Location: MDCL 1105
The Access Federation has seen a number of applications connected that run the gamut from basic access to sophisticated uses and would like to share how they are connecting and the lessons learned. We will cover topics ranging from best practices to emerging design patterns and have sample use cases.
Deploying eduRoam on your Campus
The Access Federation eduRoam service is ever expanding and has collected some lessons learned and implementation recipes from the field to share. The basics of eduRoam will be covered as well, details of structure and design of various deployments in play across Canada, and a look at future developments. Q and A will be taken time permitting
Session 42: Maturing IT governance practices through effective PPM change management
Location: MDCL 1307
Project Portfolio Management (PPM) initiatives are one method of helping IT departments evolve from their traditional order taking role to a more positive partnership with the rest of the organization. While most executives and project stakeholders can conceptually understand the benefits of consistent work intake, prioritization, and management practices, many such initiatives fail to achieve the expected behavioral changes and business benefits due to poor change management practices.
This presentation will highlight the symptoms and root causes of PPM initiative failures and will provide some field-tested approaches to help secure executive commitment as well as buy-in from functional managers and project teams. The second half of the presentation will be a case study on Carleton University’s IT Project Management Office which applied a number of these practices in the implementation of their governance model.
Location: MDCL 1305
In this presentation, which is targeted at IT and Functional managers, Garry explains UVic’s comprehensive client-centered approach to prioritizing and managing development projects, and provides an overview of the associated governance structures.
Location: MDCL 1110
The active SIG’s are Instructional Technologies (Andrea), Security (George Farah), Portal Technologies (Peter Rowley) and Common CV (Purita Bristow/Sean Moriarty).
Panel members:
Location: MDCL 1309
In the last several years emerging threats making use of 0-day exploits are outpacing the development of AV and detection tools. Botnet agents delivered via email and drive-by downloads can now go undetected within an organization for months if not years, and cause previously unimaginable damage. Response strategies that emphasize restoration of individual service over understanding the larger threat no longer suffice.
In response to this evolution, Memorial University has moved from simply eradicating to assessing each new malware incident that comes to its attention. Incident triage, centralized AV logging, collection and analysis of unknown malware samples, and working closely with our AV vendor have proven fundamental to this approach; other efforts less so. Ample time will be allotted for group discussion. We are eager to hear what has and hasn’t worked for you in your malware battles as well!
Trend Micro deployment
Like other industries, the IT department at the University of Windsor processes a large amount of information on a daily basis. We need to make sure the info is available when needed, without risking the security of that data. Compromising sensitive data not only results in privacy issues, it could also result in serious consequences.
As technology continues to advance, so does the threat of malware. Malware is becoming more sophisticated in regards to how they are written, how they are transmitted and how they deliver their payload. New defense tools and strategies need to be implemented to protect against malware infections.
By implementing Trend Micro products, we are able to reduce risk while protecting valuable information against malware infections and data loss