Upload
zubaida-heba
View
22
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Welcome to Indianapolis and Security 2012!. Content, Networking, & Next Steps: How To Make the Most of Your Conference Experience!. Larry Conrad. Jodi Ito. Michele Norin. WELCOME TO Indianapolis! Today’s Informal Agenda. Introductions Conference networking opportunities - PowerPoint PPT Presentation
Citation preview
WELCOME TO INDIANAPOLIS ANDSECURITY 2012!
Content, Networking, & Next Steps:
How To Make the Most of Your Conference Experience!
Larry Conrad Michele NorinJodi Ito
Introductions Conference networking
opportunities Navigating the conference program A few highlights Getting the most out of your
time here After this week
WELCOME TO Indianapolis!Today’s Informal Agenda
LET’S GET ACQUAINTED! – Meet Your Neighbors
Name Institution Title (or what you do…) Why did you decide to attend this
conference? What questions do you have for
individuals who have attended before?
Goals for the next three days Information and networking needs Specific things/answers you are
hoping to find here
Affinity stickers
ENGAGE WITH THE COMMUNITYNetworking Opportunities
“Tag” your interests and show your flair with affinity ribbons
and stickers!
Affinity stickers Welcome reception
Mingle with Security and Enterprise IT Leadership Conference attendees!
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Network and relax with colleagues in the
White River Ballrooms G-J
Affinity stickers Welcome reception Lunch and breaks
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Weigh in on hot topics with roundtable discussions or network with colleagues.
Affinity stickers Welcome reception Lunch and breaks Network over dinner
Check out local restaurants recommended by IU staff: https://protect.iu.edu/indyeats
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Get a group together for dinner.
Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect
Blogs, Twitter, Flickr, YouTube And new this year: Facebook!
www.facebook.com/HEISCouncil
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Tag your content and reflections with #SEC12 to join the backchannel and share your reflections.
Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect Fun run
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Meet in the hotel lobby on Thursday at 6 am for a
30-minute run!
Affinity stickers Welcome reception Lunch and breaks Network over dinner Create, capture, reflect Fun run Be an active participant in the sessions you
attend! Ask questions. Contribute to discussions. Continue conversations during breaks, breakfasts, lunch, and
over dinner.
ENGAGE WITH THE COMMUNITYNetworking Opportunities
Look for us in sessions, between
sessions, and at refreshment breaks
•Susie Henderson – Online Strategies & Programs•Norma Holland – Professional Development•Greg Jackson – Policy •Rodney Petersen – Policy & Security•Shannon Smith – Professional Development•Sondra Smith – Analytics Outreach & Education•Valerie Vogel – Policy & Security
ENGAGE WITH EDUCAUSEMeet EDUCAUSE Staff
Wednesday during the refreshment breaks and corporate displays(10-10:45 am & 2-2:45 pm) HEISC Co-Chairs EDUCAUSE Staff REN-ISAC Members Department of Education
ENGAGE WITH HEISC and REN-ISACExplore Volunteer Opportunities
Online Program Print Program
Program-at-a-Glance
Information desk Registration Desk
EDUCAUSE Staff Logo wear, maroon staff ribbon, magnetic badge
Meet the Program Committee Green committee ribbon
NAVIGATING THE CONFERENCEHelp and Resources
Pre- and post-conference seminars General sessions Track sessions (several will be streamed) Online-only content Corporate displays Lunchtime roundtables Evening BOFs Post-conference resources Giving a presentation? Engage those who
attend your session. Be a reflective practitioner
Blogs, Twitter, Flickr, YouTube, Facebook
NAVIGATING THE CONFERENCELearning and Engagement Opportunities
CONFERENCE PROGRAMGeneral Sessions
9:00 Wednesday
The Dynamic Landscape, from a Security PerspectiveBrian Tillett, Chief Security Strategist, Public Sector, Symantec Corporation
8:15 Thursday
Ensuring Effective Communications for Information Security on CampusPanel of C-level Executives from 5 Institutions
CONFERENCE PROGRAMTrack Sessions
Awareness and Training Technology Concepts Advanced Technology Governance, Risk, and Compliance Corporate and Campus Solutions (includes
Institutional speakers)
8:30-9:00 Welcome and Introductions(White River Ballroom E)
11:45-1:00 Lunch and Roundtable Discussions (White River Ballroom F)
4:00-5:30 Extended Track Sessions (90 minutes)
5:30-6:30 Joint Reception (White River Ballrooms G-J)
6:30-7:00 PGP Key Signing(Meeting Room 103/104)
8:30-10:00 Birds-of-a-Feather Sessions(White River Ballroom F)
CONFERENCE PROGRAMWednesday Highlights
6:00-6:45 Fun Run(Hotel Lobby)
9:45-10:45 and 11:00-12:00 Joint Sessions (for Security and Enterprise attendees)
12:00-10:00 REN-ISAC Member Meeting (REN-ISAC members only)
1:00-4:30 Post-conference Seminars(separate registration required)
1:00-5:00 Enterprise IT Leadership Conference (continues through Friday at 2:15)
CONFERENCE PROGRAMThursday Highlights
To complete session and overall conference evaluations!
