: David Escalante and Doug Markiewicz • Technologies, Operations, and Practices • Chairs: Jim Taylor and Marcos Vieyra • Information Security Guide Editorial Board • Chairs: Ced Bennett and Tom Davis • Security Professionals Conference • 2013 Chair: Paul Howell • 2014 Chair: Cathy Bates
STAY ENGAGEDAdditional HEISC and EDUCAUSE Resources • Join the Security Discussion List • Connect with community • Visit the Information Security Guide • Toolkits, case studies, and more • Attend EDUCAUSE Live! • Free web seminars • Explore a wealth of PD opportunities • http://www.educause.edu/pd
Here’s to a Terrific Learning and Networking Experience! Questions about the conference or HEISC? Look for the yellow HEISC ribbons! security-council@educause.edu