Main Nav

Thursday
Oct 30th, 2008
2:20 PM - 3:10 PM
Room W230AB
Mountain Time

Authenticated Guest Wireless Access: Simplicity and Security
Christopher Keslar, University of Pittsburgh
The need for guest access is growing as more campuses provide wireless coverage. This presentation will explore a solution for on-demand guest wireless access through a user-friendly and secure process.

Automated Network Access Control at the Edge
Michael S. Hawkins, University of North Carolina at Chapel Hill
Hear how, with a small staff, we reliably manage, secure, prioritize, and deliver voice, video, and data services for over 30,000 people while complying with local, state, and federal regulations.

Caught in the Middle: Implementing University Security Policies at the College Level
Jamey Hansen, University of Minnesota
University security mandates are on one side; independent faculty on the other. Learn how our college IT office walked the fine line between security and service.

Discovering Network Usage Trends and Security Risks Through Network Information Analysis
Matt Tolbert, University of Pittsburgh
This session will share how the University of Pittsburgh successfully captures and visualizes network data to understand network traffic patterns and detect network-based security threats.

NEW! Not in your program!

Contract Themes for Data Protection
Michael A. Corn, University of Illinois at Urbana-Champaign
This session will provide a synthesis of data protection considerations when establishing contract relationships, and will introduce attendees to a comprehensive treatment of this topic that was recently completed by the EDUCAUSE/Internet2 Security Task Force.

Securing Data at Rest, Chandragupta Gudena, Bridgewater State College

Speakers
Resources