CONFERENCE PROGRAMDon’t forget…
Feedback is essential to continuous improvement –
as a speaker and as a conference host.
Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
10 ways to get the most out of the conference
1. Review the program with colleagues to decide which sessions to cover (do this every time you
attend a conference).
2. Attend sessions that will introduce you to new ideas, rather than those where you might feel the most comfortable (professional stretch).
3. Plan how you will disseminate new information when you return.
10 ways to get the most out of the conference
4. Understand the constraints on, and opportunities for, how much you’ll be able to do when you return. You’re not alone in feeling overwhelmed by the challenge of acting on the good ideas that you encounter.
5. Use your laptop or mobile device to send yourself “to do” reminders for when you return.
Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
10 ways to get the most out of the conference
6. Talk to people at sessions to create a network of colleagues.
7. Write a summary of what you learned and think of audiences outside your own organization who might find the information useful.
8. After returning home, set up an action plan with milestones and resolve to carve out the time to reflect on and assess what you have learned.
Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
9. Pass good ideas on to your staff. Commit to sharing with them, and discuss together what makes sense to implement or aim for within the IT operation and institutional mission.
10. Realize that the effect of attending the conference could be as subtle as a change in attitude.
10 ways to get the most out of the conference
Adapted from… Ideas to Action: Ten Hints for Getting the most from a Conference. Joan Getman and Nikki Reynolds. EDUCAUSE Quarterly, No. 3, 2002
Established in July 2000
Support from: EDUCAUSE, www.educause.edu/security/ Internet2, www.internet2.edu/security/
In close coordination with: REN-ISAC, www.ren-isac.net/
Introduction to HEISCCo-Chairs: Larry Conrad and Michele Norin
Improve higher ed information security, data protection, and privacy programs
Engage community members Collaborate with partners from government,
industry, and other academic organizations Actively develop and promote
Leadership Awareness and understanding Effective practices and policies Solutions for the protection of critical data, IT assets, and
infrastructures.
HEISC Mission2012-2013 Strategic Plan
Guide Infographic Effective Security Metrics GRC FAQ Incident Checklist Mobile Device Security
Guidelines Two-Factor
Authentication
HEISC ResourcesNew!
HEISC ResourcesComing soon!
2013 Student Poster and Video Contest
Security Tips for Traveling Abroad Data Privacy Month Resources Information Security Program
Benchmarks Guidance for CISOs (e.g., career
progression plan)
And more...
Awareness and Training Chairs: Nicole Kegler and Ben Woelk
Governance, Risk, and Compliance Chairs: David Escalante and Doug Markiewicz
Technologies, Operations, and Practices Chairs: Jim Taylor and Marcos Vieyra
Information Security Guide Editorial Board Chairs: Ced Bennett and Tom Davis
Security Professionals Conference 2013 Chair: Paul Howell 2014 Chair: Cathy Bates
VOLUNTEERShare and Grow Expertise
Join the Security Discussion List Connect with community
Visit the Information Security Guide Toolkits, case studies, and more
Attend EDUCAUSE Live! Free web seminars
Explore a wealth of PD opportunities http://www.educause.edu/pd
STAY ENGAGEDAdditional HEISC and EDUCAUSE Resources
Here’s to a Terrific Learning and Networking Experience!
Questions about the conference or HEISC?
Look for the yellow HEISC ribbons!